Feeds
75%
HP Envy 17 3D

HP Envy 17 3D Core i7 laptop

Tasty 3D take away

  • alert
  • submit to reddit

High performance access to file storage

The 17.3in LED display is sharp and bright at a wide range of angles, its 1920x1080-pixel resolution allowing it to support full 1080p HD media. To this end, the computer is fitted with a slot-loading Blu-ray player/DVD burner combo drive.

HP Envy 17 3D

It's not really as thin as this picture makes it appear, but it’s more compact than most 3D luggables

Most connectivity ports are arranged on the left-hand edge of the case, plus two USB ports on the right-hand edge along with the optical drive a 5-in-one memory card slot. There’s a potentially useful combination of eSATA and USB 3.0 alongside the USB 2.0 ports, otherwise you can use all four for standard USB 2.0 devices. As well as HDMI and VGA connectors, the Envy 17 3D provides a Mini DisplayPort, although I did not get the opportunity to test whether it can be used as a Thunderbolt interface, but I’d guess not.

In use, the Envy 17 3D is a decent performer, automatically making use of Intel’s Turbo Boost technology to push the four cores of the Core i7 720QM processor to a maximum of 2.8GHz. This is not something a regular user can control: the Turbo Boost triggers apparently when it feels like it. But despite some good-but-not-staggering general benchmark results, the Envy 17 3D is a strong gaming computer.

Its 3D display feature is nicely implemented, enabling itself automatically when appropriate but not stupidly splitting or blurring the screen when it isn’t. HP’s 3D shutter glasses also switch themselves on automatically when they detect the 3D sync signal from the computer, so there’s no fiddling around playing hunt-the-microscopic-button whenever you feel the sudden impulse to sit down and play.

Benchmark Tests

PCMark Vantage Overall Results

HP Envy 17 3D

Longer bars are better

Battery Life Results

HP Envy 17 3D

Battery life in minutes
Longer bars are better

HP Envy 17 3D

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.