Feeds

The Pentium III 550MHz is an emergency

Follow that ambulance marchitecture

  • alert
  • submit to reddit

Seven Steps to Software Security

The 550MHz PIII is a stopgap processor which only exists because Rambus has yet to deliver. Intel's Plan A was for a 533MHz part using the i820 Camino chipset at 133MHz FSB, but that ain't happening as planned, hence the hot (literally) 550MHz/100MHz FSB part hurridly rushed to market to maintain the speed bump lead over AMD. As for the 'Internet dream machine' hype, well, it just won't wash. To claim that a processor is designed for the Internet is more Marchitecture(tm) than architecture. The Katmai new instructions are now somewhat unconvincingly dubbed 'Internet Streaming SIMD Instructions'. While the ability to handle NURBs can conceivably be classed as a move in the right direction as far as download speeds are concerned, it does require optimised web sites that actually have NURB content. Most don't. Moving to ISDN connect will give a far more meaningful improvement in the Internet experience than will the use of Screaming Cindy's extensions. Intel may well stand on its hind legs and bleat that any company not currently on the Internet will be out of business in the next couple of years. Well, you name me ONE company of any size that doesn't currently have some kinda Web presence and I'll buy the beers. Companies that use the Internet as a USP are as tragically misguided as those who were droning on about being solution providers a few scant months ago. Marketing an emergency stop-gap processor with a core design stretching back 10 years as a Ferrari is as ludicrous as trying to sell a VW Polo as, well, a Ferrari. ®

Boost IT visibility and business value

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.