Feeds
80%
Dell Latitude 2100

Dell Latitude 2100

Bash Street's favourite netbook?

  • alert
  • submit to reddit

High performance access to file storage

Review A side-effect of Dell's last internal reorganisation is that the company has separate teams working on very similar products but aimed at different kinds of user. Taking the case in hand, the Latitude 2100 is a netbook aimed at major organisations – primarily educational – who want to buy machines of a predetermined spec in bulk. So it has been designed by a wholly different team from the one responsible for the consumer-oriented Inspiron Mini series.

Dell Latitude 2100

Latitude 2100: Dell's best netbook yet?

So, have the Latitude lads and lasses done a better job at making a netbook than the Inspiron crew?

When you lay hands on the 2100, the first thing that strikes you is the textured, rubberised skin that covers both the lid and base of the machine. It's a unique netbook feature as far as we know and we have to ask why it hasn't been done before. It ensures that the machine sits very securely on a desk. It also feels more grippy in the hand than the usual slick netbook casings, reducing the chances of it slipping out of the grasp of a careless ankle biter, or a tired and emotional grown-up.

Rubber skin aside, the 2100 is a rather angular machine. You get get the impression the Latitude designers took one look at the Mini 10s curves and thought: 'Over my dead body... pass me a set square'.

The square casing does have benefits, however. It has allowed Dell to fit ventilation grilles at the front and on the left side with the result that the fanless 2100 runs rather more coolly than its Inspiron Mini cousins. Secondly, by moving the vents from the underside of the chassis, the machine is supposedly more resilient to nearby liquid spills.

Dell Latitude 2100

The rubberised skin gives the 2100 a rugged, kid-safe feel

Compared to the Mini 10, the 2100 is both larger and heavier, though at 265 x 187 x 22.5-39.9mm and 1.32kg, it's not massively so. The ports and slots are netbook standard: three USB ports, VGA, Ethernet, SD card slot, and 3.5mm audio in and out jacks.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.