Feeds

Dell MacBook Air Adamo officially launched

Slim and sexy, dahling, but mediocre inside?

High performance access to file storage

Following months of teaser specifications, pictures and videos, Dell has finally decided to launch its slim'n'sexy Adamo laptop.

Adamo_01

Dell's Adamo: sexy, but is it powerful enough?

The machine is the very “pinnacle of craftsmanship” – at least according to Dell - and many media outlets have already dubbed the Adamo as the latest MacBook Air competitor. Although this is probably mainly based on the laptop’s looks and the fact that its base is crafted from a single piece of metal.

Adamo measures 331 x 242 x 16mm and has a 13.4in, 16:9 aspect ratio display. It's described as an "HD" screen, but we can reveal it's only a 720p boy.

The laptop contains Intel’s Mobile 965 Express chipset, making use of GMA X4500 integrated graphics for what Dell calls its “visual juice”.

Adamo_04

It's slim, but there's no optical drive inside

Under the shell you’ll find a 1.2GHz or 1.4GHz Intel Core 2 Duo processor, 2GB of DDR 3 memory and a 128GB SSD. Again, much like Apple’s Air, the Adamo doesn’t have an internal optical drive, but you can opt to buy an external Blu-ray or DVD combo drive.

Fast wireless surfing is possible thanks to the integrated 802.11n Wi-Fi connectivity, but mobile workers can also opt for mobile broadband technology to be included too. An Ethernet port’s also included - unlike the Air.

Adamo_02

Adamo's delivered in a plastic case with separate cable compartments

The machine has two USB 2.0 ports, a single USB/eSATA combo port and Bluetooth 2.1 for short-range data transfers. It comes installed with Windows Vista 64-bit Home Premium Edition.

Dell claimed the machine’s “preliminary” battery life is around five hours. 'Prelimary' in this case means based on an early, pre-release test, so who can say what it'll be in the real world. There's no word yet on whether the battery is easily removable.

Dell Adamo

Svelte

Dell will start shipping Adamo on 26 March. Its US price has been pegged at $1999 (£1419/€1536). Over here it'll retail from £1649. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.