Feeds

AMD sales up – but ink still red

Fresh Fusion APUs, Bulldozer on doorstep

Top three mobile application threats

Fusion rejiggered

On the call, AMD also said it was rejiggering its Fusion Acceleration Processing Unit (APU) product lines and schedules a bit. APUs combines CPU and GPU components in a single part, and hence El Reg calls them ceepie-geepies.

Because of yield issues on the 32 nanometer processes being perfected at the moment by GlobalFoundries, the "Llano" APU, which will be pushed out a few months in 2011, but will ship sometime in the first half of the year. As El Reg previously reported, the Llano APU takes a quad-core Phenom-II, tweaks it and implements it in 32 nanometers, and then slaps a modified version of the Radeon HD5000 series GPU on the chip. Llano APUs are aimed at high-end notebook and desktop computers.

While Llano is being pushed out, AMD's entry Fusion APU, called "Ontario" and based on the forthcoming "Bobcat" core, is being pulled forward by many months. The Ontario APU, which Meyer called "a game changer," is aimed at netbooks and entry notebooks where low power consumption but fast performance are both enviable (if contradictory) goals.

Meyer did not give out the feeds and speeds of the Ontario APU, but said it was being manufactured by AMD's GPU foundry partner, Taiwan Semiconductor Manufacturing Corp using its bulk 40 nanometer processes. The Ontario chip will ship for revenue in the fourth quarter and will be in products early in 2011.

Meyer also said that the "Bulldozer" core for Opteron server processors, which we told you about here, had taped out during the quarter. AMD expects to sample chips based on the Bulldozer cores in the second half of the year, and expects to see them in machines in 2011, on target with the original plan. The Bulldozer chips will be socket-compatible with the existing G34 sockets used with the Opteron 6100s and the C32 sockets used with the Opteron 4100s, and are known by the code names "Interlagos" and "Valencia," just so you can keep track. ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.