Feeds

Pentium III/mobile at 0.18 micron to arrive fall

But Geyserville won't come with it

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Intel Developer Forum Notebook versions of the Pentium III/mobile manufactured using a 0.18 micron process technology will arrive this autumn, Intel said today. Frank Spindler, VP of Intel US mobile division, said that the chip will be released at speeds of up to 500MHz. But, he said, Geyserville would not be incorporated into PIII/mobile parts until processor speeds matched those of desktop chips. He admitted that the Pentium III/mobile had arrived later than expected by saying: "We did not hit our most aggressive schedule." Spindler said the form factor for the mobile Pentium III was likely to be smaller for the equivalent Pentium II/mobile part. The PIII/mobile will arrive fall, which we suppose is around October, but Spindler would not be drawn on a specific date, or on pricing. He said that Intel was considering future notebook chips which would allow its partners to configure notebook machines, but thought the prospects of end users being able to do so was some time away. Geyserville versions are likely to appear in Q1 of next year at speeds of 600MHz and higher, said Spindler. ® Full IDF Summer 99 coverage

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.