Feeds

Mobile devices hit the stage, execs at IDF

'Oh shit' shouts VP

Top three mobile application threats

IDF Intel wheeled out a slew of partners who have bought into its mobile internet device vision today, and announced that it has turned out first silicon of the next generation of the platform.

But the presentation was almost over before it began, when a Panasonic rep decided the best way to demonstrate its CFU1 ruggedised ultramobile was to hurl it at Intel’s unsuspecting ultra mobility boss Anand Chandrasekher. The MID and Chandrasekher both survived, but not before he became the first Intel veep to shout “oh shit” on stage at IDF.

Chandrasekher quickly recovered his composure to reiterate the vendor’s vision of the internet in your pocket and to announce that Intel had turned out first silicon of Moorestown, the next iteration of the Atom ultramobile platform, which is due late next year, or early 2010.

He said that this generation would bring the idle power down by ten times. Which as well as giving longer battery life means the internet in your pocket isn’t going to have you screaming “oh shit” as it incinerates your privates.

The platform features two main components, Lincroft, an SoC, and Langwell, which handles I/O, both of which are the size of a one cent coin. The whole system board would be about the size of a credit card, he said.

This would certainly help put the internet in your pocket. Many of the first generation devices on display at the show could only be described as pocket-able if you’re part Kangaroo.

Chandrasekher also played up Intel’s theme of the week, visual computing, demonstrating graphics heavy games such as World of Warcraft running on Atom-based MIDS, as well as demonstrating a Compal device running HD video.

As well as the obligatory high def video, the demos featured plenty of location aware devices which you can control with your thumbs, and which will tell you where your friends are, and where they like to eat, which is handy if they lose their ability to communicate with you. ®

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.