Feeds

Intel: Killer cables may leapfrog USB 3.0

Seeing the Light Peak

Top three mobile application threats

Intel sees its high-speed, long-distance Light Peak optical cabling technology as the next interconnect step after USB 3.0.

"We view this as a logical future successor to USB 3.0," IDG News Service quoted Intel senior fellow Kevin Kahn as telling his audience at the Intel Developer Forum currently underway in Beijing. "In some sense we'd... like to build the last cable you'll ever need."

Light Peak has some significant advantages over USB 3.0. First - you'll pardon the pun - its peak speed is 10Gbps, a hair over twice as fast as that of USB 3.0 - and Intel has said in the past that Light Peak could scale up to 100Gbps in in the not-too-distant future.

Second, thin optical cables carrying Light Peak signals can be up to 100 meters long. And third, Light Peak can carry multiple protocols simultaneously - one of those could even be USB 3.0, which could coexist on a single Light Peak cable along with, for example, SATA, HDMI, DVI, and PCI-E.

As Dana Carvey's Church Lady might have said on Saturday Night Live: "How conveeenient!"

The idea that Light Peak might someday succeed USB 3.0 puts a lot of faith in that slower serial attachment's future. USB 3.0 was first announced at IDF in September 2007, but is only now finding its way into devices. When first announced, by the way, USB 3.0 had an optical cable supplementing its copper cables, but that disappeared from the spec in early 2008.

At IDF Beijing, according to IDG, Kahn's demo included a laptop with a USB port that had been modded to accept a Light Peak signal - but which could also accept a copper-based USB 3.0 cable. Kahn noted that although a USB 3.0 port would be good place for Light Peak to first connect, "you could take the size way, way down" for a Light Peak–specific port, good news for the such devices as handhelds and ultrathins. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.