Feeds

Pssst! Here's ECS' 'super 3G' sub-notebook

HSUPA and HSDPA built in

Business security measures using SSL

Mobile World Congress There's not much to say about ECS' 11in G10IL laptop other than the fact that it has built-in tri-band HSDPA and HSUPA 'super 3G' technology for downloads of up to 7.2Mb/s and 2Mb/s, respectively.

ECS G10IL HSDPA/HSUPA laptop

ECS' G10IL: winner

That's one reason that helped it with the GSMA's award for best pre-production mobile broadband notebook, but we snapped the laptop because we think it's a looker.

ECS G10IL HSDPA/HSUPA laptop

Wireless broadband Eee rival?

OK, maybe there's something of the MacBook about it, but it works for us. Feel the same way? Since the machine's not actually out yet, our instinct is to wait around until Intel's next major Centrino revamp, expected in May, for this boy to be launched properly.

What we can say is that the G10IL packs in a trio of USB 2.0 ports, Ethernet and a 56Kb/s modem. There's a VGA connector too, but no optical drive. It's almost certainly Wi-Fi enabled too and probably bundles Bluetooth as well.

That's clearly a webcam up above the display. The odd indentation to the front left of the laptop is the power key.

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.