
HP OmniBook 5 review: AI laptop that gets the job done
It's not trying to be everything. But if your next laptop needs to be competent, future-ready, and sensible, this might be worth a look. The price starts at ₹78,990, but the final price will depend on the model you choose.
At first glance, the OmniBook 5 did not scream for attention, which I found to be a good thing. Its Glacier Silver finish, curved edges, and minimal branding make it look more expensive than it is. The hinge is solid, and the chassis has just enough structure to feel durable without being bulky.
But here's the thing: if you're moving up from a 13-inch or 14-inch laptop, the 16-inch form factor takes some getting used to. I shifted to using this from a Dell 14-inch laptop and still found it portable. But the screen real estate adds width, and the slightly deeper keyboard deck might throw off your muscle memory at first. Give it a couple of days, though, and it settles in comfortably as your go-to workstation.
You're getting a 16-inch WUXGA (1920×1200) touchscreen here. Not the sharpest panel around, but definitely a usable one. The anti-glare coating is effective, and the taller 16:10 aspect ratio makes multitasking feel more natural.
At 300 nits brightness, it's fine for indoor work. Colour coverage sits at 62.5% sRGB, so if you're a designer or editor who needs precise accuracy, this isn't your panel. But for office work, browsing, content creation for the web, or media consumption? It holds up just fine.
And yes, the touchscreen works well. Responsiveness is on point. But no stylus in the box and no full 360-degree hinge limit how much you'll actually use it day to day.
Under the hood is the Ryzen AI 7 350, AMD's latest chip that blends traditional CPU + GPU performance with a dedicated NPU that can deliver up to 50 TOPS of AI performance. In regular use, Chrome with 20+ tabs, Office apps, light photo editing, and Zoom calls, the laptop stays smooth and quiet. Thermals are managed well, and the fans rarely get loud enough to notice.=
You're not going to game on this, nor is it made for 4K rendering. But for productivity, multitasking, and light creative workloads, this thing has more than enough horsepower.
And as AI workloads start to ramp up in Windows (things like real-time video filters, local summarisation, noise reduction, etc.), this laptop is already equipped to handle those natively, thanks to that NPU and its Copilot+ integration.
Typing on the OmniBook 5 is satisfying. The keys have decent travel, are quiet, and the layout feels natural. Especially with the inclusion of a dedicated number pad. It's clearly built for folks who write, code, crunch numbers, or type for hours.
The trackpad is wide, clicky, and responsive. You'll appreciate the size if you're doing gesture-heavy work. Just one thing, coming from a smaller laptop, the palm travel and spacing might throw you off at first. It's more of a mental adjustment than a design flaw.
With regular usage like Wi-Fi on, brightness at 60%, mixed apps, I got 6.5 to 7 hours comfortably. It's not the all-day endurance champion, but it's enough to take you through most of your workday. The 59Wh battery supports HP Fast Charge, juicing you up to 50% in about 30 minutes, which is genuinely useful when you forget to plug in before a meeting.
HP isn't overhyping the AI features, and that's a good thing. The Copilot key sits where the right Ctrl usually is (you'll adjust fast), and opens Microsoft's AI assistant which is now more context-aware, and integrated across apps like Edge, Office, and the Start menu.
The HP AI Companion app also offers system tuning, noise cancellation, and battery optimisation with a neat, user-friendly interface. Think of it as quiet AI, not flashy, but functional.
No dongles needed here. You get:
The HP OmniBook 5 doesn't try to punch above its weight, it just nails the core experience for everyday work, light creation, and the coming wave of local AI features. It's well-built, comfortable to use, and refreshingly clutter-free.
It's not a creative powerhouse or gaming machine. But for those who want a future-ready laptop with AI capability baked in, a practical display, and reliable performance, this machine is surprisingly easy to recommend.
