Feeds

Mobile devices hit the stage, execs at IDF

'Oh shit' shouts VP

The Power of One Infographic

IDF Intel wheeled out a slew of partners who have bought into its mobile internet device vision today, and announced that it has turned out first silicon of the next generation of the platform.

But the presentation was almost over before it began, when a Panasonic rep decided the best way to demonstrate its CFU1 ruggedised ultramobile was to hurl it at Intel’s unsuspecting ultra mobility boss Anand Chandrasekher. The MID and Chandrasekher both survived, but not before he became the first Intel veep to shout “oh shit” on stage at IDF.

Chandrasekher quickly recovered his composure to reiterate the vendor’s vision of the internet in your pocket and to announce that Intel had turned out first silicon of Moorestown, the next iteration of the Atom ultramobile platform, which is due late next year, or early 2010.

He said that this generation would bring the idle power down by ten times. Which as well as giving longer battery life means the internet in your pocket isn’t going to have you screaming “oh shit” as it incinerates your privates.

The platform features two main components, Lincroft, an SoC, and Langwell, which handles I/O, both of which are the size of a one cent coin. The whole system board would be about the size of a credit card, he said.

This would certainly help put the internet in your pocket. Many of the first generation devices on display at the show could only be described as pocket-able if you’re part Kangaroo.

Chandrasekher also played up Intel’s theme of the week, visual computing, demonstrating graphics heavy games such as World of Warcraft running on Atom-based MIDS, as well as demonstrating a Compal device running HD video.

As well as the obligatory high def video, the demos featured plenty of location aware devices which you can control with your thumbs, and which will tell you where your friends are, and where they like to eat, which is handy if they lose their ability to communicate with you. ®

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.