Feeds

Laptop bags: 15-inchers

For folk with large luggables

High performance access to file storage

Xmas Gift Guide Fed up of lugging your laptop around in a tatty old backpack? Fancy something a little more stylish? Feel your other half ought to carry a pack that's more chic? Here are five of the best bags for 15in laptops that Reg Hardware saw during 2011.

We'd recommend any of the following bags, but our favourite is listed on the next page as Editor's Choice. In reverse order of rating we have...

Port Design Macao

RH Numbers

While most messenger bags are big sacks with a flap, Port's Macao is a slightly more rigid affair, designed to stand up on its own on a flat base. It's looks are restrained, its nylon fabrication conservative, the black case enlivened by burgundy lining. Fancy something more whacky: Port does a brown and sky-blue version.

Port Design Macao

Fortunately, there's plenty of room in here - it can take a 16in laptop - and has lots of pockets, internally and externally, facing forward and on the back. The flap is fixed at the front with velcro for fast but noisy removal. The strap is sewn down, though adjustable and with a shoulder pad attached.

Port Design Macao
Reg Rating 75%
Price €40 (£35)
More Info VIP Computers

Pakuma Choroka K2

RH Numbers

If the material from which the K2 is made feels a bit on the thin side, it nonetheless impresses with its black-and-green looks - light and dark grey is an option too - and the vast volume of space it offers for your stuff. Next to the padded laptop area - good for machines up to 15.6in - is a huge 45 x 25 x 15cm zone to be filled, with a multi-pocket side facing it.

Pakuma Choroka K2

There are no external pockets, mind, though there are couple of small ones good for phones, music players and passports that sit under the velco-latched flap. The strap is adjustable and sewn onto the bag - only the shoulder pad, which is thin and narrow, disappoints. This would make a good overnight bag even if you're carrying your computer.

Pakuma Choroka K2
Reg Rating 75%
Price £32
More Info GearZap

High performance access to file storage

Next page: Thule Attaché

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.