Feeds
85%
Dell XPS 15z

Dell XPS 15z 15.6in Core i5 notebook

How to clone a MacBook...

  • alert
  • submit to reddit

High performance access to file storage

Review When the 15z was announced there was no small amount of fanfare, not least due to Dell’s interesting claim that this was the thinnest 15in laptop in existence. In no time at all, it had been pointed out that the accompanying asterisk needed to be the size of an actual star, since the machine the 15z was aping, the Apple MacBook Pro, was actually thinner by a disastrous 0.02in.

Dell XPS 15z

Very metal: Dell's XPS 15z

That’s not the only comparison to Apple’s kit you can make, either. Fold the 15z shut and you can all but hear Apple’s IP lawyers twitching for the phone – from the rounded edges to the slot-loading dual layer DVD-writer on the side, this is a machine that is as good-looking as it is wanting in design originality.

Still, if a laptop’s worse sin is looking too much like a MacBook Pro it can probably be forgiven, but the 15z takes inspiration beyond that. In an effort to keep the underside sleek and seamless, Dell has opted to make the battery a sealed-in effort.

Dell XPS 15z

Not a unibody construction, but not a bad bluff

The 15z doesn’t have a unibody design – the palm rest is mag alloy, but the bottom is aluminium and can be removed to access the innards. However, once all the screws are out, removing the rather bendy base required more force than I was willing to apply to a thousand-pound laptop belonging to someone else.

On the plus side, there’s nothing wrong with the battery. Tasked with doing nothing, with the screen at half brightness and connected to a Wi-Fi base station, the 15z ran for eight hours 38 minutes, which is impressive indeed. Working flat out, with the screen at full brightness the battery lasted two hours 19 minutes, so those doing a spot of word processing or watching a film can expect a comfortable time somewhere between the two.

Dell XPS 15z

Combat fraud and increase customer satisfaction

Next page: Performance charts

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.