Feeds

Intel to intro next-gen netbook Atom on 10 January?

Stepping onto the 'Pine Trail'

Choosing a cloud hosting partner with confidence

Expect a raft of new netbooks based on Intel's next-generation 'Pine Trail' Atom chippage after 10 January - the day the products will be formally launched, it seems.

That date is slap-bang in the middle of the Consumer Electronics Show. CES, which kicks off in Las Vegas on 7 January, has long expected to host Pine Trail's introduction.

The precise date is what Asian hardware manufacturers are saying, DigiTimes reports. Acer, Asus, Lenovo and MSI, to name but four, will all introduce Pine Trail-based netbooks on 11 January.

Some of these products, such as the Asus Eee PC 1005P, are already making appearances, albeit in name only, on company websites.

Pine Trail will initialy comprise the Atom N450 processor and a supporting I/O chip. The platform's graphics will be built into the N450, as will the DDR 2 memory controller. The N450 will be clocked at 1.66GHz and contain 512KB of L2 cache. It will support HyperThreading for dual-core like operation. It'll do 64-bit too.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.