Feeds

Third-gen Ultrabooks must offer USB 3.0, anti-theft tech

Intel getting tough on bloatware too?

Security for virtualized datacentres

"Ultrabook", you'll recall, is an Intel trademark. If you want to use the name in association with your laptop, you need to follow the chip giant's rules. Those edicts have been extended for third-generation machines, which, Intel hopes, will spearhead the platform's entry into the mainstream.

There are three new requirements a notebook must meet to achieve Ultrabook status: it's got to have a "fast file transfer" port, specifically Thunderbolt, Intel's 10Gbps bus, or 5Gbps USB 3.0; security has to be built in; and the machine must be "responsive while active", according to Intel.

The first one is easy to achieve: just build in the appropriate hardware, USB 3.0 with a 7-series chipset. Ditto the second - which covers Intel's own anti-theft and identity protection tech.

Anti-Theft Tech stops the laptop from running if it has been reported stolen. Intel doesn't handle this - you need to subscribe to a third-party to make the technology work. Identity Protection Technology provides chip-level two-factor authentication to confirm to websites you are who you say you are.

Being responsive while active is harder to do. The vendor's best laid plans can be screwed because the user's running a resource-hogging app. Since the manufacturer has no control over what the user does, we hope this is in fact Intel telling Sony, Dell, Toshiba and co. to cut out the bloatware. And about time too.

Optional stuff vendors can integrate into Ultrabooks include Intel's WiDi wireless display technology, touchscreens, and GPS other sensors that the chip giant was talking up back at Intel Developer Forum (IDF) in September 2011.

Manufacturers can support vPro too, if they're pitching Ultrabooks at big business.

Judging by the number of Ultrabook launches currently taking place under NDA until 5 June, expect Intel to go into greater detail about all this on that day. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.