Thursday, May 19, 2011

queen elizabeth 2nd family tree

queen elizabeth 2nd family tree. queen elizabeth family tree
  • queen elizabeth family tree



  • bradc
    Jul 12, 04:47 PM
    Maybe Apple will give you a choice.


    That's what I was going to say. Maybe Apple will turn more like Dell's website with a 'plethora' of options. So there might be a bunch of possible configurations?





    queen elizabeth 2nd family tree. Queen Elizabeth II Family Tree
  • Queen Elizabeth II Family Tree



  • zioxide
    Mar 13, 09:03 AM
    I'd be willing to bet that our crusades for oil have costs thousands of more lives than nuclear power accidents ever have.





    queen elizabeth 2nd family tree. queen elizabeth ii family tree. Queen Elizabeth Ii Family Tree; Queen Elizabeth Ii Family Tree. Agilus. Aug 7, 05:06 PM
  • queen elizabeth ii family tree. Queen Elizabeth Ii Family Tree; Queen Elizabeth Ii Family Tree. Agilus. Aug 7, 05:06 PM



  • HecubusPro
    Sep 12, 06:36 PM
    Honestly though, who would want to stream HD??
    1st, if the iTV did support HD, apple would "probably" have to sell HD content - and like hell I'm downloading a 9GB movie!!

    2nd, HardDisk space disappears fast enough as it is...!

    3rd, Why??? I have an HDTV and I barely see the difference between DVDs and 720p HDTV... (1080i is another matter).

    This was the selling point for me--HD downloads. So far what I know about this machine, I'm sold. I will gladly download 9GB files. Since I download various large files regularly anyway, this isn't a killer for me.

    The HDD space worries me a little. I'm betting they'll offer different versions with $299 being the entry level model with the smallest hard drive. More space will come on higher priced sets. But the harddisk size is something I'm a little concerned about. Does anyone know if it was mentioned wether movies bought can be transfered to another harddrive for safekeeping, or something along those lines?

    EDIT: Ahhh... so no harddrive? It just streams content you've downloaded on your computer? That's even more awesome! :)

    Personally, I notice a huge difference between DVD and regular TV. Of course, that's also dependent upon the quality of the HD transfer. Often, HDNET movies are just quick and dirty HD transfers of old movies so they don't look as nice as say an HD NFL broadcast for example. A few weeks ago, some friends were over and we were watching 2001 on HDNET movies, and they were expressing that it looked nice, but not that great (IMO, it looked amazing. I'd never seen it look that good.) Anyway, I went and got my DVD of put it in the player, cued it up to about the point in the movie where the HDNET version was at, and then I switched between the two. Everyone's jaw dropped at the difference in quality. I was even surprised a little at the disparity between the two.

    But, my fiance' is one of those who doesn't really notice that much of a difference, just like a lot of people. Regular broadcast or DVD and HD aren't like night and day. They're more like a nice day and a rainy day, if you catch my analogy.

    Anyway, to make a long story short, I'm really excited about this set top HD box. :)





    queen elizabeth 2nd family tree. queen elizabeth 2 family tree.
  • queen elizabeth 2 family tree.



  • Abstract
    Mar 19, 10:08 AM
    aah yes of course.. (slap on forehead). hmm.. then adding DRM on fly before delivering might be the workaround apple does... although as noted in my previous post, that can be defeated too.


    No no, I don't think people get it.

    If they put DRM on the track before you buy it, then everyone who buys that song will have the same song with the same DRM, which means that any computer can play it, as everyone has the same iTunes and a track with the same DRM.

    Adding specific DRM on the fly isn't what Apple has to do, either. Your iTunes still has to know that it IS the computer that you can play a particular track from, and not just any computer.





    queen elizabeth 2nd family tree. queen elizabeth 2 family tree.
  • queen elizabeth 2 family tree.



  • citizenzen
    Mar 14, 06:46 PM
    James Lovelock described nuclear as 'the only green choice'.

    As someone already mentioned, mining uranium isn't "green". Dealing with radioactive waste isn't "green". Releasing heated water back into the environment isn't "green".

    Fission itself may not produce greenhouse gases, but calling nuclear power "green" seems like quite a stretch.





    queen elizabeth 2nd family tree. queen elizabeth ii family tree
  • queen elizabeth ii family tree



  • Aduntu
    Apr 22, 08:56 PM
    If you want to argue about your religion(or lack there of), it's probably better to you use this thread (http://forums.macrumors.com/showthread.php?t=1019714). We've covered a lot of ground there.
    This thread is about why there is a higher demographic of Atheists in this particular forum.

