Feeds

Intel to launch Core i5 on 6 September

Minus HyperThreading

The Power of One Brief: Top reasons to choose HP BladeSystem

Roadmap details have emerged revealing Intel's desktop-processor launch plan for the coming months.

September will see the debut of the Core i5 mainstream Nehalem-class processor, along with a pair of new Core i7 parts.

The i5-750 will run at 2.66GHz, though its auto-overclocking ability can push that to 3.2GHz when apps demand it and as long as it doesn't overheat the system. The 750 will support DDR 3 memory running at up to 1333MHz, and it'll contain 8MB of L3 cache as all Nehalems do.

It will support virtualisation, but only as far as aiding virtual machines - Intel's VT-x technology. The new i7s, the 860 and the 870, will also support VT-d, Intel's extension of virtualisation that gives virtual machines direct access to the host's I/O subsystem.

Speaking of the i7s, they'll be stated to at 2.8GHz and 2.93GHz, respectively, though in each case they can overclock to 3.46GHz and 3.60GHz. Both will use HyperThreading to double the logical core count to eight - a feature the Core i5 lacks, it seems.

All three CPUs will have a power envelope extending to 95W. They'll go on sale on 6 September. The i5-750 will cost $196, the i7-860 $284 and the i7-870 $562 - that's per processor when purchased in batches of 1000.

Further Core i5s will debut in Q1 2010. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.