Feeds

Willamette is Intel's favourite petzilla

Cat will pop its whiskers out of the bag at IDF

  • alert
  • submit to reddit

Internet Security Threat Report 2014

"A year is as a day in the mind of Chipzilla" -- Book of Remembrances It is nearly a year since Dr Albert Yu, a senior VP at the Intel Corporation, showed an assembly of hacks a machine running a chip at 1GHz at its bi-annual Developer Forum. What a difference a year makes. When we attend the Intel Developer Forum next week, we are confident that we will see a machine being demoed that runs at 1GHz, but this time Chipzilla may open its kimono, and dispel any doubts that liquid nitrogen is making it clock. This will be the fabled Willamette IA-32 processor, which Intel has talked about for quite a long time now. It has actually demoed the processor to chip boffins already, as we reported last year. The product taped out about a month ago. What do we actually know about Willamette so far? Well, piecing together the jigsaw puzzle, we have the following: The chipset supporting it, Tahama, will include some screaming Sindie like additional instructions called Willamette New Instructions. Screaming Sindie will include 64-bit FPU instructions, but Willamette itself will support 128-bit MMX instructions. Tahama will support AGP 4X, and include 3.2GBps memory bus bandwidth and 3.2GBps system bus bandwidth. Initially, it will have 256K of on chip cache, but our information is this will rapidly rise. It may debut at 1.0GHz, it could be 1.2GHz or 1.4GHz, but at any rate its slated launch date is 1 October this year. Willamette architecture will have 128-bit MMX instructions, and SIMD (Screaming Sindie) 64-bit floating point instructions. Willamette is scheduled for launch on Oct 1, 2000. At IDF next week, which we will be covering as extensively as on the last three occasions, Intel will spend a huge amount of time on its up-and-coming IA-64 chips, we know. Meanwhile, reports that AMD will attempt to blag journalists and analysts in the middle of Intel's Palm Springs conf were discounted by a source close to the smaller company. He said: "AMD isn't clever enough to attempt that." It won't be the first time such an exercise has been attempted, however. Nine years back, on a visit to Intel's Satan Clara HQ, a Motorola spin doctor attempted to "kidnap" British journalists so they could listen to a suit talk about the Power PC platform. Some of us managed to evade capture. ® See also Major Intel roadmaps ahead, please keep left Yu demonstrates 1GHz chip, talks roadmap talk Willamette, Foster details leak Intel to demo 1GHz IA-32 chip February 2000 Happy Cat leaks stash of Intel futures Hard facts emerge about Willamette Katmai out of the bag

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.