Feeds

Updated: SMP Celerons hacked together

Intel fails to stop the hardware boys. Next stop, AMD?

  • alert
  • submit to reddit

The essential guide to IT transformation

Hardware enthusiasts worldwide are combining Celeron processors to create symmetric multiprocessing (SMP) systems, despite Intel's attempt to block the possibility. The trend was started by Japanese enthusiast Kikumara, but now others are putting together systems based on the technology. Kikumara has provided step-by-step instructions on his Web site and there is another series of instructions now available at Fastgraphics. The process is not trivial unless you're a wiz with a soldering iron and a screwdriver, but The Register believes it won't be long before some entrepreneur starts to sell systems based on the fix. Because the Celeron is basically a cut-down Pentium II, there are few differences between the processors. This fact is known to Intel and to hardware enthusiasts, the chip giant wants to differentiate the Celeron from the Pentium II -- because of its pricing strategy. However, Kikumara closely studied the documentation and managed to make working systems. Intel is likely to take a dim view of the technology, which is almost certain to breach its warranties. But whether it can prevent entrepreneurs selling such systems is a different matter. Isn't it? An Intel representative commented: "The simple question is why someone would do this. I can't see you can make any margin unless the parts are overclocked. Would you buy a system with holes drilled in the motherboard? These guys have too much time on their hands -- they should be writing novels rather than drilling holes in microprocessors." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.