Feeds

Intel 65nm desktop, server CPUs 'up and running'

In the labs, a year ahead of launch

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Intel has 65nm versions of its mobile, desktop and server-oriented dual-core processors up and running in the its labs, a senior company executive revealed today.

Questioned in London today about Intel's 65nm processor plans, Kirk Skaugen, marketing director at Intel's Digital Enterprise Group, said the chip maker has "dual-core up and running across all our platforms".

Separately, sources close to the company made the same claim.

Intel has already said, of course, that it has working 65nm silicon and late last year demonstrated its 'Yonah' dual-core mobile processor, the successor to today's single-core Pentium M 7xx series. Intel has said it will ship Yonah in limited numbers late this year, with volume production taking place in 2006.

So far, however, the company hasn't said much in public about its 65nm desktop or server plans. Its internal roadmaps show two 65nm familes, the dual-core 'Presler' and the single-core 'Cedarmill'. Like the upcoming Pentium 4 6xx series, both chips will support 64-bit addressing.

Meanwhile, it's increasingly unlikely that 'Smithfield', next quarter's dual-core Pentium 4 8xx family, will comprise a true dual-core, single-die design but rather sandwich two separate 'Prescott' cores together. To the end-user the effect is the same, we here company staffers say. True, but if that's the case, and it's not an issue, why all the secrecy?

As for servers, the implementation of 65nm seems further out - the first dual-core Itanium, for example, will ship late this year at 90nm. At this stage it's unclear whether 'Dempsey', the first 'true' dual-core Xeon will be fabbed at 65nm when it ships early next year. ®

Related stories

Intel, Qinetiq build ultra-low power transistor
Intel confirms P4 6xx launch 'this month'
Intel maps out 64-bit Xeon dash
Intel details dual-core Itanium
Intel to bring 64-bit to P4, Celerons in Q2
Intel speeds 'multiple OS' desktop CPU schedule

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.