PC Mag: ‘Top Ten’ list of things to know about Intel’s new Core 2 Duo processors

Joel Santo Domingo has compiled a “Top Ten” list of things to know about Intel’s new Core 2 Duo processors for PC Magazine:

1. Core 2 Duo and Core 2 Extreme will be the fastest processors available
2. Core 2 Duo overtakes the Pentium as the name in processors
3. Intel has created one unified Core architecture for all categories (desktop, notebooks, workstation/servers)
4. All three variations (Conroe, Merom, and Woodcrest) are more efficient
5. Due to better performance per watt, systems will be quieter
6. Core 2 Duo can currently drop right into some current Pentium D/EE (LGA775) motherboards
7. With Core 2 Duo’s virtualization technology, one physical PC can be several virtual systems
8. All Core 2 Duo systems will have TPM (Trusted Platform Module)
9. Processors code names came from towns and locales nearby to where they were designed: Conroe (Texas), Woodcrest (California), and Merom (ancient lake in Israel).
10. Coming to a personal computer near you in late July/early August.

More detail in the full article here.

[UPDATE: 10:14am EDT: Changed wording of #9 due to sporadic ridicule below.]

Advertisements:
Introducing the super-fast, blogging, podcasting, do-everything-out-of-the-box MacBook.  Starting at just $1099.
Get the new iMac with Intel Core Duo for as low as $31 A MONTH with Free shipping!
Get the MacBook Pro with Intel Core Duo for as low as $47 A MONTH with Free Shipping!
Apple’s new Mac mini. Intel Core, up to 4 times faster. Starting at just $599. Free shipping.
iPod. 15,000 songs. 25,000 photos. 150 hours of video. The new iPod. 30GB and 60GB models start at just $299. Free shipping.
Connect iPod to your television set with the iPod AV Cable. Just $19.
iPod Radio Remote. Listen to FM radio on your iPod and control everything with a convenient wired remote. Just $49.

Related articles:
RUMOR: Apple to unveil ‘Mac Pro’ with new enclosure design, Intel Core 2 Duo at WWDC next month – July 03, 2006
Intel officially releases Xeon ‘Woodcrest’ processor – June 27, 2006
Patent hints Apple may incorporate Intel’s ‘unified desktop interface’ in Mac OS X Leopard – June 22, 2006
Intel’s next-gen Conroe, Merom processors to be dubbed ‘Core 2 Duo’ – May 07, 2006
Intel gets aggressive on next-gen rollout schedules: Merom MacBook Pros, Conroe Power Macs, more – May 03, 2006
Intel showcases next-gen multi-core ‘Conroe’ processors, may turn up in future Apple Power Macs – March 07, 2006

36 Comments

  1. Carlo, you said:
    “if it was me, i couldn’t buy one now, knowing that in as little as 4 or so weeks new macbook pros could feature faster, more efficient COOLER chips. itd be worth it for the temp drop. hold our brother hold out.

    its not definant on when theyll arrive but it shouldnt be that long.”

    This is ALWAYS the case. Go ahead and wait ‘4 or so weeks’ and at that point you will be able to say the same thing. The computer industry is always changing, and always improving. Get a computer when you need it, thats all.

  2. Maybe we should look into the possible repercussions of TPM before we chop Static Mesh off at the knees. If we all just trust that TPM must be great simply because it’s part of the next generation of processors, then we may all be in for a future where we leave our rights on the table for someone else to decide. Hasn’t anyone been paying attention to the attack on personal rights (cell phone records being obtained by fed agencies), how broadband providers are positioning themselves as internet gatekeepers? Or, at even the least intrusive level, how the movie industry has been reluctant to move forward with HD-DVD or BluRay media releases? Ready for a revival of the DIVX style system for YOUR OWN High Definition movie collection? I’m not.

    In fact, I wouldn’t even want to write this response if I had that chip in my system.

  3. Anim8r said:
    Online crazy person and closeted Mac hater Static Mesh’s head explodes from whacked out conspiracy theories.

    SM is a bit … extreme … in his opinions at times, and may hate Macs as well. Maybe he hates ALL technology. But his warnings have been pretty much to the point – and we can only trust this “Trusted Platform” thing as far as we trust whoever configures it. Microsoft has historically taken the “invasive” path while Apple has traditionally avoided such vile behavior.

    Static Mesh said:
    Remember how Cisco was discovered to have backdoors into their routers so the NSA can tap the internet backbone?</i>
    and:
    Hey, read the news lately how dashboardadvisory daemon in Mac OS X contacts Apple every eight hours right?

    Both are true. Just not “the whole truth”. The “backdoor” mentioned certainly gives various entities – Cisco, the various agencies within the NSA, the Republican Party – access to all information passing <u>through</u> the Internet … without even a warrant! The information so gathered may not be admissible in court, but can be used to the disadvantage of anyone who disagrees with whoever is filtering the information. And there’s no hiding! You set up an anonymous webmail address? They can track the reading browser back to the nearest router!

