Feeds
90%

Asus Eee PC 4G sub-sub-notebook

The ultimate laptop?

High performance access to file storage

2007's Top Products Asus' diminutive Eee PC 4G 701 micro-laptop is here. It's garnered an amazing welcome from computer users looking not for the acme of performance but for a highly portable wireless notebook with a decent battery life. Will they be disappointed?

First, for anyone's who's missed the Eee PC hoopla, Asus' little laptop is like a standard 13.3in notebook that's been shrunk to two-thirds of its usual size. It's not the first of its kind – Sony's been offering a variety of these tiny machines for years, Toshiba once made headlines with its oh-so-small Libretto and we're old enough to remember Olivetti's much missed Quaderno.

Asus Eee PC 701
Asus' Eee PC 701: smart, stylish and very portable

What the Eee PC brings to the sub-sub-notebook category are a few modern refinements: Linux, Wi-Fi and solid-state storage. Our review unit has 4GB of Flash, of which around 2.9GB was consumed by the OS, bundled apps and sample files leaving just over a gigabyte for new stuff.

The machine starts straight into Asus' own front-end: a set of icons grouped into categories, each category on a different tabbed pane. The bundled software is comprehensive, and includes Skype; Firefox; Thunderbird; KDE Mail, used for PIM data rather than email; OpenOffice; Acrobat Reader; the Pidgin multi-network instant messaging app; photo, music and video managers; a media player; and an array of utilities, including a file browser.

Not that you should need one. Asus' GUI is clearly intended to be the be-all and end-all of your Eee PC experience. The above-mentioned apps are presented as generic icons – eg. Web rather than Firefox – and are mixed with others that simply trigger links to specific websites, such as Wikipedia and Google Docs. The Internet Radio icon takes you to MediaU.net, for instance.

Asus Eee PC 701
All-in-one inclusive GUI for novices

The Eee PC may run Linux for cost reasons – it's cheaper to install than Windows – but that doesn't mean this machine's aimed at fans of the open-source OS. Indeed, File Manager hides away almost all of the OS' internal workings – though it's not hard to find them if you know what you're about.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.