Skip to main content

With the Transformer Book, Tablet 600 and Tablet 810, Asus has all the Windows 8 bases covered

Asus Transformer BookWhile the Asus Taichi and AiO may attract the most attention today, thanks to the unusual form factor and dual-boot OS respectively, they weren’t Asus’ only new products introduced just before the opening of Computex 2012 to feature Windows 8.

The Transformer Book is similar to the company’s existing Transformer Prime range, but instead of Google Android, it runs Windows 8. Three different models make up the new Book range, differentiated by their HD 11.6-inch, 13-inch and 14-inch screen sizes.

Recommended Videos

There will also be a choice of Intel Core i3, i5 or i7 Ivy Bridge chips, all with Nvidia GeForce graphics, plus either hard disk or solid state storage options. Other features include 4GB of RAM, a 5-megapixel camera on the rear and an HD video-call lens around the front, plus USB 3.0 ports.

Like other Asus Transformers, the screen and keyboard can be separated, allowing the Book to be used purely as a Windows 8 tablet.

In addition to the Book, Asus revealed the Tablet 600 and the Tablet 810. The 810 is similar to the Book, as it’s Intel-based — this time with an Atom chip — has 2GB of RAM, and an 11.6-inch screen with a 1366 x 768 pixel resolution. It also boasts an 8-megapixel camera, NFC, Wi-Fi and Bluetooth 4.0.

The Tablet 600 however, is an ARM-based tablet, which will run Windows RT and be powered by Nvidia’s Tegra 3 processor. The 10.1-inch screen also has a 1366 x 768 pixel resolution, and like the Tablet 810 has 2GB of RAM too. It also shares the same 8-megapixel camera. Nvidia has recorded a short introduction video to the Tablet 600 and Windows RT, and you can see it below.

Asus will package the Tablet 600 and Tablet 810 with a keyboard dock, which as well as providing more connectivity through extra USB ports, also has a built-in battery for extended use.

Frustratingly, like the rest of Asus’ new products, price and availability were not discussed, although a post-October release is probable.

Topics
Andy Boxall
Andy is a Senior Writer at Digital Trends, where he concentrates on mobile technology, a subject he has written about for…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more