Feeds

How CompaQ views Intel roadmap

Alpha still tops CuMine and Merced, but Intel's pet is Willamette...

  • alert
  • submit to reddit

High performance access to file storage

It is inconceivable that the roadmaps from Alpha Processor Inc (API) we published yesterday could have reached the light of day without Compaq's imprimatur. (Story: Slot B arrives as API confirms AMD collaboration) After all, not only does Compaq have a minority share in API, with Samsung the main shareholder, but the Houston company is also irretrievably married to the Alpha platform itself. A close examination of API's competitive microprocessor roadmap reveals a lot not only about the Alpha roadmap but about Intel's plans too. Rather significantly, API only compares the Alpha 21264 with Merced, Xeon and CuMine, and ignores the K7 and other microprocessors. Despite the fact that CuMine is now delayed, the API roadmap shows that the 750MHz Alpha Slot B processor will best the Xeon 666 and CuMine 600 in SPECint95 performance in Q3 of this year. The 21264-750 reaches around 43 SPECint95s or so, the Xeon 666 under 30, and CuMine 22, according to API's estimations. Further, when the 21264-833 is released in Q4 of this year, it will reach 50 SPECint95s, and even though API estimates that the Xeon platform will have got to 32 by then, the Alpha processor is still thrashing it. By the time API/Compaq release the 21264-933 in Q1 of next year, SPECint95 performance will be around 55, while the Xeon 733 will be around 33 and CuMine 700 a mere 30. The estimate for the Alpha 1GHz 21264 is that it will reach 60 SPECint95 by Q2 of next year. Merced will (may?) enter the picture at 46 SPECint95, while the Xeon 8XX will tip in at 39 and the CuMine 8xx at 32. If these figures are to be believed, and if API is able to pull the Alpha processor down into the commodity desktop and server markets, it seems that Intel will have a real fight on its hands. One wild card is Willamette, the kind of Intel's equivalent of a mass chip of destruction. For more information on this processor and its staggering potential, see our earlier coverage. (See Hard facts emerge about Willamette and search for other stories) Two other questions. Does Compaq operate Chinese Walls between its Alpha and Intel operations? And does Intel, which fabs some Alpha chips, also employ the same infamous Chinese Walls? ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.