Feeds

UltraSPARC V wears extreme threads

Information Overdribble

  • alert
  • submit to reddit

Sun is looking at multithreading techniques for its next-but-one generation of RISC processor UltraSPARC V, the EE Times reports. Sun already uses the techniques in its MAJC processor.

Multithreading or SMT is the trick of making the processor appear to be several 'virtual processors'. The technique will be unveiled for the first time in x86 processors in Intel's Foster any day now, the culmination of Chipzilla's top-secret Project Jackson.

Jackson technology was due to be unveiled in June, but launch date is now so near, that even our closest friends at Intel partners are making "I can't talk - my mouth's full of toothpaste" gestures whenever we raise the subject.

Compaq killed off six years of SMT investment when Don Capellas canned the Alpha EV8 line earlier this year.
SMT increases parallelism but it's doubtful if either Jackson or USV will have the aggressive approach to threading in two new extreme processors. Mario Nemirovsky's XStream processor is being sold by Clearwater Networks, the first implementation of which is the CNP810SP.

Dan O'Neill, former head of Nat Semi's system on a chip business, is now CEO at Clearwater, and Nemirovsky is no longer with the company.

And we covered PACT Corp's extraordinary XPP processor here a few days ago.

We have a little history of SMT here. ®

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.