Feeds
75%

Intel Core 2 Duo T9500 mobile 'Penryn' processor

Rock updates its X770 laptop with the latest mainstream mobile CPU

The Power of One Brief: Top reasons to choose HP BladeSystem

In a straight head-to-head in PCMark05 there was nothing to choose between the two processors, which is much as you'd expect. The Penryn processor has only a tiny advantage in this benchmark as it is a couple of years old and doesn’t use SSE 4. It was a similar story in 3DMark06 which is, of course, a graphics test. The overall score was the same for both processors, although the CPU element was very slightly better for the Penryn.

PCMark05 Results

Intel Core 2 Duo T9500 - PCMark05 Results

Longer bars are better

3DMark06 Results

Intel Core 2 Duo T9500 - 3DMark06 Results

Longer bars are better

The POV-Ray graphics rendering test showed Penryn in a better light as the new core is more efficient than Merom, but it’s unlikely that many people will use their Rock laptop to render pro graphics.

POV-Ray 3.7 Beta 25 Results

Intel Core 2 Duo T9500 - POV-Ray Results

Time in Seconds
Shorter bars are better

These three tests show the highest increase in performance you're going to get in games, which are typically limited more by the GPU than the CPU. So, yes, you'll get a higher framerate with the T9500 than the T7800, but not a significantly higher one.

Application security programs and practises

Next page: Verdict

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.