Feeds

Intel completes 45nm 'Wolfdale', 'Yorkfield' architecture

'Penryn' platform boots Vista, OS X, Linux

Business security measures using SSL

Intel has completed its first 45nm processor, 'Penryn', ensuring the part will successfully run Windows Vista, Mac OS X and Linux, the chip giant said yesterday. The news comes just over a month after Intel began offering engineering samples of the chip.

Penryn will go into production during the second half of this year, with the bulk of its processors being fabbed at 45nm during 2008. Penryn - the name for the 45nm and tweaked Core 2 architecture rather than a CPU itself - will form the basis for the dual-core 'Wolfdale' and the quad-core 'Yorkfield', respectively the successors to today's 65nm Core 2 Duo and Core 2 Quad chips.

Penryn will extend the Core 2 architecture - it's expected to play host to the fourth set of Intel's Streaming SIMD Extensions (SSE), a further 48 instructions designed to improve the processor's ability to handle multimedia applications. Penryn will also introduce two further instructions dubbed by Intel "application-targeted accelerators".

Penryn will be play a key part of 'Montevina', Intel's next-but-one generation of its Centrino mobile platform. Montevina's likely to appear in H1 2008, a year after the next Centrino, 'Santa Rosa'. In the second half of 2008, just as AMD is beginning to roll out its own 45nm CPUs, Intel is scheduled to introduce 'Nehalem', the successor architecture to Core 2.

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.