(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intel’s Confusing Name Change Shows Why Researching Products is Important

Intel’s Confusing Name Change Shows Why Researching Products is Important

Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration amongst the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve their Skylake processor from the previous year.

The processor has been named Kaby Lake, which is optimized for 4K video handling and editing and can improve battery life. However, it’s not these changes that have resulted in confusion; rather, it’s something as simple as a name change that has IT professionals up in arms. Prior to Intel’s most recent release, there were two lines of processors which were given the titles of Core i and Core M. The 'i' line of processors is the stronger of the two, while the M processors were reserved almost exclusively for tablets. The confusion came when the Core M processors were renamed to represent the 'i' series.

Keep in mind that there has been no change in the capabilities of the processors. The change is in name only. The difference can only be seen in the product numbers. What this means is that when someone is researching components for a workstation, they may accidentally purchase the wrong i7 processor (a significantly less powerful one). The only way they can really determine the change is by digging into the product’s specifications--which, if you’re not technically inclined, won’t mean anything.

This leads to our next point; while the average consumer may not notice a difference in performance, business owners want technology that meets the specific needs of their organization. Granted, this is assuming that a business owner has the time and resources available to research the available solutions. The problem here is that the average business owner probably doesn’t have this time available to them, and it takes much more than identifying the proper product number to make educated decisions about your IT infrastructure.

If your business doesn’t want to waste time sifting through product numbers and specifications, Carceron is happy to help. Our skilled technicians can help your organization procure only the best technical assets that are designed to meet your business’s specifications. To learn more, reach out to us at (770) 424-3393.


No comments yet
Already Registered? Login Here
Wednesday, 26 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Tip of the Week Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Business Computing Mobile Office Business Email Google Malware Hosted Solutions IT Services Quick Tips Social Media IT Support Virtualization Mobile Devices Upgrade Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Windows Network WiFi Server VoIP Innovation Miscellaneous Computer User Tips Windows 10 Mobile Device Management Mobile Computing Vendor Management Communication Efficiency Smartphone Operating System Unified Threat Management Remote Computing BYOD The Internet of Things Marketing Apps Holiday History Ransomware Bring Your Own Device Android Health IT Consultant Facebook Analytics Wireless Technology Apple Alert Windows 8 Going Green Printer Hard Drives Lithium-ion Battery Tech Support Big data Office Outlook Network Security Content Filtering Information Technology Saving Time Hiring/Firing Data Management Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Firewall Spam Collaboration Proactive IT Smart Phones Computers Best Practice Automation Maintenance Tutorials App Antivirus Browser Search Computer Repair Humor Save Time Bandwidth Phone System Money Two-factor Authentication Administration Wireless Running Cable Fax Server Website Excel PowerPoint Hacking Current Events Help Desk User Mobile Device Managed IT services Sports Intranet Virus User Error Business Intelligence Education iPhone Avoiding Downtime Hacker Document Management Router Budget Internet of Things Black Market Documents Compliance Pain Points Statistics Printer Server Streaming Media Business Growth Retail Encryption Gaming Console Net Neutrality Networking BDR Managed IT Virtual Desktop Network Congestion Social Networking Digital Payment Customer Relationship Management Experience End of Support Heating/Cooling Artificial Intelligence Bluetooth Computer Accessories Twitter Law Enforcement Laptop Outsourced IT Comparison Legal Augmented Reality Office 365 Data storage Text Messaging Company Culture VPN Safety Social Flexibility Cost Management Downtime Office Tips Customer Service Government USB Computing Recovery Chrome Programming Cybercrime Password Inbound Marketing Hosted Solution Cortana SaaS IBM Presentation Risk Management Comanaged IT Processors communications Telephone Systems Thin Client Read Human Resources Deep Learning Settings Keyboard LiFi Value organize Lifestyle Banking PDF Leadership Monitors Language Shortcut Visible Light Communication Adroid Webinar Business Metrics Google Wallet Troubleshooting Displays Advertising File Sharing Chromebook Domains Drones Business Owner Touchscreen eWaste YouTube GPS Work/Life Balance Co-Managed IT Microserver Specifications Environment 3D LinkedIn Writing Competition Unified Communications Wearable Technology Analytic Turn Key Mouse Download Entertainment Staffing switches Riske Management Operating Systerm Paperless Office Application Permissions Digital Signature Microchip Google Docs Disaster Regulations Identity Theft Solid State Drive Display Ebay Adminstration Hacks DDoS Securty Harddrive IT consulting Efeciency Pirating Information Virtual Reality Society Content Management Tablet Recycling Notifications Micrsooft Word Windows XP IT service Computing Infrastructure Public Speaking HIPAA Archive Skype Update Robot Electronic Payment CIO Entrepreneur Teamwork Memory Video Surveillance Wi-Fi Music Online currency Trending Upgrades Flash Best Available Point of Sale Debate IP Address Storage External Harddrive

Mobile? Grab this Article!


Recent Comments

Ryder Frith Milla Minchin Use Your Smartphone Incorrectly and Risk Going Temporarily Blind
24 October 2016
Wonderful post and you share excellent content in this post i am happy to comment on this Online Fa...

Blog Archive