Language Selection

English French German Italian Portuguese Spanish

AMD: dual-core not for gamers... yet

Filed under
Hardware

Gamers, AMD's upcoming dual-core desktop processor, the Athlon 64 X2, is not for you. What you want is the single-core Athlon 64 FX.

So the chip maker said today. According to John Harris, AMD's head of marketing in North America, despite the performance benefits that the X2's extra core brings, "the Athlon 64 FX is still the best processor for gaming.

Harris' reasoning is that until games start being coded for multiple processors, which he reckons won't happen until next year, you'll get better game performance out of the single-core chip.

Right now, the FX-55 is clocked at 2.6GHz. The top-of-the-range X2 4800+ is only clocked at 2.4GHz. Both chips' cores have 1MB of L2 cache and connect to the system via a single HyperTransport link. If a game is single-threaded, it will at any given time be running on only one of the two available cores. So the FX has that 200MHz advantage.

That said, the FX is also having to process all the other threads running alongside the single-thread game whereas the X2 can at least run them on its second core, essentially granting the game a better crack of the single-core whip. Is that enough to make up for or even exceed the FX's 200MHz advantage?

It's going to make for some interesting benchmark tests to see how the two compare.

In the meantime, the X2 will be pitched at the obligatory "digital media" apps, for which the chip brings a 30-50 per cent performance boost over its single-core brethren, Harris said.

And for those folk who question the need for this extra performance, well, it'll be there to handle all those anti-malware apps you're forced to run in the background these days to keep your PC safe. Sorry, your Windows PC safe. ®

theregister.

More in Tux Machines

Red Hat Leftovers

Kernel: CH341 and LWN Articles (Just Freed)

  • Linux Adds CH341 GPIO
    There was a time when USB to serial hardware meant one company: FTDI. But today there are quite a few to choose from and one of the most common ones is the WCH CH341. There’s been support for these chips in Linux for a while, but only for use as a communication port. The device actually has RS232, I2C, SPI, and 8 general purpose I/O (GPIO) pins. [ZooBaB] took an out-of-tree driver that exposes the GPIO, and got it working with some frightening-looking CH341 boards.
  • Shrinking the kernel with an axe
    This is the third article of a series discussing various methods of reducing the size of the Linux kernel to make it suitable for small environments. The first article provided a short rationale for this topic, and covered link-time garbage collection. The second article covered link-time optimization (LTO) and compared its results to link-time garbage collection. In this article we'll explore ways to make LTO more effective at optimizing kernel code away, as well as more assertive strategies to achieve our goal.
  • The rest of the 4.16 merge window
    At the close of the 4.16 merge window, 11,746 non-merge changesets had been merged; that is 5,000 since last week's summary. This merge window is thus a busy one, though not out of line with its predecessors — 4.14 had 11,500 changesets during its merge window, while 4.15 had 12,599. Quite a bit of that work is of the boring internal variety; over 600 of those changesets were device-tree updates, for example. But there was still a fair amount of interesting work merged in the second half of the 4.16 merge window; read on for the highlights.

Wine-Staging and Games

Canonical Outs New Ubuntu Kernel Update with Compiler-Based Retpoline Mitigation

New Linux kernel security updates have been released for Ubuntu 17.10 (Artful Aardvark), Ubuntu 16.04 LTS (Xenial Xerus), Ubuntu 14.04 LTS (Trusty Tahr), and Ubuntu 12.04 ESM (Extended Security Maintenance), adding the compiler-based retpoline kernel mitigation for the Spectre Variant 2 vulnerability on amd64 and i386 architectures. Canonical fixed the Spectre Variant 2 security vulnerability last month on January 22, but only for 64-bit Ubuntu installations. This update apparently mitigates the issue for 32-bit installations too. Spectre is a nasty hardware bug in microprocessors that use branch prediction and speculative execution and it could allow unauthorized memory reads via side-channel attacks. Read more