Feeds

Intel admits it ‘changed’ Prescott thermal target

Still won't put a figure to it

  • alert
  • submit to reddit

Intel's 90nm Pentium processor, codenamed 'Prescott', may be "sound", according to company President Paul Otellini, but the chip giant has had to change the chip's thermal target, he admitted yesterday.

Speaking during a conference call after the announcement of Intel's Q3 financial results, Otellini said: "We ended up changing the thermal target for Prescott."

But he claimed the company had "changed the thermal envelope [only] slightly."

At Intel Developer Forum last month, both Otellini and CTO Pat Gelsinger avoided going into detail about Prescott's thermal characteristics when challenged. Questions about the processor's heat output were asked after an earlier report on Japanese web site PC Watch claimed the chip pumped out a massive 103W.

That's rather higher than today's Pentium 4 processors running at a slightly lower clock frequency but fabbed using a bigger, 130nm process. Die-shrinks are supposed to yield processors that consume less power, clock for clock.

Alas, said Gelsinger at IDF, thanks to exponentially worse leakage, plus the demand for higher clock speeds and more transistors, 90nm chips are unlikely to run much cooler than 130nm parts - quite the reverse, in fact.

Gelsinger didn't confirm Prescott's alleged 103W power rating; but speaking at IDF about processors in general, he said: "100W for a desktop is OK". That suggests the 103W reports are pretty close to the mark. ®

Related Stories

Gelsinger: 100W power dissipation 'OK' for desktops
Intel Q3 results

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.