Sunday September 22, 2019
Home Lead Story Several 10th ...

Several 10th Gen Mobile PC Chips Unveiled by Intel

Intel unveils 8 new 10th Gen mobile PC chips

0
//
10th Gen mobile PC chips
The lineup also includes Intel's first 6-core processor in the U-series, faster CPU frequencies, faster memory interfaces and the industry-redefining connectivity with Intel Wi-Fi 6 (Gig+) and broader scaling of Thunderbolt. Pixabay

Intel on Wednesday unveiled eight additional 10th Gen Intel Core processors for modern laptop computing.

The new mobile PC processors (formerly code-named “Comet Lake”) are tailor-made to deliver increased productivity and performance scaling for demanding workloads while still enabling thin-and-light laptop and 2 in 1 designs with uncompromising battery life, the company said in a statement.

The lineup also includes Intel’s first 6-core processor in the U-series, faster CPU frequencies, faster memory interfaces and the industry-redefining connectivity with Intel Wi-Fi 6 (Gig+) and broader scaling of Thunderbolt.

“From multi-tasking to everyday content creation, the newest additions to the family scale performance for even higher levels of productivity – in addition to offering best-in-class platform connectivity,” said Chris Walker, Intel Corporate Vice President and General Manager of Mobility Client Platforms in the Client Computing Group.

Intel on Wednesday unveiled eight additional 10th Gen Intel Core processors for modern laptop computing.
Intel on Wednesday unveiled eight additional 10th Gen Intel Core processors for modern laptop computing. Pixabay

The new processors leverage the improvements in intra-node optimizations on Intel’s highly-optimized 14nm process technology that enable up to 16 per cent overall performance gains and over 41 per cent better productivity and multitasking on Microsoft Office 365 compared with the previous generation.

Also Read: John Cohen Says Angry Birds Movie 2 Would Be a Fun Spin-off

Earlier this month, Intel launched the first products in 10th Gen Intel Core processor family, which were developed on the 10nm process technology and focus on bringing high-performance artificial intelligence (AI) to the PC at scale.

The new 10th Gen Intel Core processors range from Intel Core i3 to Intel Core i7 and feature up to 6 cores and 12 threads and up to 4.9 GHz max turbo frequency, said the company. (IANS)

Next Story

Microsoft, Google and Intel Join Hands to Create the Confidential Computing Consortium

Microsoft joins Google, Intel for data protection consortium

0
Google, Authentic, Data, Reporting, Algorithm
Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets. Pixabay

Microsoft has joined other industry partners like Google and Intel to create the Confidential Computing Consortium, a new organisation that will be hosted at The Linux Foundation.

The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent.

In this organisation, the industry can come together to collaborate on open source technology and frameworks to support new confidential computing scenarios.

“The Confidential Computing Consortium will be dedicated to defining and accelerating the adoption of confidential computing,” Mark Russinovich, CTO, Microsoft Azure, wrote in a blog post on Wednesday.

Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets without giving access to that data, to gain shared insights and to innovate for the common good.

intel
The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent. Pixabay

As computing moves from on-premises to the public cloud and the edge, protecting data becomes more complex.

Also Read: Is China Heading Towards Another Cultural Revolution?

“There are three types of possible data exposure to protect against. One is data at rest and another data in transit. While there’s always room to improve and innovate, the industry has built technologies and standards to address these scenarios.

“The third possible exposure — or as I like to think of it, the critical ‘third leg of the stool’ — is data in use. Protecting data while in use is called confidential computing,” Russinovich explained. (IANS)