1. Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel Announces Second-Generation Core vPro Family of Processors

Discussion in 'News' started by btarunr, Mar 8, 2011.

  1. btarunr

    btarunr Editor & Senior Moderator Staff Member

    Joined:
    Oct 9, 2007
    Messages:
    28,708 (11.16/day)
    Thanks Received:
    13,669
    Location:
    Hyderabad, India
    Bringing industry leading security and manageability, and better, more flexible performance to business computing, Intel Corporation today unveiled its newest family of business processors. The new 2nd generation Intel Core vPro processor family features the performance and capabilities of Intel's new microarchitecture, enhancements to Intel vPro technology and new security features, including a 3G "poison pill" option to help protect a PC's data.

    Computer makers around the world, including Dell, Fujitsu, HP and Lenovo, are introducing new laptop, convertible-tablet, desktop and all-in-one PCs for businesses based on the new Intel Core vPro processors.

    [​IMG] [​IMG] [​IMG] [​IMG]

    "Businesses face numerous challenges today, but also opportunities in the wealth of new technologies that are helping workers be more productive, businesses to be more creative and IT to be more innovative," said Rick Echevarria, vice president, Intel Architecture Group, and general manager, Business Client Platform Division. "Providing the right combination of technologies at the right time, the new Intel Core vPro processor family continues Intel's advancement in performance, security and management. Possibly more critical, it readies businesses for major changes to come in such areas as desktop virtualization, cloud computing and the complementary relationship between PCs and the growing variety of other computing devices."

    Performance Matters
    To take full advantage of emerging innovation, the new Core vPro processors offer the increased performance of Intel's new microarchitecture, enhanced Intel Turbo Boost Technology 2.0 and new Intel Advanced Vector Extensions (AVX). Compared to a 3-year-old Intel Core 2 Duo processor, a new Intel Core vPro i5 processor speeds up business applications by 60 percent, multitasking by 100 percent and data encryption by 300 percent.

    "This kind performance equates to enormous promise for the PC, for example, as the 'hub' for the varied combination of tablets, smart phones, netbooks and operating systems filling our pockets and briefcases," said Echevarria. "The new Core vPro processor family has the capacity to offload tasks or even better share them to get the most from companion devices. With such performance, the PC could be a service provider, coordinating encryption, virus scanning, near transparent syncs and remote control."

    Protecting Data on Missing Laptops
    To provide stronger defense against the problem of laptop theft and data loss, Intel today introduced Intel Anti-Theft Technology Ver. 3.0 (AT 3.0), included on all 2nd generation Intel Core and Core vPro processors.

    Previous versions of Intel Anti-Theft Technology enabled authorized IT or service personnel to send a coded "poison pill" over the Internet to completely disable a lost or stolen computer and help prevent access to its encrypted data and deter theft. New Intel AT 3.0 enables the poison pill to be sent as an encrypted, authenticated SMS message by an authorized administrator over a 3G cellular network as well within moments after a missing laptop is turned on. When recovered, the PC can be similarly re-activated with another message. Its new Locator Beacon capability gives authorities the ability to pinpoint a missing laptop using GPS technology on select 3G modems.

    Finally, the new Intel AT 3.0 standby protection feature helps protect encrypted PCs that go missing in the vulnerable standby state (S3). When awakened, the new standby protection feature can change normal procedure to require an encryption login, which is much more secure than the usual username and password.

    Drying Up the Ol' Phishing Hole
    New Intel Identity Protection Technology (IPT), which is integrated into select 2nd generation Intel Core and Core vPro processors, helps stymie phishing attacks aimed at gaining unlawful access to corporate, e-banking, e-commerce and other secure sites. IPT supplements normal password procedures by generating a new six-digit numerical password every 30 seconds to help ensure only authorized access.

    Symantec and VASCO are the first to use this technology to provide easy-to-use, secure communications between PCs, and businesses and e-commerce sites.

    Making IT Simpler
    The 2nd generation Intel Core vPro processors also help make IT simpler with the new Host-Based Configuration feature that completely automates the process of setting up the vPro functions on new computers. Now even thousands of computers can be configured simultaneously in a couple of minutes.

    Intel's Keyboard-Video-Mouse (KVM) Remote Control feature now enables a remote technician to see the worker's screen presentation in higher resolutions to accommodate HD video and screen sizes.

    Visually Smart Performance for the New Office
    When a workload requires extra performance, the enhanced Intel Turbo Boost Technology 2.0 steps up processor speeds beyond their rated frequency by analyzing temperature and power consumption. New Intel AVX improves the performance of computing-intensive applications, such as image manipulation, audio/video processing, scientific simulations, financial analytics, and 3-D modeling and analysis.

