Vulnerabilities / Threats // Insider Threats
6/21/2010
04:06 PM
Connect Directly
RSS
E-Mail
50%
50%

Dell Launches Inspiron R Laptop

The PC is geared to home users and students, with quick access to photos, videos, and apps and an option that wirelessly streams the laptop's display to a compatible HDTV.

Dell Intros Inspiron R Laptop
(click image for larger view)
Dell Intros Inspiron R Laptop
Dell has introduced three Inspiron R laptops that provide easy access to photos, videos, and most commonly used applications.

The computer maker's latest notebooks include 14-, 15-, and 17-inch versions. All three include the Dell Dock, an application that gives users the option of placing their favorite content and applications at the top of the screen for quick access.

The laptops have curved edges and are available in four colors, each with chrome accents. The entertainment focus of the notebooks, along with the stylish design, is meant to appeal to students and people looking for a family PC.

The Inspiron Rs are available with the Intel Wireless Display feature as an option. The technology makes it possible to stream wirelessly what appears on the laptop display to a high-definition TV that also supports the Intel product.

Other options include Microsoft Office 2010 and a 1-GB graphics processor from Advanced Micro Devices' ATI unit. Buyers can also choose between an Intel Core i3 and Core i5 mobile processor.

Other options include up to a 640-GB hard disk drive and 8 GB of DDR3 system memory. The two larger models have a dedicated 10-key number pad. All the systems are configured to take advantage of Dell's online backup service, called DataSafeOnline.

Inspiron R laptops, released Monday, ship with Windows 7 and have a starting price of $449.

The low price point of the Inspiron R reflects Dell's continued focus on low-cost PCs for consumers and business. The company is also moving beyond the PC into new markets, such as smartphones and tablet-like computers.

Dell's smartphone the Aero, will be available in the United States first through AT&T, which is taking preorders, but hasn't said when the device would be released. Dell formally introduced the smartphone late last year in China and Brazil.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.