Feeds

Canon focuses on 25th birthday EOS DSLR

5D Mark III is foxier for filmmakers

High performance access to file storage

Canon will mark a quarter Century of its EOS single-lens reflex camera system with its latest DSLR, the EOS 5D Mark III.

The Mark III takes things up a notch from its highly-rated predecessor, pushing the sensor up a megapixel or so, and featuring the new 61-point AF system found in the recently launched EOS-1D X.

Canon EOS 5D Mark III

According to the company, it's one of the most advanced AFs to date, with 41 cross-type points and five dual cross-type points. Canon's metering system steps into the forefront here, with a 63-zone dual-layer sensor for each point of the AF system instead of the previous 35. It compares colour and luminance signals against the information gathered too.

Another aspect that has been brought over from the 1D X is Canon's Digic 5+ image processor, which replaces the Digic 4 found in the Mark II.

Canon EOS 5D Mark III

This powers the camera's 22.3Mp full-frame sensor, which rolls up with an increased eight-channel read-out, handling a full res speed of up to 6fps in bursts of 18 Raw images or 16,000 JPeg pics. There's also an ISO of 100-25600 which can be expanded to a whopping 102400 for extreme low light conditions.

HD video capabilities has been improved upon also, with the addition of 60fps slow-motion shooting albeit at 720p, as well as the ability to use an external mic for higher audio quality and a headphone jack for monitoring recording.

On the rear you'll find the same 3.2in LCD used by the 1D X too, which boasts 1040k pixels and protection from dust and scratches.

Canon EOS 5D Mark III

There is also dual memory card slots, with a UDMA 7-compatible CF card input and one for a regular SD. Both can be used simultaneously, switching automatically if one becomes too full.

The EOS 5D Mark III is instantly compatible with over 60 EF lenses from the EOS system. It'll be available from the end of March 2012 for £3000. ®

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.