Feeds
60%

Lenovo ThinkCentre A61e green PC

Consumes less power than a lightbulb?

High performance access to file storage

All this ensures the A61e is very quiet when it's operating, although we were rather caught out by the integrated mono speaker that is connected to the ADI 1984A audio chip. The only volume control is in software so it’s hard to avoid the wretched Windows sound at start-up.

The use of an AMD 690 chipset is very sensible as it consumes a tiny amount of power and has integrated graphics that are competent enough to handle Windows. However, the list of features that have been provided on this PC is rather short. There’s a VGA output on the I/O panel along with three audio jacks, Gigabit Ethernet and four USB 2.0 ports, with two more on the front of the case.

Lenovo ThinkCentre A61e

Easily accessed innards

Lenovo includes a wired optical mouse and a basic keyboard in the package but the £311 price doesn’t include a display. We were sent a ThinkVision L193p TFT that sells for £231 - a heft price considering it's just a basic 19in display with a 1280 x 1024 resolution. While the L193p has both DVI and VGA inputs, the A61e only has a VGA output so that’s something of a mismatch.

This is somewhat depressing as the Radeon X1200 graphics in the 690 chipset are perfectly capable of supporting a digital connection.

The other notable feature of the L193p is the pivot function. However, the screen is rather square in shape so pivoting from landscape to portrait doesn't actually make much difference. You have to manually rotate the image using the ATI Catalyst Control Centre, and while it’s not a difficult task it's unlikely to appeal to the PC Luddites who are, you would think, the natural customers for such a basic computer.

Lenovo has chosen to install Windows XP Pro on the A61e, rather than Vista, which is probably a good idea as a slow processor and 512MB of RAM is hardly a match made in heaven for Microsoft's latest.

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.