pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

AMD Hammer

Perhaps emboldened by having attained technological leadership in the PC processor stakes with its seventh-generation Athlon chip, AMD announced its own vision of the path to 64-bit code and memory addressing support in October 1999 – and it was a lot different from Intel’s IA-64 architecture.

While IA-64 is a completely new architecture, AMD has elected to extend the existing x86 architecture to include 64-bit computing, adopting an approach that will provide an easy way for users to continue to use their existing 32-bit applications and to adopt 64-bit applications as needed. Fundamentally, the AMD x86-64 design – initially known by the codename Sledgehammer and branded as Hammer when the full architectural specification was released in mid-2000 – extends x86 to include a 64-bit mode that has both a 64-bit address space and a 64-bit data space – future 64-bit processors being able to detect which mode is needed and compute accordingly. The instruction set will be extended or operations such as instruction and data prefetching, with the only major architectural change expected to involve the x87 FPU.

AMD argues that its more conservation transition to 64-bit computing has a number of advantages over Intel’s IA-64 route:

  • full native support for both 64-bit and 32-bit applications
  • lower power consumption and therefore higher frequencies
  • the potential for the fabrication multiple x86-64 processors on a single chip
  • no reliance on complex new compiler technology
  • less cost.

Its combination of support for both existing 32-bit x86 software with a true 64-bit x86-64 system architecture earns the AMD64 the right to claim to be the first eighth-generation x86 desktop processor architecture. The goal of delivering next-generation performance to the customer of today is achieved by striking a balance between next-generation microarchitectural per clock cycle performance and the ability to further scale the architecture in frequency in a given process technology.

The changes to the Hammer’s base pipeline, as compared with the previous processor generation, are the clearest example of this design philosophy. The pipeline’s front-end instruction fetch and decode logic have been refined to deliver a greater degree of instruction packing from the decoders to the execution pipe schedulers. Accommodating this change requires a redefinition of the pipe stages in order to maintain a high degree of frequency scalability, resulting in two additional pipe stages when compared to the seventh generation microarchitecture. The end product is a 12-stage integer operation pipeline and a 17-stage floating point operation pipeline.

Hammer

In the autumn of 2000 AMD released its SimNow! simulator – an application specifically designed to give BIOS vendors, tools developers, operating system manufacturers and application providers the ability to evaluate their x86-64 technology based software code prior to the release of its Hammer processors.

When AMD first announced their plans to extend their existing x86 architecture to include 64-bit computing, they were forecasting that this would happen before the end of 2001. In the event, problems with the adoption of SOI technology meant that it wasn’t until the spring of 2003 that we saw AMD’s K8 architecture evolve into the server-based Opteron line of CPUs. A few months later, the company was finally ready to launch 64-bit chips into the desktop and mobile markets.

  • AMD K6
  • AMD K6-2
  • AMD 3DNow
  • AMD K6-3
  • AMD Athlon
  • AMD 750 Chipset
  • AMD Thunderbird
  • AMD Duron
  • AMD Palomino
  • AMD Morgan
  • AMD Thoroughbred
  • AMD Barton
  • AMD HyperTransport
  • AMD Hammer
  • AMD Athlon 64
  • AMD Sempron
  • AMD Athlon 64 X2
  • AMD Socket AM2
  • Barcelona, AMD’s native Quad Core CPU

Filed Under: AMD technology

Latest Articles

Ad-Aware Total Security Review

PROS: The file shredder worked, albiet very slowly. CONS: Just about everything with Ad-Aware Total Security didn't do as advertised. Having tested it on three different systems (more than the recommended system specs were met) with nearly the same results, I wouldn't be surprised if … [Read More...]

How to Remove Bitcryptor Virus

Bitcryptor Virus is a virus of the ransomware variety. These are viruses that infect your computer and try to trick you into paying money in order to get rid of the virus. It will encrypt the files on your computer and keep you from using important programs on your computer. If you are unable to … [Read More...]

Understanding the Seven Levels of RAID Arrays

I previously covered an article on the new research on RAID arrays, which has originated from FASTA Universidad. The latter half of their paper covers the different RAID levels that you should be aware of. Here is an overview of this very important research. Learning the Nuances of the Seven … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

AI-Driven Software Improves Trading Strategies for Investors

Artificial intelligence technology is changing the state of modern finance. A growing number of investors are utilizing AI to improve the … [Read More...]

What You Need to Know When Choosing the Best VPN for an iPhones

Today millions of people have smartphones; most use them to access the Internet. Research shows that more than 50% of Internet users access it with … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Maximise the Use of Group Chats to Brainstorm Advertisement Plans

With the advent of modern communication tools, you can now stay in contact with the people you work with even when you are not at the office or during … [Read More...]

Correct the 403 Forbidden HTML Error

The 403 Forbidden error is another HTTP Status code that means you cannot access the requested pages because it is not allowed for some reason. There … [Read More...]

Remove Antimalware Doctor

Just like Antivirus IS and AV Security Suite, Antimalware Doctor is also a rouge program that will give fake threat alerts and false scan results … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors