Feeds
75%
Packard Bell Dot S2

Packard Bell dot S2

Outperforms the Acer it's based on?

  • alert
  • submit to reddit

Business security measures using SSL

There were no shocks with regard to the dot S2’s benchmark results, with its PCMark05 scores falling in line with other N450-driven netbooks.

Benchmark Tests

PCMark05 Results
CPU

Packard Bell Dot S2

Longer bars are better

Memory

Packard Bell Dot S2

Longer bars are better

HDD

Packard Bell Dot S2

Longer bars are better

Video Loop Battery Life Test Results

Packard Bell Dot S2

Battery life in minutes
Longer bars are better

After being promised lower power consumption with Intel’s N450 processor, the Aspire One 532h’s battery life of just over four hours was pretty disappointing. The dot S2 has the exact same six-cell battery (48Wh) but it appears to be a little less power-hungry, with our standard video-loop test running for 11 minutes shy of the five-hour mark. Batteries are fickle beasts and two identical units can often end up providing noticeably different uptime, but seeing this much of an improvement was a little surprising.

New hybrid storage solutions

Next page: Verdict

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.