    My apologies.





    queen elizabeth 2nd family tree. queen elizabeth 2 family tree.
  • queen elizabeth 2 family tree.



  • javajedi
    Oct 13, 11:23 AM
    Originally posted by macwannabe
    Saying that the 2.8GHz P4 is no good because it is based on 25 year old architecture is nonsense as far as I'm concerned.

    Can I take it then that you don't think that any of the cars on the market at the moment are worth having or have been improved at all on the grounds that they are based on an 80 year old design? "I don't think that BMW is any good as it is based on a Ford model T", hmmmmmmmm dodgy logic methinks.

    You are absolutely 110% correct. We've allready dismissed BackToTheMac's outlandish fallacies though :)

    I think he gets the picture now....





    queen elizabeth 2nd family tree. queen elizabeth 2 family tree.
  • queen elizabeth 2 family tree.



  • jmcrutch
    Mar 18, 08:35 AM
    This thread just shows that there are plenty of people in the world who think in self-centric ways - "I don't agree with this and I won't follow it - contract be damned."

    Happens everyday - people speed on the highways because they feel that it's their car and they should be able to do whatever they want - they support their speeding by saying that studies show the speed limits are merely to provide revenue streams to municipal gov'ts.

    Re: Napster and Limewire ... just delete and replace with things like Demonoid and ThePirateBay and it's all still relevant. The fact that someone isn't aware of the newer piracy sites just means that they've probably steered torwards legitimate pay sites like the rest of the community.

    But hey, if we all played by the rules, I guess the U.K. flag would still be flying over our land as we would not have objected to the taxation without representation (whether the SS flag would have eventually superseded it is a different question - the might of this North American body would probably still have been sufficient regardless which flag, the Stars and Stripes or the Union Jack flew).

    happy day to all!

    [For the record, I think charging extra for tethering is unfair - but charging exorbitant rates for SMS is also unfair --- make that "was" also unfair, since there are plenty of cheaper methods now than using the carrier - hopefully the same will happen with tethering).





    queen elizabeth 2nd family tree. queen elizabeth ii family tree
  • queen elizabeth ii family tree



  • RaceTripper
    Mar 24, 06:54 PM
    Aw, poor Vatican. Are your medieval feelings hurt?





    queen elizabeth 2nd family tree. queen elizabeth ii family tree
  • queen elizabeth ii family tree



  • AlBDamned
    Aug 29, 11:47 AM
    Not out of sentimentality. The other pcs are so cheap, sometimes it is easier to just buy a new one.

    So it's more about how effective, money-wise, it can be to buy a new computer. Doesn't really have much to do about their performance or longevity.





    queen elizabeth 2nd family tree. queen elizabeth 2nd family
  • queen elizabeth 2nd family



  • skunk
    Apr 24, 06:48 PM
    I completely agree with you. These Abrahamic religions do have a lot in common.Including a completely identifiable chief god and pantheon shared with other local polytheistic religions. The only difference was that in the case of Judaism, Christianity and Islam, the polytheism was suppressed and the chief god reigned unchallenged.

    Nope, not in the Old Testament either. There is a recounting of events which say what happened, but there is no commandment from God to "urge the believers to battle. If there are among you 20 [who are] steadfast, they will overcome 200...... And if there are among you 100 [who are] steadfast, they will overcome 1000 of those who have disbelieved...(qur'an 8:65) to this day.Maybe not in those exact words, but Yahweh spoke to Gad, David's seer, saying, Go and speak to David, saying, Thus says Yahweh, I offer you three things: choose you one of them, that I may do it to you. So Gad came to David, and said to him, Thus says Yahweh, Take which you will: either three years of famine; or three months to be consumed before your foes, while the sword of your enemies overtakes you; or else three days the sword of Yahweh, even pestilence in the land, and the angel of Yahweh destroying throughout all the borders of Israel. Now therefore consider what answer I shall return to him who sent me. David said to Gad, I am in a great strait: let me fall, I pray, into the hand of Yahweh; for very great are his mercies: and let me not fall into the hand of man. So Yahweh sent a pestilence on Israel; and there fell of Israel seventy thousand men. (1 Chronicles 21:9-14 WEB)and "Next we headed for the land of Bashan, where King Og and his army attacked us at Edrei. But the LORD told me, 'Do not be afraid of him, for I have given you victory over Og and his army, giving you his entire land. Treat him just as you treated King Sihon of the Amorites, who ruled in Heshbon.' So the LORD our God handed King Og and all his people over to us, and we killed them all. We conquered all sixty of his towns, the entire Argob region in his kingdom of Bashan. These were all fortified cities with high walls and barred gates. We also took many unwalled villages at the same time. We completely destroyed the kingdom of Bashan, just as we had destroyed King Sihon of Heshbon. We destroyed all the people in every town we conquered – men, women, and children alike. But we kept all the livestock for ourselves and took plunder from all the towns." (Deuteronomy 3:1-7 NLT)come pretty damned close.

