Skip to main content

Lenovo teases Yoga 11S Ultrabook with artsy new commercial

lenovo_yoga_commercial_silhoutteCheck out our review of the Lenovo IdeaPad Yoga 11S convertible hybrid laptop.

In case  you haven’t been drooling over the tiny Yoga 11S Ultrabook since CES, Lenovo just released a teaser that gives a sense of the convertible device’s ability to morph into different shapes, depending on your needs.

Recommended Videos

The spot features dancers from THE SILHOUETTES dance company, dressed in all black against a white background, creating shapes – like a tree, a car, street lamps – with their bodies and with each other. You actually don’t get to see an image of the Yoga 11S at all. In fact, the closest you get is seeing the Yoga in silhouette when the four dancers look like they’re sitting on a plane and are using the device in its four different modes (tablet, tent, laptop, and display mode).

Since the Yoga 11S is basically just a tinier version of the IdeaPad Yoga 13 and Windows RT-running Yoga 11 that were introduced last October, Lenovo probably feels it doesn’t need to hit you over the head with what its line of IdeaPad Yoga Ultrabooks are all about. With an 11.6-inch touch display that comes in 1366 x 768 or 1600 x 900 pixel resolution, the Yoga 11S is one of the few “mini-Ultrabooks” that runs full Windows 8 (the 12-inch Asus VivoBook X202E being the other). The $800 base model uses the i3 chip, 4GB RAM, 128 GB SSD and 1366 x 768 screen. You’ll also be able to customize the Yoga 11S’ third-generation Intel processor (choice of Core i3 to i7), as well as increase the RAM to 8GB and upgrade the solid-state drive to 256GB. The Yoga 11S is available in Clementine Orange, silver, and black.

As we reported earlier this month, you can already pre-order the Yoga 11S from Lenovo and Best Buy, but it won’t be shipping for at least four weeks, according to Lenovo’s estimate. If you prefer to try the Ultrabook in person before buying, you’ll want to wait until June 23 to find a Yoga 11S at a Best Buy near you.

Gloria Sin
Former Digital Trends Contributor
Gloria’s tech journey really began when she was studying user centered design in university, and developed a love for…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more