Feeds

AMD 2007 roadmap plots course to the stars?

Cosmic, man

3 Big data security analytics techniques

How is AMD planing to follow next month's debut of the 65nm Athlon 64 X2 processors it's codenaming 'Brisbane' - the 3800+, 4400+, 4800+ and 5000+? Let's have a peek at what's its roadmap is being claimed to state.

Q1 2007 will see the arrival of 'Lima', the 65nm single-core Athlon 64. According to roadmap details reported by DailyTech, expect to see 3500+ and 3800+ Limas next quarter, clocked at 2.2GHz and 2.4GHz, respectively. Both have 512KB of L2 cache and a TDP rated at 45W. A 2.6GHz 4000+ is due in Q2 2007, apparently.

Next year's second quarter will also see the arrival of further Brisbanes: the 65W, 2.7GHz 5200+ and the 76W, 2.8GHz 5400+, both with 512KB of L2 per core. Joining them will be three "energy efficient" Brisbanes: the 2GHz 3800+, the 2.1GHz 4000+ and the 2.2GHz 4200+. All three dual-core CPUs have two 512KB L2 caches and a 35W TDP. They'll be joined in Q3 2007 by the 2.3GHz 4400+.

Missing from the list is AMD's Athlon 64 FX line, which will finally move to 65nm in H2 2007, the report claims, probably in Q3 with the release of the quad-core 'Agena'. It will apparently be equipped with HyperTransport 3.0, 2MB of shared L3 cache, a dual-channel DDR 2-ready memory controller - as per the current desktop line-up - and the updated version of the Socket F infrastructure, F+.

A standard version of Agena will support Socket AM2+, as will 'Kuma', the dual-core successor to Brisbane, and Lima's single-core follow-up, 'Rana'. The AM2+ Agena is likely to ship in Q3, with Kuma following a month or two down the line, and Rana late Q3/early Q4. Rana and Kuma both use HyperTransport 3.0, 2MB of L3 and Socket AM2+, it's said.

AMD's Sempron line is due a 65nm update early in H1 2007 with 'Sparta', which has been on company roadmaps for some time. Its Socket AM2+ successor is 'Spica'.

Reports that surfaced a month or so back claimed AMD's Q3 2007 line-up would include the K8L microarchitecture-based 'Altair', 'Antares', 'Arcturus' and 'Spica'. While Spica's still on the list, Altair and Antares' alleged specifications match those of Agena and Kuma, suggesting AMD has either tweaked the design slightly or simply juggled codenames. A shame - we prefer the originals. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.