    The New Testament Abrogates the Old Testament anyway, so it's not relevant to Christians.The Old Testament is absolutely valid for Christians. Without the Old Testament, the entire dynastic myth collapses on itself.





    queen elizabeth 2nd family tree. queen elizabeth ii family
  • queen elizabeth ii family



  • bpaluzzi
    Apr 28, 09:00 AM
    Best thing I could find

    http://www.pewinternet.org/Reports/2010/Gadgets/Report/Desktop-and-Laptop-Computers.aspx

    Kudos for looking for something (seriously) -- I'd argue that it's a bit limited in scope, though:
    -Limited to America
    -Limited to adults
    -Calculating by household, with strictly boolean "yes or no" (not counting multiples)

    For example, in my house, we have 4 laptops and 1 desktop machine, but for this survey, it would only be counted as "yes" for both. Actually, it wouldn't be counted at all, since we're in England ;-)





    queen elizabeth 2nd family tree. queen elizabeth 2 family tree.
  • queen elizabeth 2 family tree.



  • Ludeman
    Sep 22, 11:09 AM
    think they've sold it to me! currently got a g4 tower which does'nt play hidef to well and was thinking about either upgrading���, or getting a mini���. but now they've announced iTV(�200bargin!!!). soon i will hopefully be able serve my iTV all the media off my terrabyte hd plus the hundreds of dvd's. thanks to the ever useful "toppy"! and play it all when i want on my big hidef lcd tv and great surrond sound hi-fi in the living room thanks to iTV! personally i think apple are on to a winner, why is everbody wanting more?





    queen elizabeth 2nd family tree. queen elizabeth 2nd. queen
  • queen elizabeth 2nd. queen



  • twoodcc
    Oct 26, 12:29 AM
    well i must say i'd be kinda suprized to see an update this early with apple. especially since i just bought a mac pro. i'd be mad if the prices of the one i just bought goes down





    queen elizabeth 2nd family tree. Queen Elizabeth 2 Family Tree
  • Queen Elizabeth 2 Family Tree



  • Derekasaurus
    Sep 12, 03:27 PM
    Apple gave a sneak peak of an upcoming product. Is that a flying pig I see out my window?

    I think they did it because iTV doesn't really threaten any existing Apple products, so people aren't likely to hold off buying something while they wait for it. It's still odd behavior from Apple, but I'm not complaining.





    queen elizabeth 2nd family tree. Queen Elizabeth II Family Tree
  • Queen Elizabeth II Family Tree



  • KnightWRX
    May 2, 05:51 PM
    Until Vista and Win 7, it was effectively impossible to run a Windows NT system as anything but Administrator. To the point that other than locked-down corporate sites where an IT Professional was required to install the Corporate Approved version of any software you need to do your job, I never knew anyone running XP (or 2k, or for that matter NT 3.x) who in a day-to-day fashion used a Standard user account.

    Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...

    In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.

    You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.

    It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).

    This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.

    I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).

    Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.

    As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.

    The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).

    Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.

    Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.

    Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.

    All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.

    UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.

    There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.

    My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system

    Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.

    Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.

    That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).

    These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.





    queen elizabeth 2nd family tree. Queen Elizabeth Ii Family Tree
  • Queen Elizabeth Ii Family Tree



  • AppliedVisual
    Oct 29, 06:08 PM
    [QUOTE=AppliedVisual;2994702]
    The bug, of course, is that the programmer allocated space for 4 threads (since he knew that was the max number of CPUs :rolleyes: ).

    I guess so... Heh. I guess I should have gave it more than a quick glance (did I even look at the array declaration?) before commenting. Oh, well...





    queen elizabeth 2nd family tree. Queen Elizabeth II Family Tree
  • Queen Elizabeth II Family Tree



  • supmango
    Mar 18, 12:02 PM
    You realize there's a difference between those that "man" the CSR phones and the people responsible for the IT infrastructure, billing, etc, right?