Just be ready to adapt to the size if you're coming from something smaller.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
16 minutes ago
- Time of India
Massive Microsoft breach affects 100 organizations; Google blames China for cyberattacks
A sweeping cyber espionage operation took aim at Microsoft's SharePoint servers, and compromised about 100 different organizations. That's according to two of the firms that helped uncover the attack. As of Monday, the victims had not been disclosed but most of the entities were in the U.S. and Germany, and included government organizations. It was not clear who was behind the ongoing hack, but Alphabet's Google, which has visibility into wide swaths of internet traffic, said it tied at least some of the hacks to a "China-nexus threat actor." Show more Show less

The Hindu
16 minutes ago
- The Hindu
What to know about a vulnerability being exploited on Microsoft SharePoint servers
Microsoft has issued an emergency fix to close off a vulnerability in Microsoft's widely-used SharePoint software that hackers have exploited to carry out widespread attacks on businesses and at least some U.S. government agencies. The company issued an alert to customers Saturday saying it was aware of the zero-day exploit being used to conduct attacks and that it was working to patch the issue. Microsoft updated its guidance Sunday with instructions to fix the problem for SharePoint Server 2019 and SharePoint Server Subscription Edition. Engineers were still working on a fix for the older SharePoint Server 2016 software. 'Anybody who's got a hosted SharePoint server has got a problem,' said Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm. 'It's a significant vulnerability.' Companies and government agencies around the world use SharePoint for internal document management, data organisation and collaboration. A zero-day exploit is a cyberattack that takes advantage of a previously unknown security vulnerability. 'Zero-day' refers to the fact that the security engineers have had zero days to develop a fix for the vulnerability. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the exploit affecting SharePoint is 'a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations with on-premise SharePoint servers.' Security researchers warn that the exploit, reportedly known as 'ToolShell,' is a serious one and can allow actors to fully access SharePoint file systems, including services connected to SharePoint, such as Teams and OneDrive. Google's Threat Intelligence Group warned that the vulnerability may allow bad actors to 'bypass future patching.' Eye Security said in its blog post that it scanned over 8,000 SharePoint servers worldwide and discovered that at least dozens of systems were compromised. The cybersecurity company said the attacks likely began on July 18. Microsoft said the vulnerability affects only on-site SharePoint servers used within businesses or organisations, and does not affect Microsoft's cloud-based SharePoint Online service. But Michael Sikorski, CTO and Head of Threat Intelligence for Unit 42 at Palo Alto Networks, warns that the exploit still leaves many potentially exposed to bad actors. 'While cloud environments remain unaffected, on-prem SharePoint deployments — particularly within government, schools, health care including hospitals, and large enterprise companies — are at immediate risk.' The vulnerability targets SharePoint server software so customers of that product will want to immediately follow Microsoft's guidance to patch their on-site systems. Although the scope of the attack is still being assessed, CISA warned that the impact could be widespread and recommended that any servers impacted by the exploit should be disconnected from the internet until they are patched. 'We are urging organizations who are running on-prem SharePoint to take action immediately and apply all relevant patches now and as they become available, rotate all cryptographic material, and engage professional incident response. An immediate, band-aid fix would be to unplug your Microsoft SharePoint from the internet until a patch is available,' Sikorski advises.
&w=3840&q=100)

Business Standard
an hour ago
- Business Standard
Vulnerability exploited on MS SharePoint servers: All you need to know
Microsoft has issued an emergency fix to close off a vulnerability in Microsoft's widely-used SharePoint software that hackers have exploited to carry out widespread attacks on businesses and at least some US government agencies. The company issued an alert to customers Saturday saying it was aware of the zero-day exploit being used to conduct attacks and that it was working to patch the issue. Microsoft updated its guidance Sunday with instructions to fix the problem for SharePoint Server 2019 and SharePoint Server Subscription Edition. Engineers were still working on a fix for the older SharePoint Server 2016 software. Anybody who's got a hosted SharePoint server has got a problem, said Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm. It's a significant vulnerability. Companies and government agencies around the world use SharePoint for internal document management, data organization and collaboration. What is a zero-day exploit? A zero-day exploit is a cyberattack that takes advantage of a previously unknown security vulnerability. "Zero-day" refers to the fact that the security engineers have had zero days to develop a fix for the vulnerability. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the exploit affecting SharePoint is "a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations with on-premise SharePoint servers. Security researchers warn that the exploit, reportedly known as ToolShell, is a serious one and can allow actors to fully access SharePoint file systems, including services connected to SharePoint, such as Teams and OneDrive. Google's Threat Intelligence Group warned that the vulnerability may allow bad actors to "bypass future patching. How widespread is the impact? Eye Security said in its blog post that it scanned over 8,000 SharePoint servers worldwide and discovered that at least dozens of systems were compromised. The cybersecurity company said the attacks likely began on July 18. Microsoft said the vulnerability affects only on-site SharePoint servers used within businesses or organizations, and does not affect Microsoft's cloud-based SharePoint Online service. But Michael Sikorski, CTO and Head of Threat Intelligence for Unit 42 at Palo Alto Networks, warns that the exploit still leaves many potentially exposed to bad actors. While cloud environments remain unaffected, on-prem SharePoint deployments particularly within government, schools, health care including hospitals, and large enterprise companies are at immediate risk." What do you do now? The vulnerability targets SharePoint server software so customers of that product will want to immediately follow Microsoft's guidance to patch their on-site systems. Although the scope of the attack is still being assessed, CISA warned that the impact could be widespread and recommended that any servers impacted by the exploit should be disconnected from the internet until they are patched. We are urging organisations who are running on-prem SharePoint to take action immediately and apply all relevant patches now and as they become available, rotate all cryptographic material, and engage professional incident response. An immediate, band-aid fix would be to unplug your Microsoft SharePoint from the internet until a patch is available, Sikorski advises. (Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)