Feeds

WTF is... Intel's Ivy Bridge

Inside Core i's third generation

  • alert
  • submit to reddit

Security for virtualized datacentres

Graphics

Smaller transistors require less switching power, reduced further by the Tri-Gate design, which manifests itself as a lower power consumption. Using the Core i7-2700K as an example again, its TDP (Thermal Design Power) is 95W, which the i7-3770K, at the same clock frequency, knocks down to 77W.

While lowering the power consumption for the desktop chip is good, it’s really going to make a real difference in mobile, battery powered platforms.

Intel 22nm transistors

Shreddies style chips: Intel's 22nm transistors

The most significant change within Ivy Bridge's architecture is its integrated graphics processor (IGP). Probably the most important upgrade: the IGP now supports DirectX 11. Yes, it’s been a long time coming, but it’s here at last, allowing Intel's graphics to deliver the features defined by the latest incarnation of Microsoft's Windows gaming sub-system.

There are two versions of the IGP. First, there's the HD 4000, which will feature in the high-end Ivy Bridge chips. It has 16 shader units and a core speed of up to 1.15GHz. Although the core is capable of running at 1.35GHz, this higher speed will only be available to mobile CPUs.

The second Ivy Bridge IGP is the HD 2500, aimed at the mainstream market. It has a core speed of 1.15GHz too, but with just six shader units.

Intel Ticks and Tocks

Both IGPs are set to run at 650MHz, but can reach the higher speeds if the need arises. Again, this is all in the name of energy preservation.

Intel has also added is hardware tessellation to the IGP, which speeds the process of breaking large areas of an image into small ones which can be textured, lit and, where possible, duplicated. It all helps the IGPs push out more pixels per second.

Intel's Wireless Display technology - think using Wi-Fi in place of an HDMI cable - is now at version 3.0, which has lower latency than before and supports two screens, thanks to the IGP's pixel-processing capabilities. The new IGP also is able to support three displays instead of two through wired links.

Intel has taken the opportunity to enhance its processors' security adding a Digital Random Number Generator (DRNG), a high speed number generator to churn out cryptographic keys quickly and less predictably than basic, pseudo-random number generators in software.

Intel Ivy Bridge Desktop CPUs

Top 5 reasons to deploy VMware with Tegile

Next page: Chips and chipsets

More from The Register

next story
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
The British Museum plonks digital bricks on world of Minecraft
Institution confirms it's cool with joining the blocky universe
Turn OFF your phone or WE'LL ALL DI... live? Europe OKs mobes, tabs non-stop on flights
Airlines given green light to allow gate-to-gate jibber-jabber
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.