Feeds
80%
AMD Phenom II

AMD Phenom II Socket AM2+ CPU

Core i7 killer?

  • alert
  • submit to reddit

The Power of One Infographic

This is significant because Phenom has a horrendous reputation for sucking too much power, producing too much heat and delivering inadequate performance. The Phenom X4 9950 has power requirements that are very similar to Intel's Core i7 920, but Phenom II is a different proposition, and this brings us to the question of a suitable comparison for the new processor.

AMD Phenom II

AMD states: "We are not focusing on Core i7 as our current competitive target. We feel that this is currently a niche product, likely selling in small volumes in the immediate future. We're targeting the Core 2 Quad products and going for a price/performance comparison whilst highlighting our much better power consumption (idle) and thermal characteristics of the Dragon platform. Also, we have some great overclocking headroom with our Phenom II CPU using our new 45nm process."

The problem is that the official pricing per 1000 units at launch was $275 for the Phenom II X4 940 and $235 for the 920. This worked out at £245 and £210, respectively, with Phenom X4 9950 2.6GHz at £155, which made the Phenom II X4 940 £10 more expensive than Intel’s Core i7 920.

After a flurry of price reductions, the X4 940 is on sale at £195, the X4 920 at £170 and the Phenom X4 9950 at £115, which makes it valid to compare Phenom II with a £170 2.5GHz Core 2 Quad 9300.

We ran tests on three platforms, with Core i7 on an Asus P6T Deluxe motherboard, Phenom and Phenom II on an MSI DKA790GX Platinum, and Core 2 on an Intel DX38BT. Common components were a Radeon HD 4870 X2 graphics card, a 1TB WD Caviar Black hard drive and Windows Vista Ultimate Edition.

AMD Phenom II

Click for full-size image

Working with Phenom II is a very similar experience to the 65nm Phenom, except that the clock speeds are a little higher, the power draw is a little lower, the heat output is significantly lower and the gentle rush of the cooling fan is quite tolerable.

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.