Feeds

Intel roadmaps laptop-friendly 45nm CPUs

LV, ULV versions coming too

Top three mobile application threats

Intel's 45nm 'Penryn' processor architecture gets ever closer, and as we near the release of the first CPUs based upon it, chip-by-chip details are beginning to leak out. The latest: Intel's plans for mobile processors.

Four laptop-oriented Core 2 Duos are coming in Q1 2008, all operating on an 800MHz frontside bus and delivering 2.1GHz, 2.4GHz, 2.5GHz and 2.6GHz clock speeds, according to company roadmaps seen by DailyTech. The four chips' model numbers are not yet known, but we can say the top two parts incorporate 6MB of L2 cache, while the others have just 3MB.

The report also mentions a new, 2.8GHz Core 2 Extreme mobile, again with 6MB of L2 and running on an 800MHz FSB. This chip's model number isn't known either, but it clearly follows on from this week's launch of the 65nm Core 2 Extreme X7800.

However, past roadmaps have revealed a 65nm X7900, almost certainly set to clock at 2.8GHz, in Q4 this year. With the X7900 containing 4MB of L2, the Penryn version's extra 2MB of cache will give it an appropriately higher model number.

intel's 45nm penryn dual-core die
Intel's 45nm 'Penryn'

Intel has already said 45nm CPUs will be incorporated into its next major Centrino release, codenamed 'Montevina' and officially due H1 2008, but almost certainly actually arriving in the second quarter. Montevina, the successor to May's 'Santa Rosa' release, also features the 'Cantiga' chipset, with an updated LAN chip, 'Boaz', and 'Echo Peak' and 'Shiloh' providing wireless connectivity. Shiloh is an update to Intel's already available 802.11n Wi-Fi module - the Wireless Wi-Fi Link 4965AGN - but Echo Park brings WiMAX to the table, integrating it on the same Mini PCI card as the Wi-Fi radio.

Intel will also offer 'Dana Point', a WiMAX-only card. Its Turbo Memory technology - aka 'Robson' - will also be tweaked for Montevina.

The chip giant will also pitch Penryn at small form-factor PCs through a line of low-voltage (LV) and ultra-low voltage (ULV) versions.

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.