Feeds

Intel forks 'Merom' mobile CPU

One series with 2MB L2, the other with 4MB

Security for virtualized datacentres

Intel's 'Merom' dual-core mobile chip will ship in two forms, one with 2MB of L2 cache, the other with 4MB. Unlike 'Conroe', however, the smaller-cache parts will get their own model number sequence, it has emerged.

Merom will ship in August under the Core 2 Duo brand. According to a DailyTech report, the 2MB version will ship as the 1.83GHz T5600. Three 4MB parts are set to ship next quarter: the 2GHz T7200, the 2.16GHz T7400 and the 2.33GHz T7600. All four processors support a 667MHz frontside bus.

Prices for the five mobile CPUs are quoted at $240, $294, $423 and $637, running up from the T5600 to the T7600. Come Q4, and Intel will ship the 1.66GHz 5500 at £209.

That's pretty much it until Q2 2007 when 'Santa Rosa', Intel's next incarnation of Centrino, ships and the T7700 makes its debut. So will the T7300 and the T7000, along with a variant of the T5500, the T5500P. The Santa Rosa parts will support an 800MHz frontside bus.

Q1 2007 is set to see the arrival of low-voltage Core 2 Duo parts: the L7200 and the L7400, both joined the following quarter by the ultra-low voltage U7500, and the Santa Rosa-ready L7500 and L7300. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.