Feeds

The Best of El Reg 2011 now on Kindle

Vulture picks over remains of 2011 to make enormous twizzler

  • alert
  • submit to reddit

Worried about spending the Festive period picking over the remains of finger buffets or over bred, under cooked turkeys?

Spend it picking over the last year in tech instead, with The Best of the Reg, 2011, the choicest morsels of our coverage mechanically reconstituted, and twizzled direct to your Kindle device of choice.

The Register and its sister sites published about 13,000 stories this year, so there was little of note in the tech industry and beyond that we didn't at least touch upon.

The Best of the Reg 2011 pulls together some of El Reg' best writing on the biggest topics of the year, laced with some of its funniest. It costs £5.74, less than a turkey dinner, AND you'll still want to look at it after Boxing Day.

If you don't mind blurting out "What? Steve Jobs is DEAD?" at this year's office party, you can probably live without it.

But if you want to at least pretend that you were paying attention you need to buy this book right here. ®

More Reg Kindle Books

The Life and Times of Steven Paul Jobs (Dec '11)
BOFH 2011 (Dec '11)
A brief history of Virtualisation (Dec '11)
Happy 40th Birthday Intel 4004 (Dec '11)

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.