Monday, October 19, 13:50
Home inet Chuwi CoreBook: An affordable 2-in-1 model with powerful functionality

Chuwi CoreBook: An affordable 2-in-1 model with powerful functionality

Chuwi CoreBook: If you are looking for a 2-in-1 device you will probably have noticed that there are many models you can choose from, as almost every partner Microsoft has created its own publications to take advantage of the growing demand for this particular device.corebook

Chuwi is one of the companies that impressed from the beginning, as it managed to combine decent hardware and Windows 2 power into a 1-in-10 device, creating extremely affordable models that offer the functionality of the most expensive products.

In an effort to compete with the big ones, including Microsoft and Apple, Chuwi is now preparing the CoreBook, a 2-in-1 model that will bring even more rich experience to its users.

The device will feature an 13,3 inch screen with a full-rolled OGS panel that will not only reduce reflections but will contribute to overall picture quality. Power comes from a processor Intel Core 7 generation (Intel Core M) coupled with RAM 6GB and storage up to 128GB.

The CoreBook features 4K hardware decoding, a pen that supports 1024 pressure levels as well as a fingerprint sensor that Chuwi calls a "Touch ID", similar to the one found on Apple iPhones, despite being a trademark infringement.

In addition, the CoreBook comes equipped with an 2-in-1 keyboard with built-in support for easier setup and a 37Wh battery that supports fast charging.

Unfortunately, the mass production of this model is not yet finalized, which will be judged by a finance campaign that the company is about to organize to see public demand.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

SecNews
SecNewshttps://www.secnews.gr
In a world without fences and walls, who needs Gates and Windows

LIVE NEWS

System breach exposes Kleenheat customer data

Australian-based gas company Kleenheat has warned some of its customers of data breaches, which may ...

US Election: Candidates manipulate voters via email!

The politicians who are candidates for the upcoming US elections use psychological tricks and "dark" patterns in their emails to ...

Google Chrome and Edge create random debug.log logs

An error in the latest version of Chrome and other Chromium-based browsers causes random debug.log files to be created ...

TikTok: Announced bug bounty program to detect vulnerabilities

The company behind the popular video sharing application TikTok announced last week that it has launched a public bug bounty program, ...

Windows 10: Unlock God Mode and see all Settings

Windows 10 comes with the Control Panel and Settings, but the modern application of Settings has a peculiarity, the basic ...

Microsoft: Releases emergency updates to fix RCE vulnerabilities

Microsoft has released emergency security updates to address two vulnerabilities that allow remote code execution (RCE) and affect Microsoft ...

Ransomware: Your business will never be the same again after an attack

A ransomware attack can harm an organization in many ways - from stopping being able to function ...

Foxtons suffered data breach, according to a newspaper

According to a newspaper report, Foxtons allegedly fell victim to data breach, which led to the deactivation of the MyFoxtons website ...

Google: Warned of 33.000 attacks by state hackers

During the first three quarters of 2020, Google sent over 33.000 alerts to users to warn them about phishing ...

Hackers use Basecamp for phishing and malware attacks

Phishing attacks have begun exploiting Basecamp in an attempt to distribute malware and steal credentials. The Basecamp ...