    To meet the growing dominance of video as the potential heir to traditional white papers, product briefs and slide presentations, the new processor family integrates Intel HD Graphics and advanced media processing into its entire line, eliminating the need for separate graphical processing units for performance-intensive graphical applications.

    Also the Intel Quick Sync Video feature doubles the speed of creating DVDs or Blu-ray discs, editing and converting video files into other formats over the preceding generation of Intel Core vPro processors.

    Intel vPro Technology Expands Into New Realms
    The soon-to-be-released Intel Xeon processor E3-1200 product family will bring all of the advances of Intel's new microarchitecture to entry-level workstations. It is the first entry-level workstation platform to integrate professional-level graphics onto the processor, enabling visual and 3-D graphics capabilities previously only available with separate graphics cards. Intel is also extending support for Intel vPro technology to these workstations.

    In addition to workstations and servers, Intel vPro Technology also can be found in a variety of innovative applications beyond PCs, such as retail, digital signage and banking devices. With features such as Intel Active Management Technology 7.0 built-in, 2nd generation Intel Core vPro i5 and i7, and Intel Xeon E3 processors, embedded customers are able to manage multiple devices from a single host station, which enables them to troubleshoot problems real-time and effectively lower costs for manual checks.
     
  2. Praetorian

    Praetorian New Member

    Joined:
    Mar 7, 2011
    Messages:
    63 (0.05/day)
    Thanks Received:
    1
    Location:
    Apulensis Cumidava
    I love that "pill"
     
  3. Mussels

    Mussels Moderprator Staff Member

    Joined:
    Oct 6, 2004
    Messages:
    42,377 (11.55/day)
    Thanks Received:
    9,682
    take the blue pill, and you wake up like nothing happened.
    take the red pill, and you find out your laptop commited suicide.


    of course the poison pill is entirely worthless, if you just disable the 3G/replace the sim card in it.
     
  4. newfellow New Member

    Joined:
    Aug 28, 2009
    Messages:
    314 (0.17/day)
    Thanks Received:
    17
    If the red pill is the answer for our security it will be the answer to vulnerability.
     
  5. laszlo

    laszlo

    Joined:
    Jan 11, 2005
    Messages:
    891 (0.25/day)
    Thanks Received:
    105
    Location:
    66 feet from the ground
    on 3g i agree but why don't they send through internet? in my point of view it'll be easy to implement a not visible communication link between cpu&intel so when the customer inform intel that laptop xxxx is lost intel just send the code which sure will reach the laptop at 1st connection;maybe the data will be already stolen (this can happen also with 3g if sim already out) but it will become unusable al least compared to 3g where u can use it later
     
  6. Mussels

    Mussels Moderprator Staff Member

    Joined:
    Oct 6, 2004
    Messages:
    42,377 (11.55/day)
    Thanks Received:
    9,682
    because they cant ID the laptop through the net.

    they said its sent via SMS message to the 3G module on the laptop.


    You disable the 3G card, format the OS (for any killswitch software installed there) and you're good to go. its a worthless tech.
     
  7. laszlo

    laszlo

    Joined:
    Jan 11, 2005
    Messages:
    891 (0.25/day)
    Thanks Received:
    105
    Location:
    66 feet from the ground
    every cpu has a unique ID(production no.) so it can be done i think
     
  8. Mussels

    Mussels Moderprator Staff Member

    Joined:
    Oct 6, 2004
    Messages:
    42,377 (11.55/day)
    Thanks Received:
    9,682
    yes but software is required to detect that, and it wont be part of a regular windows install. hell, even if it was, you could just use a firewall/modify the hosts file and block the address.
     
  9. pr0n Inspector

    pr0n Inspector

    Joined:
    Dec 8, 2008
    Messages:
    1,334 (0.62/day)
    Thanks Received:
    164
  10. Mussels

    Mussels Moderprator Staff Member

    Joined:
    Oct 6, 2004
    Messages:
    42,377 (11.55/day)
    Thanks Received:
    9,682
    it has to be possible to swap the SIM card.


    would you buy a laptop, if you couldnt change the 3G provider at a later date?
     
  11. pr0n Inspector

    pr0n Inspector

    Joined:
    Dec 8, 2008
    Messages:
    1,334 (0.62/day)
    Thanks Received:
    164
    "Possible" does not have to be easy. They are not trying to stop CIA or KGB agents with this.

    It's also only one of the ways that triggers the so-called "poison pill".
     
  12. Frick

    Frick Fishfaced Nincompoop

    Joined:
    Feb 27, 2006
    Messages:
    10,783 (3.41/day)
    Thanks Received:
    2,343
    I know people who don't even know what a sim card is, so my answer would be yes, there are people doing that.
     

Currently Active Users Viewing This Thread: 1 (0 members and 1 guest)

Share This Page