Feeds

Ten... stars of the Consumer Electronics Show

Las Vegas eye-catchers

Remote control for virtualized desktops

Behringer iAxe

RH Numbers

Guitar fan and iDevice buff? Now you can indulge both passions, thanks to high-end audio company Behringer. The iAxe has space not only to slot in an iPad, but there's a iPhone holder on the headstock on which you can display your chord charts. Strumming a touchscreen rather that strings may take some getting used to, but Behringer reckons you can work your way up to a become a sophisticated guitar player on this boy. Total beginner? Download the free guitar tutor app.

Behringer iAxe iPad-based guitar
Price TBC
Available Q1 2012
More Info Behringer

Dell XPS 13

RH Numbers

Ultrabooks played a major part in CES this year, so it's no wonder there are a couple here. The first is Dell's new XPS. Not only is it reasonably stylish, but it's more compact than almost all of its rivals, Dell claiming the machine packs a 13in screen into an 11in form-factor. Well, almost. It won't challenge Apple's 11in MacBook Air, but it will take up less space than other 13in Ultrabooks.

Dell XPS 13 Ultrabook
Price TBC
Available March 2012
More Info Dell

Intelligent flash storage arrays

Next page: HP Envy 14 Spectre

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.