Feeds
65%

Intel P45 desktop chipset

Makes life more difficult for overclockers

HP ProLiant Gen8: Integrated lifecycle automation

Review The P45 Express is Intel’s latest mainstream chipset for the Core 2 range of processors. In many respects, it's a refinement of the P35. However, it has developed in an interesting direction.

We generally expect that a new Intel chipset will major on CPU and memory support, but Intel has already got that side of things covered with the 3-series chipsets. P35 introduced us to DDR 3 memory - although motherboard manufacturers can use DDR 2 if they prefer - and the chipset supports all Core 2 processors, including 45nm 'Penryn' models.

Asus P5Q Deluxe P45 mobo

Asus' P5Q Deluxe: P45 on board

An Intel P45 motherboard such as the DP45SG supports 56 models of processor compared to 51 models for the DP35DP. The five processors that Intel officially added with the P45 chipset are Core 2 Extreme models X6800, QX9650, QX6850, QX6800 and QX6700. A quick scan of the spec of any decent Taiwanese P35 motherboard, such as the Asus P5E3 Deluxe, shows that the P35 is perfectly capable of supporting every processor that P45 can, so we’re in the realms of Intel’s official support rather than the capabilities of the chipsets.

MSI P43 Neo motherboard

MSI's P43 Neo: based on a pared-down version of the P45

P35 has a total of 20 lanes of PCI Express (PCIe) 1.1 with 16 lanes for the primary slot and four lanes for everything else. If you’re using a PCIe RAID card or sound card that’s fine, but if your motherboard supports CrossFire, the second graphics slot only has four PCIe lanes to work with.

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.