Feeds

Intel to evolve 'Bearlake' with 'Eaglelake'

Tweaks rather than radical changes

Security for virtualized datacentres

IDF Even as Intel's 'Bearlake' chipsets - to ship as the P35, G35, X38 and so on - near release, details have emerged of their successors, codenamed 'Eaglelake' and targeting the chip giant's 45nm dual- and quad-core desktop CPUs.

According to leaked presentation slides, the chipsets' specifications are a small step forward from Bearlake. The key enhancements: support for 1,333MHz DDR 3 memory and the ability to host a DisplayPort monitor connection.

DisplayPort is an alternative to the more consumer-oriented HDMI display connection standard. Not that HDMI support is missing from Eaglelake, and neither is DVI. There are no details about integrated graphics, but it's clear there will be versions of Eaglelake that incorporate GPUs - the slide talks about Blu-ray and HD DVD support, suggesting the presence of HD video decoding technology.

PCI Express 2.0 is part of the plan too, for add-in graphics cards, again building on Bearlake's high-end, gaming-centric member, the X38.

Eaglelake family is scheduled to debut next year.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.