Feeds

Intel Foster markings partly decoded

How to understand chip porn

  • alert
  • submit to reddit

Thanks to one of our regular readers for providing some details about codings found on Intel processors.

Over the weekend, we pointed to a Japanese Pricewatch picture that seemed to show a Foster microprocessor, complete, replete with its 600+ pin out.

The chip was engraved with curious Intel-like markings, which read as follows:

INTEL CONFIDENTIAL
OV 16 ES A 4
C 015 T 000 - 0149
i ( m ) ( c ) '99 80528 KC 1. XG 1 M
D 015 T 001
0,751

This, according to our source, is what the markings he understands mean:

"As far as I know:
ES - engineering sample
A4 - stepping (not sure, can be plant code for Chandler, Arizona but wouldn't match with C015/D015)
C - plant code
0 - year of manufacture (9-1999, 0-2000, 1-2001…)
15 - week of manufacture
T000 - test lot traceability number
0149 - serialization code

OV16 - ???
0751 - ???

"Furthermore I don't know why two different markings are used on the chip C015 / D015. Also the given plant code is none I have.

"0 - San Jose, Coast Rica (A6/T6)
"1 - Cavite, Philippines
"6 - Chandler, Arizona (A4)
"8 - Leixlip, Ireland
"9 - Penang, Malaysia (A1)
"Q - Malaysia
"R - Manila, Philippines
"Y - Leixlip, Ireland".

If any of that helps, of course. Foster, the grown up Pentium 4 for servers, is expected to start shipping in the first quarter of next year. ®

See Also

Intel's Foster caught in de flagrante

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.