Feeds

Last call for your chance to win an HP ENVY x2 tablet

The slate for folk who like their laptops skinny

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Competition Don't forget, folks, you still have time to cat your votes for the latest Reg Hardware Awards - your chance to name the best and worst tech products of the past 12 months.

More to the point, it's also your opportunity to win one of HP's "extraordinary" new ENVY x2 convertible tablets worth £799.

HP Envy x2 Windows 8 convertible

Use the ENVY x2 as a tablet, or use it as a notebook - it's your choice

As our reviewer put it, "viewed as a tablet computer - powered with a dual-core 1.8GHz Intel Atom processor and boosted by a high-quality detachable keyboard with trackpad and connectivity ports, not to mention double battery packs... oh, and it runs Windows 8 - the ENVY x2 is extraordinary".

HP Envy x2 Windows 8 convertible

The ENVY x2's 11.6in, 1366 x 768 is ideal for Windows 8

Fancy one? Pop over to the Reg Hardware HP ENVY x2 Competition entry page right now (Hint: you can read our review there to crib the answers).

And you can fill in your awards voting slip here. You have until midnight on 27 January to cast your vote. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.