Feeds

Updated: SMP Celerons hacked together

Intel fails to stop the hardware boys. Next stop, AMD?

  • alert
  • submit to reddit

SANS - Survey on application security programs

Hardware enthusiasts worldwide are combining Celeron processors to create symmetric multiprocessing (SMP) systems, despite Intel's attempt to block the possibility. The trend was started by Japanese enthusiast Kikumara, but now others are putting together systems based on the technology. Kikumara has provided step-by-step instructions on his Web site and there is another series of instructions now available at Fastgraphics. The process is not trivial unless you're a wiz with a soldering iron and a screwdriver, but The Register believes it won't be long before some entrepreneur starts to sell systems based on the fix. Because the Celeron is basically a cut-down Pentium II, there are few differences between the processors. This fact is known to Intel and to hardware enthusiasts, the chip giant wants to differentiate the Celeron from the Pentium II -- because of its pricing strategy. However, Kikumara closely studied the documentation and managed to make working systems. Intel is likely to take a dim view of the technology, which is almost certain to breach its warranties. But whether it can prevent entrepreneurs selling such systems is a different matter. Isn't it? An Intel representative commented: "The simple question is why someone would do this. I can't see you can make any margin unless the parts are overclocked. Would you buy a system with holes drilled in the motherboard? These guys have too much time on their hands -- they should be writing novels rather than drilling holes in microprocessors." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Intel sees 'signs of improvement in the PC business' but earnings remain 'Meh...'
Prospects for the future, however, please Wall Street money men
What's a right pain in the ASCII for IBM? Its own leech-like hardware biz
Keep your eyes on our cloud while we remove this pesky thing, say execs
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.