Feeds

Intel inserts hack into Celebrity

Cast aside like Monday's mat

Internet Security Threat Report 2014

We've written a fair bit about Intel opening up its Xeon sockets to make room for FPGAs from Xilinx and Altera. Given Intel's past reluctance to let anyone else touch its sockets, it may still seem unbelievable that another vendor can in fact do the socket squeeze. Well, believe it, friends. We bring proof.

A Xilinx FPGA in a Xeon socket

Xilinx Meets Xeon

Companies such as XtremeData and DRC already have FPGAs that pop into Opteron sockets. Similar gear for Xeon should move out of the lab and into customer sockets near the end of this year or early next, according to an Intel boother.

Right now Xilinx has the only FPGA that can make full use of Intel's 1066MHz front side bus. You can expect XtremeData and Nallatech to have some of the earliest FPGAs for the Xeon sockets, and companies such as IBM, HP and Rackable to promote the gear.

Also on display at IDF was the L3NIC. This product again uses FPGAs and places NICs right next to the FSB. Such a tight link to the FSB should improve Ethernet latency and avoid the need for specialized networking technology such as Infiniband for high performance customers. Intel, however, said the technology remains very much in the lab now. (HP apparently has a project in the works that makes use of the technology.)

Shot of Intel's L3 NIC

The L3NIC

With all this fancy technology around, you want to make sure it's protected. These guards held court outside of the Beijing Convention Center.

Shot of guards standing outside of IDF

The IDF Squadron

Some of the coolest computers coming out of China are built by ShenZhen Hasee Computer Co. Ltd. They've brought the all-in-one design loved for awhile by Mac users to the PC world. These systems on display cost about 3000RMB, which is under $400.

Shot of the ShenZhen all in one - a white system

Apples in China

And now let's close with the week that was – in pictures.

Intelligent flash storage arrays

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.