    Of course there is a difference. But only in the individuals I am dealing with. My personal experience with AT&T (~2 years ago) is that they have difficulty communicating very basic information internally. This is things like upgrade eligibility, data plan pricing (between corporate and personal); you know, the stuff you can get pretty easily on the website. Now why would this be for a "telecom" company? This piece of evidence points to a pattern of incompetence that likely goes pretty deep. And, if in fact people are getting these threats from AT&T, and they call to discuss it with them, good luck getting any good information from the rep on the other end of the phone as to how they know this is happening.

    As other's have pointed out, it seems like there are a few legal loopholes in what AT&T is trying to do. If they send you a message and you don't call, it's on you and they can do that (in the contract). If they change your terms of service, they have to notify you within 30 days, and you can cancel the rest of your contract. If, however, you call and they can't provide sufficient evidence of what they are accusing you of doing, and they are changing your terms no matter what, you have the right to terminate service. My guess is that they won't want you to do that, unless they have evidence that you are overloading their network. In which case, I think they can change your terms and not let you out of the contract (if someone wants to look that up, great, I don't really care enough to do it).

    Someone who has received one of these messages needs to call and see what they say, and then post back. I am really curious about what kind of evidence they give you. It might be something as simple as targeting high-volume users and accusing them of tethering (as others have already mentioned).

    Just because the person that answers your call doesn't know what is going on behind the scenes doesn't mean ATT isn't FULLY aware of who is and who is not tethering or what websites you are viewing, etc.

    Perhaps, but it took them long enough to figure it out, or at least to take any action on it.

    It's one thing to have that information, its another thing to access it and get a report on usage patterns that reliably determines that it us tethering usage. Internet usage can vary widely depending on the user. So it almost requires a human eye to look at it and make that determination. Even then, it can be a hard call.

    If people aren't being careful about what they are doing online while tethered (for example, they are doing things their iPhones cannot do natively), it's pretty simple for AT&T to see that kind of activity. But someone who is smart about it can probably get by indefinitely.

    I think AT&T is starting to panicking about the people who are leaving to go to Verizon. They need to make sure they are milking every dime they can get out of the iPhone users they still have.





    queen elizabeth 2nd family tree. Queen Elizabeth II is Jimi
  • Queen Elizabeth II is Jimi



  • iJohnHenry
    Mar 14, 06:19 PM
    We Brits always made do with punkah wallahs. Useful local employment opportunities and saves on polluting the atmosphere.


    Ah, the glory days of the British Raj. LOL Thanks for the laugh.





    matticus008
    Mar 19, 01:29 PM
    But can a user be considered to be a party to that agreement if they have not used iTunes to access the store - does the purchasing process still involve an agreement approval stage using this software? Presumably not.

    Yes. By signing up for an account to use the iTunes Music Store, you are bound to their terms of service. Those terms only appear in the official iTunes client because that's the only source for the music. Just because those terms don't pop up on the screen if you use this PyMusique thing doesn't mean you aren't responsible for knowing. For example, if you do not receive a bill in the mail for your credit card, you are still responsible for making the payment and paying any late fees--it is your responsibility as the borrower to make the appropriate payment on time. By using the service, you are implicitly agreeing to the terms of service and use, including Apple's rights to prosecute (should they choose to) for your violation of those terms (i.e. using a non-approved client application). This is enforceable; whether Apple chooses to do anything about it remains unclear.

    Also enforceable is the DMCA violation (and yes, it is a violation, because you are BYPASSING technology designed to secure DRM). Even though you paid for the songs, you also paid for the license for that song (which includes DRM), and you are breaking encryption by bypassing it. Walking through a hole in a fence is still trespassing, whether you made the hole or not. Again, from a legal perspective, this is a punishable violation.

    I'm not saying that I like having my digital music locked down more vigorously than a CD I buy. But there are logical reasons for doing so. Namely, that the digital version, if un-DRMed, can be copied and transmitted with no special software or effort. If I want to share a CD, I have to burn a copy (requiring hardware and software) or extract the audio digitally and transmit it. Digital music does all that for you, and Apple's DRM gives you appropriate fair use rights. The DRM is designed to prevent casual copying that results in lower license sales.

    You don't own the music you've bought, and you don't have any legal right to redistribute it because your license does not allow it. Should you be able to use it on any type of device you choose? Yes. Does DRM prevent that from happening? Often, also yes. Can you choose a different format that works with all devices (standard MP3 imported from a CD)? Yeah, but not on purchased iTunes music. Until DRM and file format technology becomes standardized, you have to deal with "early adopter syndrome" in a volatile market, which can result in purchases not being universally compatible (betamax/VHS/laser disc/DVD anyone?). Make a choice that works for you.

