Feeds
90%

Intel 'Penryn' Core 2 Extreme QX9650

The world's first 45nm gaming CPU

SANS - Survey on application security programs

Review Intel’s 45nm 'Penryn' update for its Core 2 microprocessor family has been an open secret for many months. It's first desktop incarnation, the Core 2 Extreme QX9650, is due to be formally introduced on 12 November, but today we can tell you how it will perform.

Core 2 Extreme
Intel's 'Penryn' Core 2 Extreme

Penryn uses the same LGA775 pin-out as existing Core 2 Duo, Quad and Extreme processors, and has the same thermal package too. The new features of Penryn are the move from a 65nm process to 45nm, which gives Intel more die area to play with, in turn allowing it to raise the chip's L2 cache from 4MB to 6MB for each pair of cores. As with 'Kentsfield', the current four-core Core 2 Extreme, chip, Penryn continues to use an architecture that cobbles together two dual-core dies to create a quad-core processor which will now come with an enormous 12MB of cache.

The die is 107mm² and contains 410m transistors.

The first desktop Penryns will run on the same 1333MHz frontside bus (FSB) as the 6x50 code Kentsfields, with a move to 1600MHz in 2008. Corporates will be able to get their hands on Penryn-based Xeon server chips with the faster FSB from November.

Penryn will debut at the same speeds as existing Kentsfields, but this is where we stray into the realm of speculation. The information that Intel has allowed us to make public today means that we can disclose details of Penryn’s performance but not its pricing information. Happily, there has been a great deal of informed speculation around the web so we can dish the dirt.

intel's 45nm penryn dual-core die
A dual-core Penryn up close and personal

The quad-core models are codenamed 'Yorkfield', while dual-core models go by the 'Wolfdale' handle.

Combat fraud and increase customer satisfaction

More from The Register

next story
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.