Feeds

Intel's first quad-core mobile aimed at gamers

Core 2 Extreme QX9300 due Q3

Choosing a cloud hosting partner with confidence

Intel has been known to have roadmapped its first quad-core mobile processor for a Q3 release - it demo'd the beast back in October 2007 - but now precise product details have emerged.

The gaming-oriented Core 2 Extreme QX9300 is - surprise, surprise - a 45nm 'Penryn' processor, so it contains plenty of L2 cache: 12MB to be precise, split 50:50 between each pair of cores. The chip will run at 2.53GHz on top of a 1066MHz frontside bus.

According to a report on Chinese-language site HKEPC, the QX9300 will have a power consumption envelope of 45W - 10W more than mainstream mobile Core 2 Duos' 35W TDP.

That means the CPU won't necessarily fit straight into existing notebook designs - the tolerances of a system designed tightly for a 35W processor are unlikely to extend to a 45W chip. Which is one reason why the QX9300 won't be part of Q2's Centrino update, 'Montevina' - or Centrino 2, as we should now start calling it.

It won't come cheap - as Core 2 Extreme CPUs never do. HKEPC's sources reckon the QX9300 alone will cost laptop makers $1038 a pop when they buy it in batches of 1000 chips.

Intelligent flash storage arrays

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.