Feeds

Intel's IA64 EPIC like a snake swallowing a hamster

What's good for a goose may make a gander choke

  • alert
  • submit to reddit

Internet Security Threat Report 2014

A senior architect said today that Merced may be pushed up the food chain because the possibilities to produce real silicon might well be remote. It would be a simplification, he said, while he was quaffing his jar of peanut better. HP's EPIC VLIW software, he said, "is somewhat like a snake swallowing a hamster". The architect was responding to our story earlier this week which talked about optimising processes on real Merced silicon. Intel has not yet told us whether or not Merced has taped out. The architect quoted this saying: "a good programmer can write machine code in any language". That aphorism, he maintained, should be put to an end. He said: "At some point, programmers will need to adopt more flexible ways of expressing their algorithms." He continued in the same vein, almost turning the concept of 64-bit chips and operating systems associated with it into a philosophical discussion. "It's very hard to assess whether EPIC is a botch or a bonus," he said. "I have a gut instinct that EPIC is slicing the problem on the wrong axis." He explained that by saying Intel chose to make its instruction bundle a unit of independence, which he described as "a typical American attitude". Instead, said the architect, it should have used clusters of instruction sets. He concluded: "EPIC is an LA sprawl with six lane freeways stretching as far as the eye can see and every family member has his own car (and never has to wait for another family member to return home). My intuition would have been more like a van pool and policies to convince people who frequently have intimate dealings to live in roughly the same part of town." This, we are given to understand, is an insider's statement on Intel's fab policies. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.