Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Data Centers

Photos: Intel shows off next-gen chips

By Andy Smith March 17, 2008, 11:43 PM PDT

Image
1
of 5

Photos: Intel shows off next-gen chips

Dunnington

Dunnington

Intel shows off its first six-core processor, called Dunnington, which will be available in the second half of 2008. Dunnington is based on the 45nm high-k process technology and is composed of 1.9-billion transistors. It contains a 16MB L3 cache, is socket compatible with the Caneland platform, and is built for virtualization.rnrn

Larry Dignan has more details of Intel’s presentation.rnrn

Photos are courtesy of Intel.

Photos: Intel shows off next-gen chips

Dunnington

Dunnington

Here’s a map of Dunnington.

Photos: Intel shows off next-gen chips

Nehalem

Nehalem

Intel says its Nehalem chip is scalable from two to eight cores and offers two-way simultaneous multi-threading. It is set for production in the fourth quarter of 2008.

Photos: Intel shows off next-gen chips

Nehalem

Nehalem

Here’s a map of Nehalem.

Photos: Intel shows off next-gen chips

Tukwila

Tukwila

Intel says its new quad-core Tukwila chip will have 2 billion processors and a 30MB cache. It’s expected to double the performance of Intel’s Itanium processors.

  • Data Centers
  • Account Information

    Share with Your Friends

    Photos: Intel shows off next-gen chips

    Your email has been sent

Share: Photos: Intel shows off next-gen chips
Image of Andy Smith
By Andy Smith
  • Account Information

    Contact Andy Smith

    Your message has been sent

  • |
  • See all of Andy's content

TechRepublic Premium

  • TechRepublic Premium

    Power Checklist: Building Your Disaster Recovery Plan

    Natural and man-made disasters can jeopardize the operations and future of any company today. Hurricanes, earthquakes and terrorist or cyberattacks are just a few examples of potentially crippling threats. As a result, the development of a disaster recovery plan is a must to ensure ongoing business processes in the wake of a crisis situation. This ...

    Published:  September 21, 2023, 4:00 PM EDT Modified:  September 22, 2023, 8:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Project Manager

    Keeping all the various moving parts of a business running smoothly and on time requires a well-organized individual who can see the final goal of a project, develop a path to reach that goal and communicate the path that must be followed to all the individuals and teams working to bring that final goal to ...

    Published:  September 20, 2023, 4:00 PM EDT Modified:  September 21, 2023, 12:00 PM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    SSL Certificate Best Practices Policy

    SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. The purpose of this SSL Certificate Best Practices Policy from TechRepublic ...

    Published:  September 20, 2023, 4:00 PM EDT Modified:  September 21, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Mobile Device Computing Policy

    Mobile devices are a way of life in both the consumer and business realms — and business interests must be protected where the two converge. This policy from TechRepublic Premium provides guidelines for the safe and productive use of mobile devices (laptop computers, tablets, smartphones, etc.) by employees. It includes stipulations for company and employee-owned ...

    Published:  September 20, 2023, 4:00 PM EDT Modified:  September 21, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice