Feeds

Intel launches convertible 'kid-friendly' netbook

Classmate PC evolves

Gartner critical capabilities for enterprise endpoint backup

CES Intel today took the wraps off the latest generation of its education-oriented netbook reference design, the Classmate PC.

Intel third-gen Classmate PC

Intel's convertible Classmate PC: nice netbook

The new model is slimmer and lighter than its predecessors. It also features a 180° tilt-and-swivel display to allow the unit to the converted from a classic clamshell form-factor to a tablet. The 8.9in, 1024 x 600 display's touch-sensitive.

That said, it's been specially configured to ignore input from kids leaning on one part of the screen when working on another area. Intel called this "palm rejection".

How will the mobile phone maker respond to that, we wonder? To build "Intel rejection" technology into the new Palm Web OS?

Intel third-gen Classmate PC

Tilt and swivel

Also new is the branding: Intel's calling the machines the Learning Series, the better to stress the platform's emphasis on educational computing. But the new name also takes in appropriate software.

The new model is based on a 1.6GHz Intel Atom N270 processor backed by 512MB of memory. Past Classmates used Celeron CPUs, and Intel claimed the change of chip yields a 50 per cent boost to system performance and a 30 per cent longer batter life.

Intel said the machine can run for four hours solid, thanks to said CPU and a four-cell battery.

Intel third-gen Classmate PC

Easy to... er... handle

Other features are typical netbook stuff: Wi-Fi and Ethernet connectivity, USB and SDHC expansion.

Intel described the convertible Classmate's design as "durable... drop-proof... and rugged". It also said the machine has a water-resistant keyboard. Like past Classmate PCs, the new model has a handle on the back.

Intel third-gen Classmate PC

Best Classmate yet

Intel doesn't sell the machines, of course, choosing instead to license the design to hardware manufacturers. It said some 30-odd vendors had already been signed up to offer the convertible worldwide. Eight of them will be shipping product from today. ®

Boost IT visibility and business value

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Apple to build WORLD'S BIGGEST iStore in Dubai
It's not the size of your shiny-shiny...
NVIDIA claims first 64-bit ARMv8 SoC for Androids
Mile-High 'Denver' Tegra K1 successor said to rival PC performance
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.