Feeds

Intel CuMine chips pre-announced, pre-announced again

Tricky stuff this Wibbly Wobbly Web...

  • alert
  • submit to reddit

Top three mobile application threats

We knew for some time that Intel would talk about a 800MHz processor on Monday, and for a longer time yet that it had two 750MHz Pentium IIIs and some other Coppermines in its pipeline. But now due to the awesome power of the Web, a customer of another news service (Reuters) seems to have completed the parts of the jigsaw by accidentally posting a story meant for Monday's newspapers, late yesterday. According to the piece, Intel will say it is actually shipping 800MHz Pentium III Coppermines, but only one or two will launch machines, which are unlikely to arrive for another 30 days at least. Dell is likely to announce (shurely pre-announce, Ed) the 800MHz Pentium III, but it will be some time before people will get their mitts on them. Last week we reported that many original equipment manufacturers (OEMs) would only get limited samples of the 800MHz Pentium III on Monday next. The 800MHz Coppermine will cost $850/1000, while the 750MHz parts will cost $800/1000, according to Reuters. It's still pretty hard to get hold of the 733MHz Pentium III Coppermine parts that Intel pre-announced on October 25th. It's clear that Intel has brought forward the date of the 800MHz and 750MHz announcements because it was caught hopping after AMD managed to produce 750MHz Athlon chips faster than expected. And very reliable sources continue to tell us that AMD can roll out 1GHz processors as early as January, if it wants to. For full details of the Monday announcements, see the links to our much earlier stories, below. And if you want to see just how on earth major news organisations operate, check out the release from Reuters (Hoovers) and the embargo details top of the document. Grab it quick before someone realises the cock-up, and pulls it pronto. The Register does its best to obtain information about forward plans of companies by contacts within the industry, who are often willing to talk provided they are not named. If they were named, and because they nearly always sign non-disclosure agreements (NDAs), they would get in big, big trouble. We call these sources, reliable sources, and highly reliable sources... ® See also Intel NDA found on floor Intel will sample 800MHz Pentium IIIs next Monday Intel will cut Coppermine prices earlier than expected Intel to intro 750MHz CuMine January 10th

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.