Feeds
80%

Rock Xtreme X770-T7800 notebook

Could it be a contender?

Build a business case: developing custom apps

Review Rock has a reputation for punching out high-performance laptops, and it's latest line, the flagship 17in desktop-replacment X770 series, has a spec that suggests it's no slouch either.

The line's leader, the X770-T7800, has at its heart an Intel Core 2 Duo T7800. Currently the fastest mobile Core 2 Duo processor, the T7800 is clocked at 2.60GHz and comes with an 800MHz frontside bus (FSB) speed and 4MB of L2 cache.

Rock Xtreme X770-T7800 notebook
Rock's Xtreme X7770: top-of-the-line Core 2 Duo inside

Backing up the CPU is 2GB of PC2-5300 DDR 2 memory clocked at 667MHz, but if your pockets are deep enough you can order your X770 with the maximum memory it can support: 4GB. Remember, though, you’ll need a 64-bit operating system to access the full 4GB - the standard 32-bit version of Windows Vista or XP will only be able to access 3GB. Even better would be taking the option of 2GB of 800MHz, PC2-6400 memory which would then match the processor's FSB speed.

Performance-wise, the X770-T7800 doesn’t hang about, scoring a very decent 5.0 with Vista’s Windows Experience Index. This tests various components - CPU, memory, graphics, gaming graphics and hard drive - and gives an overall score based on the lowest scoring component which, in the case of the review X770, was the memory. No real surprise there as the memory is running slower than the CPU, but in all honesty you probably won’t notice it much.

Just for the record the rest of the scores were: CPU 5.4, graphics 5.9, gaming graphics 5.5 and hard drive 5.2. If you don’t trust the Experience Index then the PCMark05 overall score of 6500 should show how fast this notebook is - it can outpace many a desktop system.

Rock Xtreme X770-T7800 notebook
A touchpad fit for mutant superheros?

The X770 is a stylish, well-built notebook. The black chassis - made by Clevo, a M57RU model - is highlighted by a narrow orange trim strip, although silver is available for those not so daring. The keyboard and trackpad/mouse buttons are surrounded by a panel finished off to look like carbon fibre.

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
End of buttons? Apple looks to patent animating iPhone sidewalls
Filing suggests handset with display strips
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.