Feeds

Third-gen Ultrabooks must offer USB 3.0, anti-theft tech

Intel getting tough on bloatware too?

7 Elements of Radically Simple OS Migration

"Ultrabook", you'll recall, is an Intel trademark. If you want to use the name in association with your laptop, you need to follow the chip giant's rules. Those edicts have been extended for third-generation machines, which, Intel hopes, will spearhead the platform's entry into the mainstream.

There are three new requirements a notebook must meet to achieve Ultrabook status: it's got to have a "fast file transfer" port, specifically Thunderbolt, Intel's 10Gbps bus, or 5Gbps USB 3.0; security has to be built in; and the machine must be "responsive while active", according to Intel.

The first one is easy to achieve: just build in the appropriate hardware, USB 3.0 with a 7-series chipset. Ditto the second - which covers Intel's own anti-theft and identity protection tech.

Anti-Theft Tech stops the laptop from running if it has been reported stolen. Intel doesn't handle this - you need to subscribe to a third-party to make the technology work. Identity Protection Technology provides chip-level two-factor authentication to confirm to websites you are who you say you are.

Being responsive while active is harder to do. The vendor's best laid plans can be screwed because the user's running a resource-hogging app. Since the manufacturer has no control over what the user does, we hope this is in fact Intel telling Sony, Dell, Toshiba and co. to cut out the bloatware. And about time too.

Optional stuff vendors can integrate into Ultrabooks include Intel's WiDi wireless display technology, touchscreens, and GPS other sensors that the chip giant was talking up back at Intel Developer Forum (IDF) in September 2011.

Manufacturers can support vPro too, if they're pitching Ultrabooks at big business.

Judging by the number of Ultrabook launches currently taking place under NDA until 5 June, expect Intel to go into greater detail about all this on that day. ®

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?