Feeds

Notebook makers cautious about Ultrabooks

Initial production runs limited, moles claim

Security for virtualized datacentres

Notebook makers are playing it cautious with Ultrabooks, it seems, limiting shipments to 50,000 or less as the gauge demand through the remainder of 2011.

So say manufacturer moles cited by DigiTimes. Their caution is explained by their experience with past Intel notebook initiatives, most notably for so-called "CULV" - Consumer Ultra Low Voltage - skinny laptops, which failed to catch the public's eye.

Branding a slimline laptop 'Ultrabook' makes more sense than calling it a 'CULV', but Intel's move to brand the new machines more sensibly than the previous ones doesn't appear to have convinced manufacturers, at least not entirely.

Intel is said to want 40 per cent of 2012's notebook shipments to be taken up by Ultrabooks which, it hopes, will go some way toward reversing the trend toward tablets.

The initial run of Ultrabooks from Acer and Toshiba - you read our first impressions of these two vendors' machines here and here - and from Lenovo and Asus will take place in September with a view to sales starting through retail the following month.

We expect Intel to say a lot more about Ultrabooks at next week's annual Intel Developers Forum, in San Francisco. We'll be there, and we'll let you know what it says. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.