    As for Apple ‘calling home’, if you believe them then you must understand the limited nature of those calls. And the fact they benefit YOU. I’m a bit annoyed that they posted no warnings, provided no options, but all they are doing is insuring your Widgets are up to date. The problem is, they COULD be doing/have done so much more. They didn’t, but someone else might have. Say, someone from paranoid Microsoft.

    So, SM is also a bit paranoid. And believes the worst about people. With MS offering the bulk of the software out there and proving by bad example that people ARE out to get us, I don’t see how you can hold a little paranoia against him. When you know they are out to get you, a little paranoia is a Good Thing and none at all is the choice of a fool.

  4. If I didn’t complain, would you even know your rights to privacy was slipping through your fingers?

    What’s the use spending close to $3000 for a machine that you rent?

    What’s the use spending close to $300,000 for a house you supposely own only to find out people you don’t even know come in and out uninvited?

    Right now on EFI based Mactels, a EFI driver could be checking the contents of people’s hard drive and sending it out over the internet without nobody even knowing.

    I’ll tell you a secret. I’ve tightened up Little Snitch from the default rules, basically deleting all rules and starting over. Guess fscking what?

    iTunes contacts pegasus.lunarpages.com on TCP port 80 (http)

    Who the fsck is this? I can’t seem to find out, it’s just a hosting service, but for whom? The RIAA?

    Why does iTunes need to contact anybody else besides Apple?

  5. Funny they don’t mention SSE4, which is finally a decent 128-bit vector processor built into the Core 2 Duo. Apple fans who knew about Velocity Engine should be happy.

  6. SM has some valid points – even if he is insane. Apple isn’t much concerned about locking up the OS, in fact one could argue that at some degree, it has no value to them other than to serve as the interface for their underlying media platform. What they are concerned about locking up is DRM. As more and more of their revenue moves to iTunes and content, they need to get the RIAA, MPAA and all of the players completely comfortable that their systems will eliminate any chance of digital piracy. And they can now use this technology to show the content providers that not only can they better prevent the piracy, but they can easily trace it to the source and take action. No big deal – right? EVERY file on your Mac is going to get tagged with snipets of code that will tie it back to your computer. The computer that you registered with Apple. They have your information should they need it. The question isn’t whether this is good or bad, that decision was already made when Apple jumped over to Intel. The question is can you live with that? Most of you guys on here already drank the Kool-Aid and raved about how much better Intel was than PowerPC months ago without even considering some of these points. Good that we’re at least talking about it for once.

  7. TeamZissou: let’s say I sell my macbook to somebody, and they then take it with them to Mexico, or Pakistan, or Singapore, and connect to the net through a free wifi setup at a cafe – how does Trusted Computing keep track of who it is? That would be really interesting to know. Seems if I had originally registered the macbook through Apple, all they would be able to say is it was still me, when I had passed on the laptop long ago. This could get confusing to them at best, I’d think. Lots of data doesn’t necessarily mean accurate data.

  8. I long ago used Little Snitch to block iTunes. I don’t care that I can’t listen to blathering idiots on a “news-talk” station 2,000 miles away or hear music I can listen to on a radio.

    Now, though, I wonder whether Little Snitch should keep an eye on itself. (The best place to hide a spy is in the spy agency.)

    Maybe I could duplicate it and have each watch the other.

  9. The problem with even having this argument with Static Mesh is simply that you can’t prove a negative.

    You can’t PROVE that Apple isn’t going to lock down the OS, your files, your media content. You can’t prove that the NSA won’t be watching you surf the internet. You can’t prove that it isn’t all a big conspiracy to defraud you of your rights.

    The bottom line is, as always, common sense. As someone above mentioned – more data doesn’t mean good data. Squeeze the user too hard and eventually there is an outcry and public humiliation for the company (Sony rootkit anyone?) responsible.

    And if it gets really bad, there will be lawsuits of the class-action kind. I think class action lawyers ought to be the biggest proponents of Trusted Computing for this reason. Ensures future growth in lawsuits. ” width=”19″ height=”19″ alt=”smile” style=”border:0;” />

    Seriously, there is more data available about the world than ever. Instantly accessible. Your internet surfing, your every purchase with plastic, your every phone call, every UPS, FedEx, and DHL package sent, every major intersection you drive through has a camera, plus every ATM, fuel station, Post Office, bank, liquor store, Best Buy, Target.

    If you think about it, you are being tracked nearly every minute that you do any interaction, whether it’s through video, electronic purchase records, etc.

    The only real question is – who would actually take the time to sort through this haystick to find the needle – you – in it? There would have to be a good reason to be worth the trouble. And it would be a helluva lot of trouble to assimilate all the potential sources.

    THIS is security through obscurity.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.