Feeds

Intel makes MacBook Air processor available to all

But the Air clones will be coming anyway

High performance access to file storage

The reduced-size 65nm Core 2 Duo designed by Intel and incorporated inside Apple's super-slim MacBook Air is available for other computer makers to buy, the chip company confirmed last week.

No great surprise there - Intel's in the business of selling as many chips as possible, not operating as Apple's in-house silicon specialist - but the news hasn't stopped commentators speculating that a raft of Air-alternatives will be hitting the market in the very near future.

Again, no surprise there. Wherever Apple's innovation - whether it's come up with idea itself or, more usually, taken an existing product and run with with it, as per the iPod, the iPhone and, now, the Air - takes it, lesser brands are wont to follow. So there will be more skinny laptops coming, whether Intel makes its physically cut-down CPU available to other customers or not.

Come May, Intel will have a raft of low-power, high-performance 45nm Core 2 Duo processors ready for laptop makers. And don't forget 'Silverthorne', the 45nm ground-up-design UMPC chip that uses HyperThreading to boost performance while keeping the core count to one.

Apple MacBook Air

Apple's MacBook Air: smoooooth

It's not just the small processor that's made the Air possible. While that helps shrink the machine's motherboard a little, Apple's MacBook and MacBook Pro mobos aren't exactly large as it is. Neither are many other laptop boards. What makes the Air possible is the willingness to drop the optical drive and to use a handheld music player-grade hard drive until solid-state disks become cheap enough to be offered as standard.

Incidentally, what the Air does have over its rivals - whether you like the machine or not - is the best casing. Compare it to similar PCs, such as Toshiba's Portege R500, and while the Air is a smooth, solid product, thanks to its aluminium alloy shell, the R500 is clad in flexible plastic that's all humps, bumps and air vents.

Still, while the Air is nicer looking, it's clearly less functional - the R500 has plenty more ports and an integrated optical drive. Watch out for our full review of the Toshiba.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.