Feeds

Intel to call 'Conroe' and 'Merom' Core 2

Core blimey...

Business security measures using SSL

Intel's upcoming next-generation architecture processors 'Conroe' and 'Merom' will be branded 'Core 2 Duo', online reports allege. The gamer-friendly version of Conroe will ship as the 'Core 2 Extreme'.

The claim, made by Reuters yesterday, was not confirmed with official comment, but the presence of chip logos in other reports suggests the story is accurate and probably represents an officially sanctioned leak.

intel core 2 logos

Whatever, the go-to-market brand rounds off the Conroe naming scheme. Earlier this year, it emerged the chip would follow the numbering system Intel put in place for the original Core processor line.

So, Conroes will appear as 4000 and 6000 series parts - respectively, for the single and dual-core versions of the part. The number will be prefixed by an 'E' to signify a power consumption of 50W or higher.

The mobile Merom chips will ship as the 5000 and 7000 series. Again, the lesser numerical range represents single-core parts, and the chips will be prefixed with U, L or T, depending on their power consumption: T for 25-49W, L for 15-24W and U for under 14W. Typically, U-class chips as Ultra-low Voltage parts, while the Ls are Low-voltage chips.

Conroe will ship in July, Intel said last month, followed by Merom in August. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.