Feeds

Mac mini said to get Ion innards

Atom's Apple?

High performance access to file storage

Courtesy of Tom's Hardware comes the "confirmation" from "an Nvidia partner" that the long-awaited Mac mini upgrade is coming as soon as March, but that it won't be powered by either an Intel Core 2 Duo or a low-power Core i7.

And no, it won't be an AMD chip.

Instead, according to the rumor du jour, the Mac mini will be based upon Nvidia's Ion platform, and will have at its heart an Intel Atom processor.

The Ion pairs the same Nvidia 9400M system controller cum graphics processor that's in Apple's unibody MacBook and MacBook Pro lines with Intel's Atom 330.

The Atom is no speedster - but, then again, the Mac mini hasn't lived its life in the fast lane. The Atom 330 runs at 1.6GHz, has a 1MB L2 cache, and sits on a 533MHz frontside bus (FSB). Compare those specs to those of the current Mac mini and you'll see what we mean: a 1.83GHz or 2GHz Core 2 Duo, 2MB or 4MB L2 cache, and a 667MHz FSB.

But comparing the dual-core Atom 330 to a dual-core Core 2 Duo involves much more than mere speeds and feeds. The architecture of the Core 2 Duo is far more sophisticated than that of the Atom. For one thing - one major thing - the Atom 330 (neé Dual Diamondville) is an in-order processor while the Core 2 Duo uses Out-of-Order (OoO) processing.

Simply put, OoO execution allows a processor to intelligently manage its workflow in a way that prevents precious processing cycles being wasted while instructions wait for data. In-order processors are too dumb to do this, so they can frequently twiddle their digital thumbs while waiting for something to do.

Again, Atom, in-order; Core 2 Duo, OoO. Or to put it another way, Atom, archaic; Core 2 Duo, modern.

That said, the Nvidia 9400M is no dog. What's more, Nvidia's CUDA technology allows the 9400M to unload some processing duties from the Atom in essentially the same way as will the OpenCL technology recently published by the Khronos Group and soon to appear in Apple's next operating system, Snow Leopard. That should help.

But would it help enough? Unlikely. CUDA and OpenCL aren't designed to replace a CPU with a GPU; they're designed to offload specifically highly parallel duties such as image and media processing.

The Atom was designed for low-end products such as netbooks, Ultra-Mobile PCs (UMPC), Mobile Internet Devices (MID), and the like. Asking it to carry a Mac on its back would be like asking Verne Troyer to give Yao Ming a piggyback ride.

Not that it couldn't be done - it's just that it might be as unpleasant an experience as that ride would be for Mr. Troyer and Mr. Ming. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.