Feeds

Intel 'Santa Rosa' blooms into Centrino Duo, Pro

Next-gen notebook platform debuts

High performance access to file storage

Intel has launched 'Santa Rosa', the latest generation of its Centrino laptop platform. This time round, the brand is being segmented: Centrino Pro for big business, Centrino Duo for the rest of us.

Intel mobile Core 2 Duo processor
Intel mobile Core 2 Duo processor

Duo is the baseline. It's based around revised versions of the mobile Core 2 Duo processors Intel launched in autumn 2006, along with laptop-friendly incarnations of the 965 desktop chipset brought to market almost a year ago. The key chipset, the 965GM, brings Intel's latest integrated graphics core, the GMA X3000, to Centrino for a smoother Windows Vista experience and better-looking movie playback.

intel Wireless Wi-Fi Link 4965AGN 'kedron'
Intel Wireless Wi-Fi Link 4965AGN

Intel's next-gen 802.11n capable Wi-Fi add-in card is part of the package too, but Turbo Memory, a Flash cache that sits between a notebook's hard drive and the chipset, is optional. Intel said it not only halves application load times but reduces the wake-up-from-sleep time by a similar percentage. It recently showed a Google Earth/Adobe Photoshop Elements workflow run in almost half the time (68s) on a Turbo Memory-equipped laptop than on one without the Flash cache (120s).

Intel Turbo Memory - aka 'Robson'
Intel Turbo Memory

Centrino Pro adds Active Management 2.5 facilities that Intel hopes will appeal to corporate technology managers, who'll be able to troubleshoot laptop fleets remotely over wires or wireless. The Pro version also activates Intel's Virtualisation and Trusted Execution Technologies.

CPU prices range from $209 for the 1.8GHz T7100 processor with 2MB of cache to $530 for the 2.6GHz, 4MB T7700. The 965 chipset costs $39 or $43, depending on configuration. The Wireless WiFi Link 4965AGN costs $29, while Turbo Memory ranges from $13 to $21, respectively, for the 512MB and 1GB versions - so check vendor spec sheets to make sure which of the two you're getting.

Intel also announced a pair of low-voltage Core 2 Duos, as expected, clocked at 1.4GHz and 1.2GHz, both operating over an 800MHz frontside bus, as do the four new regular-voltage Core 2 Duos. The LV parts contain 4MB of L2 cache.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.