Feeds

Silicon Graphics looks to MIPS to cover Merced delays

Workstation vendors prepares three new generations of R12000 in case Intel is late

  • alert
  • submit to reddit

Top three mobile application threats

Silicon Graphics (SGI) yesterday went on record to commit itself to the MIPS Risc processor for at least two more generations of the current core and possibly a third incarnation beyond those two. Doubts were cast on SGI's support for MIPS last year when the company not only spun the chip developer -- which it bought out in the late 80s in a move designed to counter Sun's aggressive Sparc development plans -- as a separate business unit but stated its decision to migrate to Intel's 64-bit Merced chip for future high-end machines and the IA-32 architecture for low-end workstations. Now SGI will offer machines based on MIPS' R14000 CPU, which is due next year, and later on the R16000, scheduled to ship in 2001. Both processors will be updates of the current R12000 core. The R14000 will support double-speed backside cache memory and a 200MHz external data bus, twice that of the R12000. It will also offer a clock speed increase, taking the design to 450MHz. The R16000 will boost the clock speed to the 600-800MHz band. The current processor's 32K data and instruction L1 caches will be both the doubled to 64K. The chip will support up to 8MB of external L2 cache. The decision to continue with MIPS chips was based on customers demand for continuity over SGI's transition to Merced, claimed John Mashey, the company's chief scientist, in an interview with the Reuters news agency. SGI has said it will port its Irix Unix-derived operating system to Merced. However, the plan to stick with MIPS, at least for the immediate future, will guard against delays not only in the shipment of Merced CPUs but in SGI's effort to move the OS from one processor platform to another. The fact the R14000 and R16000 are little more than speed bumps of the R12000 suggests that SGI is doing little more than cover its rear end while MIPS pursues its designs on the embedded market. The possible fourth-generation R12000, presumably to be called the R18000, appears to be simply a more compact version of the R16000, again suggesting it's little more than a stop-gap to fill the hole left by a possibly delayed Merced and/or IA-64 Irix. ®

3 Big data security analytics techniques

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.