Feeds

Doubts still remain over unclothed PIIIs in Japan

What is the voltage, we ask ourselves?

  • alert
  • submit to reddit

Remote control for virtualized desktops

After taking a quick decco at pages we reported over the weekend as having genuine Pentium IIIs, Intel was still maintaining they were not the genuine article this morning. Intel UK said serial numbers on the chips did not match the genuine article. And a reader from the US said: "The top left picture of the 'PIII' in Japan has the voltage listed as 2.0V, but the PIII is actually a 1.8V core chip. "I live in Toledo, Ohio, and there is a local store that has a 'PIII' 500MHz in their display case for $800. "It is wearing a SECC2 but they would not let me look at it more closely. I am sure some of the chips are 'litigament' leaks from Intel but I would have to imagine the vast majority are, in fact, remarks." Intel says the same. The UK representative reeled out a set of figures and serial numbers which did not match any we have seen. But Clive Turvey, who posted a pile of information at his site on Katmai over the weekend, begged to differ. He said: "Intel really gets my goat! I'm not quite sure what drugs Intel is on but here are a couple of thoughts." Turvey said there was no chance of a remark. "Of what," he asked. "Perhaps my PIII 500 is a remarked PIII 450 and that might explain why it runs at 2.0v and not 1.8v. It runs fine at 500 MHz. It is most definitely not an overclocked PII, the chip that I have does KNI. I can prove this too, in fact it would probably be cheaper to fly out and see it run than buy one yourself <G>" Turvey said: "I did some testing using Intel's Katmai Compiler, and you know what, the FFT (Fast Fourier Transform) program I compiled ran faster when I optimized for a Pentium or Pentium II than it did when it produced Katmai code. It unrolled and vectorized everything into KNI, and while I don't have the numbers in front of me, I seem to think it was several percent SLOWER than the one optimized to use just x87 instructions!!! Perhaps the Emperor hath no clothes?" Turvey has also discovered an internal Intel presentation, which we have posted elsewhere. ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.