Feeds

Intel announces Celeron D cull

More 90nm CPUs for the chop

The Power of One Infographic

Intel is to oust its Celeron D 326, 346, 351 and 355 processors, the company has told its customers. Orders for the products become unchangeable on 2 February 2007, and no further orders will be accepted after 6 April 2007, Intel documents reveal.

News of the chip giant's plan to EOL the budget CPUs comes a day after it emerged the company was also planning to cull the Pentium D 820, like the listed Celeron Ds a 90nm part. With similar plans to cut other Celeron D and Pentium D - the former single-core parts, the latter dual-cores, despite both sharing the 'D' - laid out last August, Intel is busily pruning its Pentium and Celeron line-ups to make way for the increasing mainstream-oriented Core 2 Duo family and for future Core-based Pentium processors. ®

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.