Feeds

Intel takes axe to P4, Celeron prices

Desktop and mobile

  • alert
  • submit to reddit

Intel yesterday cut not only its desktop Pentium 4 prices yesterday, but trimmed what it charges for the mobile version.

Desktop prices fell by up to 35 per cent as anticipated. Mobile Pentium 4 prices were reduced by similar amounts.

The chip giant also tweaked mid-range Celeron prices - and those of top-of-the-line Mobile Celerons, too - but by a lower margin: no more than 16 per cent.

Intel Pentium 4
Processor Prev. Price New Price Change
3.2GHz, 800MHz FSB $637 $417 -35%
3GHz, 800MHz FSB $417 $278 -33%
3.06GHz, 533MHz FSB $401 $262 -35%
2.8GHz, 800MHz FSB $278 $218 -22%
2.8GHz, 533MHz FSB $262 $193 -26%
2.6GHz, 800MHz FSB $218 $178 -18%
2.66GHz, 533MHz FSB $193 $163 -16%
2.53GHz, 533MHz FSB $193 $163 -16%
Intel Mobile Pentium 4
Processor Prev. Price New Price Change
3.2GHz, HyperThreading $653 $433 -34%
3.06GHz, HT $433 $294 -32%
3.06GHz $417 $278 -33%
2.8GHz, HT $294 $234 -20%
2.8GHz $278 $218 -22%
2.66GHz, HT $234 $202 -14%
2.66GHz $281 $186 -15%
Intel Celeron
Processor Prev. Price New Price Change
2.5GHz $83 $79 -5%
2.4GHz $79 $69 -13%
2.3GHz $79 $69 -13%
Intel Mobile Celeron
Processor Prev. Price New Price Change
2.4GHz $149 $134 -10%
2.2GHz $134 $112 -16%
2GHz $112 $96 -14%

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.