Intel aims for 100 Thunderbolt devices by year end
- 24 April, 2012 07:08
About 100 peripherals based on the Thunderbolt connector technology will become available by the end of the year, a big jump from a fraction of the devices available today, if Intel meets its target, a company executive said on Monday.
The number of Thunderbolt devices in the market will grow as the connector technology expands from Apple computers to Windows PCs, said Kirk Skaugen, corporate vice president and general manager of Intel's PC Client Group, at an event in San Francisco that was webcast.
"We have 21 Thunderbolt devices in things like storage and displays in the marketplace. We have a hundred targeted by the end of the year, and hundreds of Thunderbolt devices targeted by the middle or end of next year," Skaugen said.
Thunderbolt, which was introduced more than a year ago, is a high-speed connector technology that moves data between computers and peripherals. Thunderbolt was co-developed by Apple and Intel and has data transfer speeds of up to 10Gbps (bits per second), which is faster than USB 3.0. Thunderbolt ports first appeared on Apple's Macintosh computers, but will also appear on new PCs from Lenovo, Asus and Acer later this year.
A number of storage devices from Matrox, Western Digital and Seagate are available with Thunderbolt ports. Apple also offers a 27-inch Thunderbolt display.
Skaugen's remarks came during an event announcing the new third-generation Core processors code-named Ivy Bridge. There will be a higher level of Thunderbolt integration in computers with the new Core processors, Skaugen said. The Z77 motherboard for the new Core processors includes an option of Thunderbolt data transfer lanes, which will help move data faster in and out of PCs.
"You don't want to wait to download your ... video or your high-definition movies. What traditionally had taken over five minutes to take a high-definition movie and put it into your PC, you can now do it in 30 seconds," Skaugen said.
Thunderbolt is being integrated at a higher level on Ivy Bridge motherboards, which reduces the need for a discrete chip to implement the technology, said Dean McCarron, principal analyst at Mercury Research.
"As more ports ship out, there will be more peripherals and that benefits both PCs and Macs," McCarron said.
Intel's Thunderbolt strategy is similar to the company's USB strategy from the mid-1990s, McCarron said. Intel initially shipped out USB ports that weren't being used, but Thunderbolt has gotten off to a better start with stronger device and software support.
The new Ivy Bridge chips also support USB 3.0, which should make the connector technology "ubiquitous," Intel's Skaugen said. Intel has insisted that both USB 3.0 and Thunderbolt connector technologies can coexist, and that laptops will come with both ports. USB 3.0 ports are being added in many new laptops shipping today, while Thunderbolt is still in its infancy.
Intel is also putting a lot of effort into making Thunderbolt faster. The company hopes to ship optical Thunderbolt cables later this year, and is also implementing internal support for the faster PCI-Express 3.0 bus. The current iteration of Thunderbolt comes with copper cables and supports the slower PCI-Express 2.0 bus.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.
Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the steps they can take to take advantage of what it has to offer. Read now.