Feeds

Canon debuts EOS M compact system camera

Better late than never

High performance access to file storage

Seemingly bowing to peer pressure, Canon has finally unveiled its own compact system camera, the EOS M. A mirrorless interchangeable-lens snapper that features its new EF-M lens mount and an 18Mp APS-C CMOS sensor.

Rather than try a new imaging format, Canon is playing it safe with DSLR tech in a small body and competing with Fujifilm's X-Pro1, Sony's NEX and Samsung's NX CSCs. Only the Pentax K-01 retains an existing DSLR lens mount in this arena. Indeed, the EOS M sensor and Digic 5 processor are the same found in the company's entry-level DSLR, the EOS 650D.

Canon EOS M

The EOS M has an ISO range of 100-12800 with sensitivity extendable to ISO 25600 for see-in-the-dark shooting. A 3in capacitive touchscreen graces the rear, although there's no articulating panel to keep film-maker's happy. Still, when it does come to videography, the EOS M records full 1080p video and benefits from the new sensor-based AF system, which makes use of contrast and phase detection to continuously keep things sharp.

Canon EOS M

The APS-C sensor maybe a standard format, but Canon has gone to the trouble of developing an entirely new lens system, although older lenses can still be used by way of the EF-EOS M adaptor that the company claims is compatible with the full range of EF and EF-S lenses. As for the EF-M design, two lenses are available from launch; the EF-M 22mm f/2 STM pancake and the EF-M 18-55mm f/3.5-5.6 IS STM standard zoom.

To save space there's no built-in flash, although Canon's new external gun – the Speedlite 90EX – should do the trick and comes shipped with the EOS M as standard.

EF-M 22mm f/2 STM pancake and the EF-M 18-55mm f/3.5-5.6 IS STM standard zoom

The Canon EOS M rolls out in the UK from October 2012 for £950 with both lenses. That seems a little pricey for this NEX competitor, but we'll give you our proper assessment when we actually get our hands on one.

For EOS M sample movies and images, have a gander at the Canon website. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.