Feeds

RegMark™ Lite® shows Celeron trashing AMD Athlon

And refinements and tweaks in progress...

  • alert
  • submit to reddit

Seven Steps to Software Security

Pete Sherriff has been slaving in his fab lab to produce a new RegMark™ to account for the existence of Athlon AMD processors and has come up with a formula he describes as the RegMark™ Lite®. According to Sherriff, he is unable to find a multimedia mark for the Athlon K7, so he has invented a way to use the Lite figure to compare all four processors on just two benchmarks. Said Sherriff: "This way the PIII/500 scores higher than the Athlon/600 which beats the PIII/600, but the Celeron still walks away with it." Mr Sherriff adds that he has been grateful for suggestions which will allow him to further tweak and improve his figures, and is currently attempting to incorporate those refinements into his calculations.

 CPU  Price  FPU  MMmark  CPUmark  Total  RegMark99  RegMark99
 Lite Total
 RegMark99
 Lite
 PIII 500  $423  2540  1563  1910  6013  14.22  4450  10.52
 Celeron 500  $167  2660  1128  1820  5808  33.58  4480  26.83
 PIII 600  $657  3040  1816  2205  7061  10.75  5245  7.98
 Athlon 600  $615  3270  n/a  2785  n/a  n/a  6055  9.85
And, he adds, if people want to abuse him or contact him with bright ideas, he can be reached at this email address. ® See also All new RegMark99™ shows Celeron outperforms Pentium III by 2.3 times

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.