Feeds

AMD nails Hammer specs

But no dates or MHz promises yet

  • alert
  • submit to reddit

MPF As expected Chimpzilla disclosed new information about its first 64bit CPU Hammer today at the Microprocessor Forum in San Jose.

Fred Weber's presentation has just been released too, so avail yourselves of this 440K Acrobat file.

Hammer will come in 2-way, 4-way and 8-way configurations, although it's primed as the long-term single-CPU successor to Athlon XP too. AMD used to call the 1 and 2-way version ClawHammer, although that particular codename along with Sledgehammer and Mikehammer, seems to have fallen of use. OK, we made the last one up.

AMD reckons that the "screaming IO" benefits of the LDT interconnect will dispel the usual performance questions that dog NUMA architectures. A 4CPU Hammer box will achieve 8GB memory throughput, and a cache miss on an "unloaded" system will be 140ns.

Hammer will provide sharp competition for Intel's Itanium, which has the drawback of a new instruction set. Hammer's great boast was x86 compatibility, but in the two years since it was announced at the 1999 Microprocessor Forum, pretty much everything that needs to be ported to Itanic has been ported. So AMD will have to compete on price and performance against McKinley systems in the second half of next year, and McKinley will presume beat it to market.

We're talking to AMD tomorrow, at an undisclosed location. Ie, neither AMD nor El Reg knows where it will be yet. This isn't, apparently, for security reasons. ®

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.