Send your suggestions here







Date: September 8th, 2005
Article by: Nathan Glentworth (Head Editor / Owner)
Product was submitted by: Intel
<--SHOP FOR ONE IN NORTH AMERICA


<--SHOP FOR ONE IN EUROPE

 

PRODUCT SPECIFICATIONS



Intel 670 64bit Pentium 4 LGA775 Processor



- P4 670 3.8GHz

- 800MHz "Quad-Pumped" frontside bus

- 0.09-micron manufacturing process

- Hyper-Threading Technology

- 2MB on-chip, full-speed L2 cache

- Enhanced Intel SpeedStep Power Savings technology

- Intel EM64T Extensions (64bit Capability)

- Execute Disable Bit (Security)

- 16KB L1 Data Cache

- Streaming SIMD Extensions - SSE2, SSE3

- 31-stage "Hyper Pipelined" Technology for higher clock speeds

- Rapid Execution Engine - ALU clocked at 2X frequency of core

- 128-bit Floating Point/Multimedia unit

- Intel "NetBurst" micro-architecture

- Supported by the Intel i925XE and i915 chipsets, with Hyper-Threading

- Intel MMX media enhancement technology

- Memory cacheability up to 256 terabytes of addressable memory in 64-bit mode and 4GB in 32-bit mode

- 1.25 - 1.4V operating voltage range

- LGA775 Packaging - Land Grid Array

- 115 watts TPD (Thermal Design Power)



NEW PRODUCT FEATURES (From Intel)


Other than the 64bit functionality, there are several new features contained within Intel's new processors.



Execute Disable Bit Functionality


Malicious buffer overflow attacks pose a significant security threat to businesses, increasing IT resource demands, and in some cases destroying digital assets. In a typical attack, a malicious worm creates a flood of code that overwhelms the processor, allowing the worm to propagate itself to the network, and other computers.


Intel's Execute Disable Bit functionality, first released for the Intel® Itanium® processor family in 2001, can prevent certain classes of malicious "buffer overflow" attacks when combined with a supporting operating system. Execute Disable Bit allows the processor to classify areas in memory by where application code can execute and where it cannot. When a malicious worm attempts to insert code in the buffer, the processor disables code execution, preventing damage or worm propagation.


2 MB of L2 Cache

A larger cache size can help the processor more efficiently run many popular applications in digital imaging, music, video and gaming.

 

 

 


 


<<PREVIOUS HOME NEXT>>

Calling all tweakers

SAMSUNG BD-D6500 3D BLU-RAY PLAYER REVIEW

PATRIOT PCBOWAU2-N WIRELESS N USB ADAPTER REVIEW

SAMSUNG SA850/S27A850D 27 INCH LED MONITOR REVIEW

ASUS BW-12B1LT INTERNAL 12X BLU-RAY WRITER REVIEW

  • Motherboards
  • Memory
  • Processors (Box)
  • Processors (OEM)
  • Cooling Fans
  • Graphics Cards
  • Digital Video
  • Hard Disks
  • DVD ROM
  • CD ROM
  • CDR/CDRW
  • Multi Media
  • Cases
  • Power Supplies
  • Input Devices
  • LCD Monitors
  • Networking
  • Printers
  • Scanners
  • Software
  • Notebooks
  • PDAs


    Search for lowest prices in
    for

  •  
     

    All modifications published on this site are for your own responsibility.
    TweakNews.net is not responsible in any way for damage caused.

    Copyright www.TweakNews.net