Wednesday September 18, 2019
Home Lead Story 9th Gen Intel...

9th Gen Intel Core Processors are Coming to Laptops

The 9th Gen Intel Core desktop processor lineup now includes more than 25 products with options ranging from Intel Core i3 to Intel Core i9

0
//
Intel
This Jan. 1, 2018, file photo shows an Intel logo on the box containing an HP desktop computer on sale at a Costco in Pittsburgh. VOA

Intel on Tuesday unveiled its new 9th Gen Intel Core mobile H-series processors designed for gamers and creators who want to push their experience to the next level.

Laptops powered by the 9th Gen Intel Core mobile processors would launch from original equipment manufacturers (OEMs) including Acer, ASUS, Dell, HP, Lenovo and MSI, starting April 23, as they introduce the most compelling laptops for gaming and content creation.

“Our new 9th Gen platform is designed to delight gamers, creators and performance users by giving them more of what they want.

We are bringing desktop-caliber performance with up to 5 Ghz and 8 cores in a range of thinner systems and new level of connectivity with Wi-Fi 6 (Gig+) so users can game or create where they want,” Fredrik Hamberger, General Manager, Premium and Gaming Laptop Segments, Intel, said in a statement.

At the top of the stack is the 9th Gen Intel Core i9-9980HK processor — the first Core i9 mobile chip with up to 5 GHz2 and “Thermal Velocity Boost”, 8 cores and 16 threads, and support for 16MB of Intel Smart Cache.

The full range of processors include Intel Core i5, i7 and the unlocked Intel Core i9-9980HK for higher performance.

Research on AI and Machine Learning is already on at all Indian Institutes of Technologies (IITs). VOA
Intel bets on artificial intelligence, to train 15,000 people in India. VOA

The chipset making giant also made additions to the 9th Gen Intel Core desktop processor family.

The 9th Gen Intel Core desktop processor lineup now includes more than 25 products with options ranging from Intel Core i3 to Intel Core i9.

Also Read- Google Walkout Organisers Face Retaliation at Work

“The family also brings Pentium Gold and Celeron products to market for entry-level computing, giving consumers even more options to find the right desktop to fit their specific need and budgets,” the company said. (IANS)

Next Story

Microsoft, Google and Intel Join Hands to Create the Confidential Computing Consortium

Microsoft joins Google, Intel for data protection consortium

0
Google, Authentic, Data, Reporting, Algorithm
Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets. Pixabay

Microsoft has joined other industry partners like Google and Intel to create the Confidential Computing Consortium, a new organisation that will be hosted at The Linux Foundation.

The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent.

In this organisation, the industry can come together to collaborate on open source technology and frameworks to support new confidential computing scenarios.

“The Confidential Computing Consortium will be dedicated to defining and accelerating the adoption of confidential computing,” Mark Russinovich, CTO, Microsoft Azure, wrote in a blog post on Wednesday.

Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets without giving access to that data, to gain shared insights and to innovate for the common good.

intel
The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent. Pixabay

As computing moves from on-premises to the public cloud and the edge, protecting data becomes more complex.

Also Read: Is China Heading Towards Another Cultural Revolution?

“There are three types of possible data exposure to protect against. One is data at rest and another data in transit. While there’s always room to improve and innovate, the industry has built technologies and standards to address these scenarios.

“The third possible exposure — or as I like to think of it, the critical ‘third leg of the stool’ — is data in use. Protecting data while in use is called confidential computing,” Russinovich explained. (IANS)