Netbooks at Work - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Lenovo IdeaPad S10-3t Netbook Tablet-2 Next

Lenovo IdeaPad S10-3t Netbook Tablet

The IdeaPad S10-3t is Lenovo's first multitouch-screen netbook tablet. Its design features a curved silhouette and inspired pattern on the cover in two vibrant colors. Using the Lenovo IdeaPad S10-3t netbook tablet, users can log on and off their PC, scroll through video archives, drag-and-drop to create play lists and turn e-book pages with a simple tap, flick or pinch of their fingers on the screen.The 10.1-inch screen can be used in tablet or clamshell mode. The S10-3t comes with Lenovo Direct Share software for wireless synchronization of files with another PC and location-based services.

The netbook has not yet fully emerged as a separate and distinct business device category. But, like smartphones, Wi-Fi and other technologies before it, the consumer device is being used by people at work. IT Business Edge takes a look at devices vendors suggest are the most valuable in a work environment.

The definition of non-phone mobile devices is still a bit fuzzy. At the same time, experts are saying that the netbook – also known as the mini-notebook – has peaked. It will be interesting to see if vendors see the business world, or specific verticals such as health care, as a way to reinvigorate the category.
 

Related Topics : Tablets Netbooks and UMPCs, Palm OS

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.