Feeds

Intel's lab crew makes case for 80-core world

CSI: It's optical

High performance access to file storage

CSI Drama

Keeping an 80-core chip happy proves tougher than you might think.

Each core wants access to on-chip memory and wants it fast. These hungry cores don't have time to go running across precious silicon real estate looking for data.

To address this problem, Intel's researchers have been hammering away on the concept of 3-D memory where the cache rests above the processor cores. This technique lets a core anywhere on a single slice of silicon tap the cache in just a couple of cycles rather than traversing the entire chip to reach the cache bank.

Intel's researchers have also pioneered technology in the field of silicon photonics.

Here Intel looks to replace the wires that connect data centers, server racks and even chip components with beams of light. (We profiled Intel's latest silicon photonics breakthrough in January.)

Intel has suggested that on-board silicon photonics technology remains years away, but the company has already produced systems dabbling with the technology.

We spied one board code-named Coalbrook (or CoalCreek: it was hard to tell as Intel's staff urged us away from the confidential systems) and another called Springville that had built-in optical modules. Both systems were identified as using Intel's upcoming CSI (common system interconnect) technology, which is the company's attempt to catch-up to AMD's Hypertransport/integrated memory controller technology.

For more on Intel's silicon photonics work, we urge you to check out the following interview with Mario Paniccia, a research director at Intel. You'll quickly get a picture of just how bright Intel's top staff are.

Here's Mario

How terable are these things?

Pundits have long hit Intel and AMD with critiques for pushing out ever-faster processors when Joe Public hardly needs a world-class chip to run basic applications.

We, however, tend to think that consumers and companies will always find new ways to gobble up cycles – usually once Microsoft makes it possible to do so. Such a scenario certainly holds true in the server game where there's an insatiable desire for more horsepower.

Will Intel's cute bubble popping software drive the need for these new chips? Well, no. But that's not really the point, is it? ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.