Feeds
75%

AMD Phenom 9500 processor

AMD's four-core desktop CPU squares up for a fight with Intel's Core 2 Quad

High performance access to file storage

A native quad-core design sounds as though it should be better than two dual-cores that have been cobbled together, but life isn’t necessarily that straightforward. Core 2 has all sorts of deficiencies, including the use of a frontside bus (FSB) and a memory controller that is part of the chipset. In a server, you can hit all sorts of bottlenecks in performance when you gang up a number of multi-core Xeons, but in the desktop arena these limitations don’t seem to have any effect.

AMD Phenom 9500 - CPU-Z

All the details

Phenom uses an AM2+ socket which needs to be matched to an AM2+ motherboard if you want to get the benefits of Hyper Transport 3.0. We used an Asus M3A32-MVP Deluxe with AMD's 790FX chipset for testing. We also threw an Athlon 64 X2 6400+ into the equation on a Gigabyte GA-MA69G-S3H motherboard, and then mixed and matched the permutations of AM2 processor with AM2+ motherboard (X2 on Asus) and AM2+ CPU on AM2 motherboard (Phenom on Gigabyte).

Asus M3A32-MVP Deluxe WiFi mobo

Asus' M3A32-MVP Deluxe: AM2+ socket on board

We also ran a Core 2 Q6600 on an MSI Diamond X38 with OCZ PC3-1333 memory so we could see how a comparable Intel system would perform.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.