Feeds

Intel prepares for Centrino launch

Pentium-M

  • alert
  • submit to reddit

3 Big data security analytics techniques

ComputerWire logo Intel Corp cut prices across its mobile processor line at the weekend as it paved the way for the launch of its Centrino wireless notebook technology in March.

Intel's 2.2 GHz Pentium 4 M dropped by 38% to $348. Other cuts ranged from 31% to 10%. While Intel's desktop division used the launch of its 3GHz Pentium 4 in November to raise its top bar on pricing after a summer of furious price cutting, the mobile unit is not expected to follow a similar strategy when it launches Centrino, which is expected to take pole position in the vendor's mobile line-up. The mobile market has not suffered from the same kind of downturn in recent years as the desktop sector.

Centrino comprises the Pentium-M CPU, previously code-named Banias, a chipset, and wireless networking silicon. Intel CEO Craig Barrett confirmed last week that Centrino would debut in March.

There had been some confusion over the product's shipping date. At the Intel Developer Forum last September, executives had referred to a first quarter launch. However, Intel's official line had only been that the product would appear in the first half of this year.

Don Macdonald, director of mobile marketing at Intel, said that at launch, the Centrino package would support 802.11b wireless networking. Intel has always said it would be agnostic on wireless networking standards and a dual band version will follow quickly.

Macdonald also played down suggestions that Intel was strong-arming vendors into taking the whole Centrino package. While the company would prefer OEMs to take the whole Centrino offering, he said, they would be free to use just the processor and choose silicon from other suppliers for the other components.

However, this will mean they can only use the Pentium-M branding, not the Centrino branding. This presumably also means they will not be able to fully exploit the marketing push Intel will throw behind Centrino.

The dubbing of Banias as Pentium-M also means that the vendor's mobile Pentium 4 line will lose that suffix. Macdonald confirmed that the notebook version of Intel's mainline desktop processor would in future be known simply as the Mobile Pentium 4.

© ComputerWire

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.