Feeds

Cam in no 820, your time is up

Wasn't it supposed to have four memory slots, History Man Pete Sherriff writes

  • alert
  • submit to reddit

High performance access to file storage

Oh dear, it's almost enough to make you feel sorry for poor old Chipzilla. Betting the farm on the whizz-bang i820 chipset and Rambus is starting to look like being a really bad move for the Great Satan of Chips. The inability of the 820 to run correctly on mobos with three memory slots is embarrassing enough, but those with longer memories will recall that back in April The Register ran the very first 'What the Hell is...' feature, explaining what Camino was all about. Even then, Camino was late. The original spec for the 820 mentions not three, but four memory slots, so it looks very much as if Intel discovered a problem with four slot configurations months ago and quietly cut back the spec to just three, hoping the problem would go away. Now Chipsetzilla is whimpering on about a measly two memory slots -- and that just isn't enough for the high-end systems the 820 was supposed to support. There are a number of fundamental differences between the way Camino works (or rather, doesn't work) and conventional chipsets like the trusty BX440, which could explain where the problems lie. Camino is based on a hub architecture with a Memory Controller Hub (MCH) at its heart. The MCH in turn talks to the CPU through the host bus (at 133MHz), the graphics subsystem through the AGP bus (AGP 4X) and the memory through Rambus. Everything else is handled by the I/O Controller Hub (ICH) which has a direct link to the MCH. Unlike regular memory, you need to fit continuity modules in empty memory slots because Rambus daisy chains its memory a bit like SCSI devices. This was supposed to mean that clocking the memory was simpler and was also electrically superior, offering active power management of individual memory modules. Electrically superior it may be, but if it doesn't work reliably, it's totally useless. It looks as if Intel was overreaching itself by trying to introduce so many new techniques simultaneously. ® Related stories What the hell is... Camino and Rambus all about Intel comes clean over i820 delay i820 derailed as Intel goes Rambust UK system builder in a right Mesh over i820 delay

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.