Feeds

WTF is... Intel's Ivy Bridge

Inside Core i's third generation

  • alert
  • submit to reddit

3 Big data security analytics techniques

Graphics

Smaller transistors require less switching power, reduced further by the Tri-Gate design, which manifests itself as a lower power consumption. Using the Core i7-2700K as an example again, its TDP (Thermal Design Power) is 95W, which the i7-3770K, at the same clock frequency, knocks down to 77W.

While lowering the power consumption for the desktop chip is good, it’s really going to make a real difference in mobile, battery powered platforms.

Intel 22nm transistors

Shreddies style chips: Intel's 22nm transistors

The most significant change within Ivy Bridge's architecture is its integrated graphics processor (IGP). Probably the most important upgrade: the IGP now supports DirectX 11. Yes, it’s been a long time coming, but it’s here at last, allowing Intel's graphics to deliver the features defined by the latest incarnation of Microsoft's Windows gaming sub-system.

There are two versions of the IGP. First, there's the HD 4000, which will feature in the high-end Ivy Bridge chips. It has 16 shader units and a core speed of up to 1.15GHz. Although the core is capable of running at 1.35GHz, this higher speed will only be available to mobile CPUs.

The second Ivy Bridge IGP is the HD 2500, aimed at the mainstream market. It has a core speed of 1.15GHz too, but with just six shader units.

Intel Ticks and Tocks

Both IGPs are set to run at 650MHz, but can reach the higher speeds if the need arises. Again, this is all in the name of energy preservation.

Intel has also added is hardware tessellation to the IGP, which speeds the process of breaking large areas of an image into small ones which can be textured, lit and, where possible, duplicated. It all helps the IGPs push out more pixels per second.

Intel's Wireless Display technology - think using Wi-Fi in place of an HDMI cable - is now at version 3.0, which has lower latency than before and supports two screens, thanks to the IGP's pixel-processing capabilities. The new IGP also is able to support three displays instead of two through wired links.

Intel has taken the opportunity to enhance its processors' security adding a Digital Random Number Generator (DRNG), a high speed number generator to churn out cryptographic keys quickly and less predictably than basic, pseudo-random number generators in software.

Intel Ivy Bridge Desktop CPUs

SANS - Survey on application security programs

Next page: Chips and chipsets

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.