Feeds

Last week in microprocessors 16-22 Aug 1999

A roundup of some of our chippy stories

  • alert
  • submit to reddit

Reducing security risks from open source software

Far from being a quiet time of the year, August 1999 decided to keep everyone at The Register well busy. On the microprocessor front, we started the week by reporting that the Pentium II family has now reached the end of the road. Coupled to that, our favourite Japanese site Happy Cat posted a delicious Intel roadmap with some new codenames to excite the curious. We expected on the 18th of August to see a whole heap of support for the K7 chip, but little materialised, at least here in the UK. Midweek, Intel admitted it couldn't hack it in the discrete graphics chip business. Although our friends over at news.com maintained they had a scoop on this one, in reality we'd forecast that the 7x family would become dead duckies about a month earlier. Pete Sherriff caused his usual storm of protest when he released a whole set of his price/performance benchmarks, in anticipation of Celerons using Pentium III cores. (RegMark Lite shows Celeron trashing AMD Athlon and All-new RegMark99 shows Celeron outperforms Pentium III by 2.3 times and Coppermine Celeron waiting in wings) On Thursday, we learnt of a piece of Intel clocking software, NEWSPEED, which continued to attract a lot of attention through the rest of the week . Reports from Via towards the end of the week said it would go volume with the Cyrix "Gobi" S370 processor towards the end of the year. Early on Thursday, we scooped the world with our story about Alpha NT developers being laid off at a Compaq plant in the US. At a conference call on Monday, senior VP Enrico "The Cloak" Pesatori had pledged his company's support for Microsoft and also said the Alpha processor was still being pushed hard by Compaq. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.