Feeds
80%
MSI Wind Top AE1900

MSI Wind Top AE1900

Touchscreen all-in-one PC

  • alert
  • submit to reddit

High performance access to file storage

Review All-in-one PCs have been around for ages and it’s not hard to understand their appeal. They feature the wire-free tidiness of a laptop, combined with the big screen of a desktop PC. The concept sustains many admirers, with Apple’s iMac range doing very well indeed with just such a form factor.

MSI Wind Top AE1900

MSI's Wind Top AE1900: touchscreen computing on Windows XP

Getting in on the act is MSI’s Wind Top AE1900. Appearing as a rather stylish widescreen monitor, the whole unit is set into a clear plastic surround, which forms a pair of feet at the front and at the top is a small silver 1.3Mp webcam.

A standard set of monitor control buttons fall easily beneath the fingers of your right hand, and it’s not until you look at the left hand side or rear of the unit that it gives away its true computer credentials at all. Tucked away to the left is a pair of USB ports, a card reader and a vertically mounted DVD Super Multi format drive.

The back panel houses another pair of USB ports, analogue audio I/O jacks and a socket for the external power supply unit. In the middle is a single clear, plastic stand finished with attractive silver-coloured, although plastic, detail.

The AE1900 combines the low-cost, and rather low-spec, hardware of a netbook with an 18.5in 1366 x 768 pixel, 16:9 format touchscreen display. Inside, the system is powered by an Intel Atom 230, 1.6GHz processor with 512KB of L2 cache and a 533MHz frontside bus. This is the desktop version of the N270 commonly found in netboooks. It runs at the same clock speed and delivers approximately the same level of performance.

MSI Wind Top AE1900

Casing design akin to Apple's old Cinema Display

The integrated Intel GMA950 GPU provides a less-than-speedy graphics subsystem, which is fine, as long as you’re not hoping to play 3D games. Audio is provided by a pair of built-in stereo speakers that are entirely concealed from view. This unit features a modest 160GB hard drive, 1GB of DDR2 memory and rather more impressive Gigabit Ethernet and 802.11n Wi-Fi.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.