Nikon D5100 16.2Mp DSLR

Making an entry


Review Sitting somewhere in the middle of entry-level scale, Nikon’s D5100 represents a considerable leap from its predecessor the D5000 and can be seen in some respects as a smaller, cheaper-built D7000. From its bigger brother it inherits the 16.2 DX-sized CMOS sensor; the Expeed 2 processor with 14-bit Raw shooting, the extensive ISO range and the higher 920k screen resolution.

Nikon D1500

Entry-level with all the extras: Nikon's D5100

To avoid in-house competition and market overlaps, Nikon has been careful not to equip the D5100 with some of the more advanced, pro-appeal functions of the D7000. Instead, the D5100 features a trendy HDR mode, new effects for videos and stills including a Night Vision option and enhanced video capabilities. The D5100 currently sells at £580 body-only or at £620 with the 18-55 VR lens kit.

The D5100 has a much-improved design over its predecessor. It is seven per cent smaller and 50g lighter than the D5000 and, crucially, the fully articulated 3in LCD is now hinged on the side rather than on the bottom, making the screen much more useful for video recording. The resolution is also four times higher than the 2.7in display of the D5000, making manual focusing and checking details much easier.

Nikon D1500

The mode dial includes access to the effects options

Thanks to a more recessed handgrip the camera offers an exceptionally comfortable handling and I appreciated the repositioning of the video record button on the top plate, which now groups all shooting controls in one place. Unfortunately, the record button is no longer paired with the Live View switch, as in the D3100 and D7000, and LV is now activated by a lever on the side of the shooting dial, which I found difficult to reach with my fore finger and awkward to operate.

Next page: Good customs

Similar topics


Other stories you might like

  • Experts: AI should be recognized as inventors in patent law
    Plus: Police release deepfake of murdered teen in cold case, and more

    In-brief Governments around the world should pass intellectual property laws that grant rights to AI systems, two academics at the University of New South Wales in Australia argued.

    Alexandra George, and Toby Walsh, professors of law and AI, respectively, believe failing to recognize machines as inventors could have long-lasting impacts on economies and societies. 

    "If courts and governments decide that AI-made inventions cannot be patented, the implications could be huge," they wrote in a comment article published in Nature. "Funders and businesses would be less incentivized to pursue useful research using AI inventors when a return on their investment could be limited. Society could miss out on the development of worthwhile and life-saving inventions."

    Continue reading
  • Declassified and released: More secret files on US govt's emergency doomsday powers
    Nuke incoming? Quick break out the plans for rationing, censorship, property seizures, and more

    More papers describing the orders and messages the US President can issue in the event of apocalyptic crises, such as a devastating nuclear attack, have been declassified and released for all to see.

    These government files are part of a larger collection of records that discuss the nature, reach, and use of secret Presidential Emergency Action Documents: these are executive orders, announcements, and statements to Congress that are all ready to sign and send out as soon as a doomsday scenario occurs. PEADs are supposed to give America's commander-in-chief immediate extraordinary powers to overcome extraordinary events.

    PEADs have never been declassified or revealed before. They remain hush-hush, and their exact details are not publicly known.

    Continue reading
  • Stolen university credentials up for sale by Russian crooks, FBI warns
    Forget dark-web souks, thousands of these are already being traded on public bazaars

    Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.

    According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.

    "The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.

    Continue reading

Biting the hand that feeds IT © 1998–2022