Feeds

Senior Intel executive confirms 370-pin socket by year end

Socket design will displace Slot One for Celerons

  • alert
  • submit to reddit

High performance access to file storage

Albert Yu, senior vice president of Intel’s microprocessor products group, said today that the 370-pin socket version of the Celeron is now likely to arrive towards the end of the year. Speaking on the eve of Intel’s Developers Forum, Yu said that the primary reason for moving to the socket was because of cost considerations. The socket is aimed at the Basic PC end of the processor market. Yu said: “We are introducing a Celeron later on this year with a lower cost packaging. The 370-pin socket will appear towards the end of this year. The logic of using the 370-pin socket is to save costs. Our intention is to move the Slot One architecture to a socket architecture in the long term.” Future products based on the socket will follow, Yu said. There was no reason for Intel to use a socket seven processor for the Celeron because, he said, just cranking up the performance of a chip but not taking account of faster bus technology made no sense. "Socket seven is not just a physical socket but worked with the Pentium bus," he said. "You can’t just crank up the clock speed." He said that Intel had decided to create its Mendocino-Celeron processors, recently released, in spring of last year. Yu also said that by the middle of next year, Intel would be able to introduce .18 micron technology using six layers of metal. Layers four and five would have additional thickness to help diminish resistance, he said. "My mother asked me why we weren’t using copper," he said. "Copper does have lower resistivity but there is more than one way to get there. We’ve chosen to increase the thickness of aluminium to get the same result." Yu said: "We’re already designing product for .13 micron." He said that Intel was also at the stage where it was designing CPUs with over 200 million transistors but those processors would not be available until the year 2001. Intel had included areas of the CPU which performed self-testing and diagnostics and he said that more such real estate was planned. But Intel would carry on using the 486 instruction set. "Clearly there’s a legacy in using old instruction sets but we haven’t looked at that very aggressively," he said. "It’s a little dangerous to change that. We are working very aggressively to get rid of system legacy components like ISA." ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.