Feeds

Ten... Core i5 laptops

Sandy Bridge computing on the go

The Power of One Brief: Top reasons to choose HP BladeSystem

Product Round-up After a slight hiccough with its Cougar Point 6 chip-set, Intel’s spiffy new Sandy Bridge Core i5 chips are finally starting to arrive in laptops from all the usual suspects. To herald their arrival Reg Hardware has donned its Phil Drabble cap and rounded up ten of the new breed, poked them with a benchmark stick or two and generally abused them to ensure they don’t fall apart as soon as you get them out of the box.

In the line-up there are machines from a wallet-friendly £500 to an eye-watering £1,300 and screens with 13, 14 and 15 inches between the corners. These include machines for the home, machines for work, machines with BD players, even machines with touch screens. If you can’t find what you want here, well there is just no pleasing you.

By way of housekeeping all the tests where performed using Futuremark’s PCMark Vantage and 3DMark applications. To test the power packs I ran PCMark Vantage in a loop until shutdown. It’s a brutal test - a bit like sleep depriving the suspect in the incident room - so you can comfortably double the number shown for every day use as long as you are not running the optical drive continuously.

It's sign of how far laptops have come in the last few years that all the machines on test, even those without discrete graphics cards, ran Crysis smoothly after a quick fiddle in the settings menu.

Ten... Core i5 laptops
Ten... Core i5 laptops

Application security programs and practises

Next page: Acer Aspire 5750G

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.