Feeds
86%

Acer TravelMate ProFile 6292 business laptop

Acer's... um... ace up its sleeve?

3 Big data security analytics techniques

When it comes to performance, Windows Vista pegs the 6292's Windows Experience Index (WEI) at 3.4 out of 5.9. The overall WEI is determined by the lowest scoring category - in this case graphics. Gaming graphics was also low - just 3.5 - while hard disk and memory scored 4.4 and 4.8, respectively. The processor racked up the highest component score, managing 5.1.

Acer TravelMate 6292

Running the laptop through the PCMark05 benchmark suite resulted in a decent score of 4,069 but when it comes to 3D performance, the numbers aren't as great. It only managed to attain a paltry 551 in 3DMark06 which isn't really going to give you sufficient oomph for decent gaming. However, the 6292 is aimed more at the business market than the consumers, so it's less of a problem. And that's integrated graphics for you.

The keyboard feels a little bouncy to type on at first, but it's pleasant enough once you get used to it. Like the screen, though, it does feel like it could have been made a little bit bigger, with wasted space down the sides that could have been put to use for slightly bigger keys or a less cramped layout - or even a smaller laptop, if Acer really wanted to push the ultra-portable line. For example, the five quick-launch buttons down the right-hand side of the keyboard would no doubt be better housed along the strip at the top where the power and Empowering Technology buttons are.

The Empowering Technology key activates a sort of Apple Mac OS X Dashboard view, which dims the main screen and shows you foating widgets that let you perform tasks such as change your power settings or Wi-Fi options.

The touchpad sits below the keyboards and in between the left and right click buttons you'll find a fingerprint reader, which you can use for various security features which would normally require a password.

Acer TravelMate 6292

On the panel on the front edge of the machine there are headphone, line-in and microphone ports, along with a four-pin Firewire connector. The front panel also houses an infrared port, a technology long forgotten on most new models. Bluetooth 2.0 is also included for those after more modern wireless technology.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.