Feeds
65%
Asus Lamborghini VX2 laptop

Asus Lamborghini VX2 laptop

Show off how big your processor is...

High performance access to file storage

Put it through 3DMark06, though, and the choice of GeForce Go 7700 chip, rather than the more powerful 7800 or 7900, starts to show. The VX2 only managed to pull in a result of 2,343, which is fairly disappointing.

It's also a bit of a let down on the optical drive front. While you do get a multi-format DVD writer, which is Lightscribe capable for direct labelling, you would really expect a next-gen optical drive - like HD DVD or Blu-ray - in a unit costing this much.

Asus has equipped the VX2 with a 15.4in widescreen display - giving it one extra over the 4:3 VX1 - but it has a slightly bizarre resolution of 1,680 x 1,050, leaving it short in both directions for playing back full 1080 HD content which has a resolution of 1,920 x 1,080.

Asus Lamborghini VX2 laptop

The VX2 is packed with all manner of sockets, slots and connectors. Down the left hand side you'll find Ethernet, s-video, VGA, two USB and HDMI. Spin over to the other side and there's modem, four-pin Firewire, microphone, headphone (which doubles as SP/DIF) plus an ExpressCard 54 slot and card reader that accepts SD and MemoryStick.

At the top of the screen is 1.3-megapixel camera and built in mic - so if web chats are your thing, then you've got everything you need to get going bundled right in. On the wireless front there's Intel Next-Gen Wireless-N, based on the draft 801.11n spec, and Bluetooth 2.0.

With a footprint of 36.3 x 26.3cm, measuring 3.8cm at its highest point when closed and weighing 3.3kg this is a laptop destined for desk use and the occasional wander rather than becoming your inseparable portable pal.

Just below the bottom left hand corner of the keyboard there's an array of bright, white lights to tell you useful things - like whether your wireless is on or your Bluetooth is activated. While this seems like a good thing initially, they're just way too bright. Try getting on with some actual work - remember you've got to pay for this thing somehow - and they soon become a distraction, as does the hard drive light pulsing away at the top of the keyboard.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.