Feeds

AMD and Intel extreme desktop CPU workout

Feel the burn

The Power of One Infographic

Extreme PC Week

Extreme PC Week

Comparing high-end desktop processors that use the latest architecture from AMD and Intel these days, is a bit like comparing apples to walnuts. To pimp up a PC, there is only one company that really offers extreme processing power, and that’s Intel. But it’ll cost ya. In the extreme arena, AMD gave up arm wrestling with Intel a while back, however, the company has some nifty desktop CPUs that hit a price/performance sweet spot. So what can you expect to find from these two players if you want a desktop PC that packs a punch?

While the focus of late has been on Intel’s recently launched Ivy Bridge architecture, at the time of writing, the really powerful desktop CPU’s come from the company’s Sandy Bridge E microarchitecture. Released before Ivy Bridge in late in 2011, the flagship Sandy Bridge E desktop processor is the mighty 6-cored Core i7-3960X Extreme Edition. If money is no object, then you’ve found your grail. Shop around and you’re looking at just under £800 – a CPU that costs as much as a many a complete off-the-shelf powerful PC.

Intel Core i7-3960X processor die detail

Intel Core i7-3960X processor die detail: note the two 'greyed-out' cores

Thankfully, there is a cheaper Sandy Bridge E sibling that shaves off around £300 from the cost. It’s still an eye-watering £450 though, but the Intel Core i7-3930K retains those 6 cores and is undoubtedly quick. Consequently, it’s become a firm favourite among boutique system builders to power their extreme PCs. More on this chip in a moment.

When it comes to offering something akin to Sandy Bridge E, alas, AMD has nothing that can match it, but it doesn’t stop the company from hitting the headlines. In September last year, the AMD FX-8150 – the flagship CPU of the Bulldozer architecture line of processors – grabbed the Guinness World Record for highest CPU clock speed at 8.429GHz. Yet a glance behind this wonderful PR coup tells a slightly different story.

The machine only had to boot into Windows and allow the clock speed to be reported and, more importantly, it didn’t need to fire up any applications or have all eight of its cores running. The world record speed was attained by a single Bulldozer module under the influence of some pretty heavy liquid helium cooling – so nothing like the real world then.

AMD FX-8150 processor die detail

AMD FX-8150 processor die detail

Perhaps more telling is that at launch, the marketing suits at AMD had priced the eight-core, 3.6GHz FX-8150 at around £200. With Intel’s Ivy Bridge not yet on the horizon, it was pitched at against the Sandy Bridge Core i5-2500K. Certainly the Core i5-2500K is a very good chip, but you wouldn’t call it extreme by any stretch of the imagination.

Top three mobile application threats

Next page: Core decisions

More from The Register

next story
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.