Feeds

Hard facts emerge about Willamette

Architecture details show 1Mb L2 cache on die

  • alert
  • submit to reddit

Seven Steps to Software Security

Intel's eagerly anticipated Willamette IA-32 technology is taking shape as hard details have emerged from highly authoritative sources. Few details from Intel have been available, although at the Intel Developer Forum in Palm Springs in February, senior VP Paul Otellini said the technology was on time and was a completely new IA-32 architecture. Our source, based at Intel Germany, claimed that Willamette could have as many as 450 pins in its socket design, use dual channel Rambus memory and employ a chipset called Tehama. She said that K7 floating point (FP) numbers we posted last week were "disappointing" and that Willamette architecture would have no problems if its FP was as low as we reported. Willamette, as well as Merced, have existed as design concepts for seven years so far, she added. "They called Merced P7 then and Willamette P68," she said. She said: "Look for much larger level one ROP (RISC-like) storing 'trace' aches in Willamette. Coppermine and its derivatives will likely be the last of the P6 line." There could be as much as 128K level one data cache on Willamette processors, it has emerged. According to our source, who wishes to remain anonymous for obvious reasons, the cache and the core of Willamette architecture are totally different from P6 technology. The L2 cache, which is likely to be 1Mb, is broken into hundreds of squares, suggesting a massively parallel schema, she claimed. Intel architects have dedicated a lot of space to decoding instructions in Willamette. ®

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.