Feeds

Intel calls time on some 'Merom' Core 2 Duos

Mobile chips for the chop

Security for virtualized datacentres

Intel has scheduled a series of old-style Core 2 Duo and Celeron M mobile processors for termination, the chip giant's latest message to customers has revealed.

The chips for the chop include the 65nm T5500, T5600, T7200 and T7600. The first two are 2MB L2 parts with 667MHz frontside bus (FSB) support. The T5550 will stick around - it's a T5600 with Virtualisation Technology support.

The T7200 and T7600 are likewise 667MHz FSB parts, but dropping them still leaves Intel with the T7400 as the last remaining 667MHz FSB, 4MB L2 mobile Core 2 Duo. It's probably not long for this world either. Indeed, its boxed version is due to be dropped.

All other T7xxx Core 2 Duos run 800MHz FSBs.

Intel also called time on the 1.33GHz Core 2 Duo LV T7200, and the Celeron M 520 and 530.

Orders for any or all of the discontinued chips can't be cancelled after 25 March. After that date, Intel knows exactly how many of them it needs to make to satisfy demand, and once that's done it can formally kill the chips off. It won't take any orders from 26 May.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.