Feeds

Ten... Core i5 laptops

Sandy Bridge computing on the go

Internet Security Threat Report 2014

Product Round-up After a slight hiccough with its Cougar Point 6 chip-set, Intel’s spiffy new Sandy Bridge Core i5 chips are finally starting to arrive in laptops from all the usual suspects. To herald their arrival Reg Hardware has donned its Phil Drabble cap and rounded up ten of the new breed, poked them with a benchmark stick or two and generally abused them to ensure they don’t fall apart as soon as you get them out of the box.

In the line-up there are machines from a wallet-friendly £500 to an eye-watering £1,300 and screens with 13, 14 and 15 inches between the corners. These include machines for the home, machines for work, machines with BD players, even machines with touch screens. If you can’t find what you want here, well there is just no pleasing you.

By way of housekeeping all the tests where performed using Futuremark’s PCMark Vantage and 3DMark applications. To test the power packs I ran PCMark Vantage in a loop until shutdown. It’s a brutal test - a bit like sleep depriving the suspect in the incident room - so you can comfortably double the number shown for every day use as long as you are not running the optical drive continuously.

It's sign of how far laptops have come in the last few years that all the machines on test, even those without discrete graphics cards, ran Crysis smoothly after a quick fiddle in the settings menu.

Ten... Core i5 laptops
Ten... Core i5 laptops

Intelligent flash storage arrays

Next page: Acer Aspire 5750G

More from The Register

next story
Nexus 7 fandroids tell of salty taste after sucking on Google's Lollipop
Web giant looking into why version 5.0 of Android is crippling older slabs
All aboard the Poo Bus! Ding ding, route Number Two departing
Only another three days of pooing and I can have a ride!
Heyyy! NICE e-bracelet you've got there ... SHAME if someone were to SUBPOENA it
Court pops open cans of worms and whup-ass in Fitbit case
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
The IT Crowd's internet in a box gets $240k of crowdcash for a cause
'Outernet' project proposes satellite-fuelled 'Lantern' WiFi library for remote areas
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.