Feeds

Intel EOLs Pentium D 820

Clearing the decks for Core

Choosing a cloud hosting partner with confidence

Intel has formally sounded the death knell for its dual-core Pentium D 820 processor, documents sent by the chip giant to its customers reveal. Come 2 February 2007, orders for the part will no longer be available for cancellation and shipped product can't be sent back.

In August this year, Taiwanese moles signalled Intel's plan to can many of its remaining Pentium D 800- and 900-series chips by the end of 2006, leaving only the 90nm 820, and the 65nm 915 and 925 available to buyers.

Later that month, Intel did indeed announce the demise of many of these CPUs. It went on to cull some more in November along with a raft of Celeron D parts.

The move is in line with Intel's scheme to push its dual-core Core 2 Duo desktop processors further into the mainstream, with its upcoming Core 2 Quad four-core chip set to tackle the higher ground. The company is known to be preparing a set of Celeron- and Pentium-branded single-core chips based on the Core architecture which will be pitched at the low-end of the market. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.