Feeds

Intel does HD with G965 chipset

Integrated graphics with HDMI support

High performance access to file storage

Computex 2006 Although Intel officially announced the P965 chipset yesterday, today's press briefing contained some further information about the other chipsets in the 965 family, aka 'Broadwater'. Intel talked about the G965 for Viiv and Q965 for vPro. As we reported earlier, the integrated graphics core will indeed be known as GMA X3000 for the G965, but on the Q965 it will be the GMA 3000.

There was no talk about 3D performance at all during the presentation, as Intel concentrated on video playback performance. The marketing bumf mentions clock speeds of up to 667MHz for the GMA X3000, although there's no mention of the speeds of the 3000. The GMA X3000 supports DirectX 9.0c and Shader Model 3.0 as well as OpenGL 1.5, but most importantly it's up to Windows Vista Premium standard.

gigabyte intel g965-based mobo
Gigabyte's G965-based board, the GA-965G-DS3

Intel Clear Video Technology is the marketing name for Intel's PC-to-TV connection technology and there will also be support for HDMI built into the G965 chipset, although it's unlikely to be standard on all motherboards. The G965 supports 720p, 1080i and 1080p HD resolutions and it'll do de-interlacing. Intel even claims to be able to play one HD and one SD video stream at the same time using the GMA X3000.

The GMA 3000 is the business solution and can, with the help of what's known as an ADD2 card, output to two displays simultaneously. The ADD2 cards slots into the x16 PCI Express slot and tend to have a DVI connector to which the second display is connected.

Somehow Intel seemed to have forgotten the Q963 chipset, which was mentioned in the marketing material but not in the presentation itself. The part is a cut-down version of the Q965 and doesn't support an external graphics card interface or ADD2 cards.

gigabyte intel q965-based mobo
Gigabyte's Q965-based board, the GA-965QM-S2

All three chipsets support a 1066MHz frontside bus speed, use new ICH8 South Bridge and provide HD audio. No firm launch date for either model was announced. ®

Full Computex coverage at Reg Hardware

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.