Feeds

AMD retaliates against Intel with Rev F release

Less magical, more practical

High performance access to file storage

A more modest, less magical AMD released the new Revision F Opteron processors on Tuesday. The days when AMD could crow about broad, breathtaking performance advantages over Intel have vanished. Now AMD sells Opteron with a humbler pitch, one that revolves around consistency and high-end server gains for customers.

With Rev F, users will find a dual-core fleet of chips that top out at 2.6GHz. These new Opterons boast support for the AMD-V virtualisation technology and for DDR 2 memory. Intel has been shipping its virtualisation technology for some time and supports the more advanced but power-hungry FB-DIMM memory technology with its Xeon server chips.

Customers should expect to see a fair bit of manoeuvering from the server makers as they adjust to Rev Fs higher pin count of 1,207 connectors versus 940 pins in previous chips.

AMD has decided to ship three versions of the Rev F Opterons. Customers will see high efficiency parts that eat up 68W, regular parts that consume 95W and a special edition product that eats up 120W. In 1,000 unit quantities, the new chips range in price from $255 to $2,649.

You can expect the likes of Sun Microsystems, IBM, HP and Dell to roll out a wide variety of gear based on the new chip. Many of these vendors will stress Opteron's sustained performance edge over Intel's Xeon chip in larger, four-socket servers.

Intel has tried to counter AMD's high-end lead by trumpeting the upcoming release of a four-core Xeon in the fourth quarter. AMD today revealed that it does not expect a four-core Opteron until the middle of next year.

It now looks as if Intel and AMD will split various server benchmarks between them for some time. AMD, however, has urged customers to look past pure performance comparisons and see it as the more consistent processor manufacturer overall. AMD intends to keep its same, basic processor architecture for years to come, while Intel is expected to do another redesign in the near future to add technology, such as an integrated memory controller, to the Xeons. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.