Feeds

Intel fires up 45nm laptop chip assault

One if by land, 16 if by CES

Gartner critical capabilities for enterprise endpoint backup

Intel has kicked an already down AMD by celebrating the arrival of 16 new chips across its laptop, PC and server lines.

The fresh chip dump marks the arrival of Intel's first laptop chips manufactured with a 45nm process that allows for faster, more energy efficient products. Intel CEO Paul Otellini emphasized the mobile strike at this week's Consumer Electronics Show in Las Vegas where chip-filled gadgets are all the rage. Along with the laptop parts, Intel pushed out a number of new 45nm desktop and server processors that complement parts released in November.

On the laptop front, we find the following chips all with a 800MHz front side bus:

  • Core 2 Extreme X9000 at 2.8GHz with 6MB of L2 cache
  • Core 2 Duo T9500 at 2.6GHz with 6MB of L2 cache
  • Core 2 Duo T9300 at 2.5GHz with 6MB of L2 cache
  • Core 2 Duo T8300 at 2.4GHz with 3MB of L2 cache
  • Core 2 Duo T8100 at 2.1GHz with 3MB of L2 cache

With the desktop chips, customers will see the following with a 1333MHz front side bus:

  • Core 2 Quad Q9550 at 2.83GHz with 12MB of L2 cache
  • Core 2 Quad Q9450 at 2.66GHz with 12MB of L2 cache
  • Core 2 Quad Q9300 at 2.50GHz with 6MB of L2 cache
  • Core 2 Duo E8500 at 3.16GHz with 6MB of L2 cache
  • Core 2 Duo E8400 at 3GHz with 6MB of L2 cache
  • Core 2 Duo E8200 at 2.66GHz with 6MB of L2 cache
  • Core 2 Duo E8190 at 2.66GHz with 6MB of L2 cache

And closing things out on the server side, we find four chips with a 1333MHz front side bus:

  • Quad-core Xeon X3360 at 2.83GHz with 12MB of L2 cache
  • Quad-core Xeon X3350 at 2.66GHz with 12MB of L2 cache
  • Quad-core Xeon X3320 at 2.5GHz with 6MB of L2 cache
  • Dual-core Xeon E3110 at 3GHz with 6MB of L2 cache

Intel loves to perform these types of shock and awe processor displays and loves the grand showings even more when AMD is facing tough times. The folks at AMD - struggling to find four-core parts - no doubt appreciate Intel's enthusiasm. ®

Boost IT visibility and business value

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.