Feeds

Intel adds Wireless MMX support to XScale tools

Paving way for Bulverde

  • alert
  • submit to reddit

Intel is clearly gearing up to announce - and hopefully ship - its next-generation XScale processor, codenamed "Bulverde".

The part may have failed to warrant a mention during the appropriate Intel Developer Forum keynote last week, but today the chip giant began shipping the software tools needed to write applications and drivers. that will support the new chip.

The Intel C++ Software Development Tool Suite supports app development for Palm OS 5 and Symbian-based devices, along with support for the Nucleus OS 1.13.

Central to the $2999 suite is Intel's C++ Compiler for PCA Processors 1.2, which adds support for Wireless MMX, Bulverde's new multimedia manipulation instructions. Based on the Pentium processor's MMX instructions, Wireless MMX extends the ARM ISA on which XScale CPUs are based.

The compiler itself is based on the technology Intel offers to developers coding for its desktop processors, including the Pentium 4 and Xeon chips. Optimisations developed for the other processors are applied to XScale code, Intel said, highlighting "support for interprocedural optimisation, which can speed application performance". ®

Related Stories

Intel chief touts mobile 3D chip, ignores next-gen XScale
Intel preps 'Xbox in a phone' XScale chip
Intel preps 540MHz XScale chip

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.