Feeds

Intel Core 2 Duo performance preview

A taste of things to come, but when?

Security for virtualized datacentres

Preview Last week, Intel gathered the European press in Munich for a sneak peek at its the Core 2 Duo chip - aka 'Conroe'. Reg Hardware was there. We were limited to running a set of pre-installed benchmarks on the systems provided so this isn't a conclusive performance review of what Core 2 Duo is capable of...

Core2Duo_Logo_large

Nonetheless, the numbers are very impressive, but let's start with a look at what's on offer and why you should consider moving to the Core 2 Duo platform. Intel is touting Core 2 Duo as a power-efficient processor that also offers better performance than the Pentium 4 and Pentium D chips.

Intel was keen to highlight some of the new functions of the Core 2 Duo processors. First of all there will be versions with either 2 or 4MB of shared cache - ot Intel Advanced Smart Cache, if you're into marketing wording. The two cores have to "fight" between themselves for cache allocation, and Intel claimed this technique delivered the best performance in their simulations.

One of the most important features is what Intel refers to as Wide Dynamic Execution, which allows for more data to be processed per clock cycle compared to previous generation of products. The Core 2 Duo processors can processes four full instructions per clock cycle, compared to the NetBurst architecture's three. A part of this is a technqiue Intel refers to as "macrofusion" which enables common pairs of instructions to be combined into a single instruction. The result: certain types of data can be processed in less time than it took on previous generations of Intel processors.

Smart Memory Access has been designed to lower memory latency and improve data access. The key to this is "memory disambiguation", which allows the execution cores to pre-load instructions that are about to be executed before the previous instruction has finished. This is based on a set of intelligent algorithms and it doesn't work under all circumstances, although it means that in most cases the processor will spend less time idling and more time processing data. A better memory pre-fetch system, with twin pre-fetches in both the L1 and L2 cache, should also improve the rate at which the correct data is being made available for the cores to process.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Getting to the BOTTOM of the great office seating debate
Belay that toil, me hearty, and park your scurvy backside
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Lumia rebrand begins: Nokia's new UK web home is Microsoft.com
Yarr, them Nokia logos walking the plank and into the drink
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.