Feeds

Netbooks and Mini-Laptops

They're little and we love 'em. But which ones are best?

  • alert
  • submit to reddit

3 Big data security analytics techniques

Buyer's Guide Since Asus launched the Eee PC 701 in October 2007, many notebook makers have hopped on the Small, Cheap Computer bandwagon, a fair few of them pushing the limits of the format's size and price in the process.

The arrival of Intel's Atom N270 processor in June this year kickstarted this profusion of SCCs, and it remains the CPU on which most of them are based. But whatever processor a manufacturer has picked, there's much commonality among SCCs. Memory card slot, two to three USB 2.0 ports, 10/100Mb/s Ethernet, webcam, VGA and 802.11b/g Wi-Fi - these are standard on all SCCs.

Asus Eee PC 701

Asus' Eee PC 701: the original

The most common screen size is 8.9in, and while there are bigger, 10.2in models out there, they all have the same 1024 x 600 resolution as the smaller models. For us, the extra inch makes no appreciable difference to legibility, but it does mean the laptop is physically bigger.

Hard drives can expand waistlines too, and we'd argue that the solid-state drive is what the SCC is all about: capacity enough for the OS and a sub-set of your data, with the resilience you want from a throw-around machine. That said, there's no arguing that a hard drive will give you a true laptop-like storage capacity.

Dell_mini_inspiron_02

Dell's Mini 9: the most eagerly awaited SCC?

Almost all SCC suppliers offer a choice of Linux or Windows XP. The Microsoft OS has the advantage of familiarity, and some hardware won't hook up to Linux SCCs as easily as it will to an XP machine, at least not without some under-the-hood knowledge of the operating system. But the open source OS makes for cheaper machines, and since the SCC is designed for simplicity, their basic, kid-friendly UIs are sufficient for all but the most demanding user.

So here, then, is Register Hardware's guide to the current crop of netbooks...

SANS - Survey on application security programs

Next page: Acer Aspire One

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.