Feeds

Intel's future Sandy Bridge Xeons exposed

x64 iron choices galore

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

A 'Patsburg' for every need

A lot of the variation that Intel is baking into the Romley platform is coming from the Patsburg chipset, which is coming in four different flavors, the C600-A, C600-B, C600-D, and C600-T. Here's how the different peripheral features of the Patsburg variants stack up:

Intel's 22nm server chip roadmap

Intel's four different Patsburg chipsets for Romley platforms (click to enlarge)

By making a variable Patsburg chipset, Intel can deliver different functionality at different price points and do a better job of competing against AMD, which is trying to win hearts and data center budgets straight out on low pricing with two different processors in two sockets and three chipset variations. If Intel can best meet the needs of different server customers by having a range of I/O options – allowing server makers to only put the features customers absolutely need and will pay for into each box – then Chipzilla has a good chance of deflecting what we assume will be a very aggressive Opteron 6200 in the summer and then Opteron 4200 launch later in 2011 or perhaps early in 2012.

In any event, the Patsburg-A chipset supports four 6Gb/sec SATA ports for disk drive or solid state drive storage. The Patsburg-B chipset adds support for 6Gb/sec SAS peripherals. Both of these Patsburg variants seem to use the x4 DMI Generation 2 interface that Intel created for linking on-chip HD Graphics coprocessors to the CPUs. The Patsburg-D chipset adds four more SAS or SATA ports and a PCI-Express 3.0 uplink to the CPU to carry the extra load. All three of these Patsburg chipsets offer software-based RAID 0, 1, 5, and 10 data protection on the SATA ports and RAID 0, 1, and 10 protection on the SAS ports.

If you want RAID 5 protection on your SAS drives, you need to buy a machine with the fourth Patsburg-T variant. The T variant of the C600 chipset will also support non-volatile storage (NV-SRAM), and it seems reasonable that this will be a cache for the RAID 5 disk arrays implemented by the chipsets. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
Cisco and friends chase WiFi's searing speeds with new cable standard
Cat 5e and Cat 6 are bottlenecks for WLAN access points
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.