Feeds

Intel to bring vPro tech to laptops with Centrino Pro?

Business-friendly 'Santa Rosa' strand

Security for virtualized datacentres

We've seen Centrino and, more recently, Centrino Duo, but will you now please welcome Centrino Pro, said to be the go-to-market brand for upcoming business-oriented laptops incorporating Intel's vPro technologies.

So claim industry sources cited by Chinese-language website HKEPC, at any rate. Intel announced vPro earlier this year, though systems based on the business PC platform only recently began shipping, thanks to the arrival of the Core 2 Duo desktop processor. The shift from desktop systems to notebooks is something Intel can't ignore, and while Centrino might originally have been geared more toward the business buyer than the consumer, it's now a truly market-wide brand.

Enter Centrino Pro, or something like it, to stress certain laptops' greater enterprise-friendliness. Expect to see Active Management Technology 2.5, Virtualisation Technology and possibly Trusted Execution Technology - aka 'LaGrande'. Expect Intel to tout Centrino Pro to companies looking to manage fleets of notebooks better.

The platform appears set to debut alongside or shortly after the arrival of 'Santa Rosa', the next generation of the Centrino Duo platform. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.