Feeds
90%

Acer Aspire One A110

The Eee-beater to beat

The Power of One Brief: Top reasons to choose HP BladeSystem

By way of a test, we ran a basic Gimp filter test by applying the Gaussian blur filter to a 25.3mb 2048 x 1366 pixel JPEG image, a process that took an average of 7.2s. This compared well the results of the same test performed on the Atom powered Asus EeePC 901 which managed 10.85s when the CPU's set to the standard 1.6GHz setting.

Gimp Results

Acer Aspire One - Gimp Results

Time in seconds
Shorter bars are better

Wireless communication is limited to 802.11b/g Wi-Fi so no Bluetooth and no 3G, though the SIM slot lurking behind the battery is a sure indication that the latter will be coming to the AA1 in due course. In the meantime, accessing the net over a cellular network will involve getting up close and personal with a USB modem and the relevant drivers. That's easy with the XP version, less so with Linux.

A feature currently unique to the AA1 is the seamless storage expansion. Shoving a £20 Class 2 8GB SDHC into secone memory card slot we mentioned before resulted in the system telling us we now had 11GB of storage from a potential maximum of 14GB, up from 3.4GB out of 6.4GB. In case you're wondering where the missing storage is, it's the One's 1GB Swap partition.

Acer Aspire One

File Manager reports the 8GB Aspire One's capacity
Click for full-size image

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.