IDF2011 Opening Keynote Shares Connected Computing Vision

Intelís CEO focused on the evolution and future of computing that will deliver three essential capabilities Ė engagement, consistency and security.

By John Blyler, Editorial Director

The opening keynote at this yearís Intel Developers Forum (IDF) set the stage for three days of high-tech demonstrations and technically focused presentations by Intel and its partners. The keynote by Intelís CEO, Paul Otellini, highlighted the companyís view of computing over the last 30 years and into the future. ďThe innovation of the next decade will outstrip the innovation of the last three decades,Ē Otellini said. What follows is a summary of Otelliniís key points. The full transcript of his keynote is available from the official IDF 2011 website.

Otellini began by talking about the ongoing transformations in transistor technology, focusing mainly on the growing consumer market for embedded products. All of these transformations have been based on the ever-increasing availability of transistors (see Figure 1). Recent improvements included 3D transistors at the 22-nm node.

In addition, all of these transistors will continue to power very efficient computing platforms. In the future, computing must enable three essential capabilities: engagement, consistency, and security.

As the world becomes more connected, users will expect more lifelike, engaging experiences with their computing devices (see ďIP That Senses and Cares,Ē Otellini punctuated this statement by introducing the companyís Ultrabook, which will be available in time for the holiday season. Future Ultrabooks will run on the companyís new 22-nm processor, codenamed ďIvy Bridge.Ē


At this point, Intelís CEO injected a few words about Haswell. This next-generation microprocessor was developed in Oregon as a successor to the Sandy Bridge architecture. Haswellís low-power design will enable all-day usage without taking a hit to performance.

To demonstrate Intelís dedication to producing the most power-efficient devices known to man, Otellini introduced Sriram, a company employee. Sriram demonstrated a very-low-voltage transistor application. The processor in the demonstration consumed so little power that it was run on a small, postage-stamp-sized solar cell.

As noted in the three essential computing capabilities listed by Otellini, users have come to expect consistency from all of their computing devices. In other words, they expect familiar applications to work across every platform. Art, another Intel spokesperson, talked about a new kind of enterprise collaboration between Intel and Cisco, which resulted in a device known as Cicus. He demonstrated an Atom-based Cicus running with the Android operating system in a phone display application. Using the device, a user could place a phone call, engage in video chat, send e-mail, type an IM, and even go to a web page. The device interacts with other phones, PCs, tablets, and almost any other end-user system.


This theme of different devices interacting with each other was highlighted again in the demonstration by Craig Raymond. After taking Otelliniís picture with his Android phone, Raymond used Intelís Pair and Share (see Figure 2) technology to transmit the picture to an Acer PC. That PC served as the central platform for sharing all types of data. What enabled these connections was the Intel Teleport Extender, which paired the Android phone with the PC.

As computing becomes more pervasive, so will security breaches and malware instructions. Candace Worley, senior VP with McAfee, talked about the challenges facing traditional, software-based security (see Figure 3). She cited the example of a malware known as root kits, which embed themselves into an operating-system (OS) kernel. At this level, the malware becomes almost invisible to todayís antivirus products.

In response, Worley presented what she called ďa fundamentally new approach to security, which combined both hardware and software techniques that monitored system memory and processor activity to detect attacks.Ē McAfeeís Deep Safe Technology Platform works with Intelís VT capability on Core I3, I5, and I7 processors. The demonstration of Deep Safe stopping a security attach embedded in a downloaded YouTube video was very impressive.


Before concluding the keynote, Intelís Otellini announced a development partnership with Google around Android. Andy Rubin, senior VP of mobile at Google, explained that the partnership joins Googleís smartphone design teams with Intel to optimize the silicon and software for Android. In the past, the two companies have had similar partnerships for datacenter designs, Google TV, and the Chrome OS.

In summary, Otellini stated,Ē Computing is undergoing the most remarkable transformation since the invention of the PC.Ē As mentioned, he predicted that the innovations of the next decade would outstrip the innovations of the past three combined. As amazing as that progress may be, however, it is only the beginning of whatís to come.



John Blyler can be reached at: