Feeds

'Diamondville' to shine as Intel's next Atom

Inside the 'Silverthorne' architecture

High performance access to file storage

IDF Having launched the first batch of 45nm Atom-brand processors yesterday, Intel today began touting the next set, these ones aimed at sub-laptops and small form-factor desktops rather than Mobile Internet Devices (MIDs).

Intel Centrino Atom

Codename watchers will be wondering where 'Diamondville' fits into Intel's Atom family, and now we know for sure. It's the part that will become the Atom N series, leaving the Atom Z series - aka 'Silverthorne' - for MIDs.

Diamondville and Silverthorne are based on the same microarchitecture, developed from the ground up under the Silverthorne codename since that was the first chip of the family to be developed. Both versions are fully compatible with the 'Merom' Core 2 Duo, so they're limited to SSE 3 rather than SSE 4, part of the 'Penryn' Core 2s.

Intel's Atom

Small, isn't it?

But where Silverthorne lacks support for 64-bit addressing and Virtualisation Technology - they're not really needed on a handheld - they may well be present in Diamondville CPUs, almost certainly in the case of the desktop-oriented models.

Expect a number of mobile Diamondvilles, but the one Intel touted today is the N270. The chip giant confirmed it will be clocked at 1.6GHz and that it'll be paired with Intel's 945GSE northbridge and ICH7M southbridge rather than the more expensive, MID-oriented SCH series that combine with the Atom Zs to form Centrino Atom, a brand that's unlikely to be applied to Atom-based sub-notebooks.

Inside Intel's 'Silverthorne'

Inside Silverthorne

Desktop-centric Diamondvilles will be accompanied by the 945GC northbridge and ICH7 southbridge. Power consumption is less important here than it is with laptops, so expect Intel to drive these as-yet-publicly-unnamed Atoms on cost above all else.

The first desktop Diamondville is expected to be the 1.6GHz 230, though Intel itself has yet to confirm these numbers. Given it has the same clock speed as the N270, we might suggest it'll actually ship with a higher model number.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.