Feeds
85%
Canon i-Sensys LBP3100

Canon i-Sensys LBP3100

Cheap and better than cheerful

  • alert
  • submit to reddit

3 Big data security analytics techniques

Review Laser printers have been nudged out of the personal, one-per-desk market by the continued growth of inkjets. For straight black print, though, there’s nothing to touch laser copy, and Canon has fortified its entry-level mono laser range with the i-Sensys LBP3100, a small machine with a couple of interesting design tweaks.

Canon i-Sensys LBP3100

Canon's LBP3100: stylish and compact

For starters, the LBP3100, one of the smallest printers in the i-Sensys range, has a footprint when closed similar to that of a 15in laptop.

Decked out in ice-white, with a glossy white lid and pull-down cover at the front, the printer looks unprepossessing, but because of that it fits in easily with most home and office decoration.

To print, the machine has to be opened up, and the lid folds forward to become the output tray. The front folds down to become a 150-sheet feed tray, but the clever part is that there’s a hinged cover behind the front panel, which folds out to cover and keep dust off the paper. Many personal printers have separate covers for their feed trays, of course, but most are separate fittings which have to be stored independently when the printer is closed.

Controls and indicators are sparse, with a single green LED for power and data, set to the left of the top cover, along with a Resume button. The main power button is in the front panel. At the back of the machine is a single USB socket, the only connection provided.

Canon i-Sensys LBP3100

Th integrated drum and toner cartridge is easy to load

Setup and installation are straightforward, as the combined drum and toner cartridge slots in easily through a hatch in the printer's top surface and requires minimal priming before it's ready to print. Software support consists of a driver which provides multiple pages per sheet, but no support for watermarks or overlays.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.