    By purchasing AAC with Apple's DRM, you are choosing a file format with known and public limitations that will only work with a specific combination of hardware and software. You chose the delivery platform; you can't buy Windows software and then complain that it doesn't work on your Mac without buying it again. That's the way business works. Of course it would be fantastic if buying a license of Office for my PC gave me a corresponding license for all the other computer platforms I use, but that's not the case. Even say, Dreamweaver, which gives you Mac and PC installers, is only licensed to be used on one of the computers. I can install it on both, but that doesn't make it right or legal, even if I think that Macromedia is horrible (which I do).

    In conclusion, breaking or bypassing DRM, while understandable on a basic level for getting compatibility with everything, is against the law. Using tools to do this which violate the iTMS terms of service is also a legal violation. The best way out of this situation is to support a universal standard that ensures compatibility with all devices and file formats. DRM isn't going away, and it shouldn't. But it should also not work against honest customers who just want iTunes songs to play on their Rio. Long post, my apologies.





    -aggie-
    May 5, 10:40 AM
    AT&T's plan worked brilliantly.

    They put me through a year where about 40% of my calls got dropped and then fixed it so only about 5% get dropped now.

    So even though that's worse than the other carriers I am personally thrilled with that number.

    So...good plan, AT&T!

    I'm in your area, but out in the boonies. I've never had a dropped call.





    cublah
    Mar 18, 09:26 AM
    I use HandyLight to tether, but only occasionally. I wonder if they can detect that. I don't know what method the jailbreak way uses.

    They can detect in a lot of way, for instance since you can't use flash on an iphone or iPad, if they see lots of flash stuff they you are probably tethering, also certain popular sites detect mobile devices and send the mobile version of the site if you are loading the full versions of those sites they could detect tethering, these are only a couple of simple things but there are plenty more, so I don't think this is going to be limited to the latest iOS.

    Just my thought on the matter.





    Wilbah
    Jun 3, 09:53 AM
    I have set up a contract with a provider BEFORE committing to a long iphone contract. I go into the said telephone store and set up some other non iphone device. Then return home and test its capability and signal strength. If it is acceptable I return the above phone for a full refund(I use it far less than the maximum 30 days. Then when the desired iphone is purchased I will expect the same performance.


    Not sure this is a good test...

    I'm beginning to see that while ATT is the bigger culprit, the iphone itself may play a role in what happens with dropped calls...

    My service (as is well documented in these forums) at home was/is terrible.

    I recently purchased the microcell, from ATT, and I can now make calls in my house!! Except, when I move exactly 20 feet away from the microcell into my kitchen, my iPhone struggles with itself to pick up the 2 bar distant tower that was the guilty party in dropping my calls... so now, in my house iPhone juggles between a 5 bar microcell and a 1-2 bar tower (which still drops calls). It also drops every call that I'm on if i leave my house during a call, or arrive at my house during a call.

    I have reset the network settings on iphone, to no avail...

    Before this week and the microcell experiment, I wouldnt have said this, but I honestly believe that the software that drives the phone is playing a huge part in how the phone handles tower switches, and thus is a culprit in the dropped call phenomena.





    AppliedVisual
    Oct 20, 02:36 PM
    So the high end will no longer be at 3ghz?

    How hard can an extra 333mhz be to attain? Especially with these cool-running Intel chips.

    It will come, just not with the initial production models. With the quad-core chips, Intel is already running into FSB bandwidth issues as it is. The Clovertowns are essentially dual Woodcrest CPUs stuck on the same die, sharing the same FSB and communication between the first duo-core CPU and the second duo-core CPU on that die must travel onto the FSB and into the other CPU. Between the two cores that are linked directly, data sharing can be handled through the L1 cache. So, depending on your application, the 8-core may be no better than a 4-core system -- if what your'e doing is already maxing out your CPU bus bandwidth. Somwhere down the road as Intel shifts to its 45nm production process and fully integrates all 4 cores on a single CPU (and later, 8 cores on die), we will see massive improvements in inter-core bandwidth. They will have to step-up on the FSB bandwidth though... Possibly by increasing the MHz, but more than likely we'll see some of that combined with increasing the width of the data path and possibly using multiple parallel FSB designs. ...Going to be interesting, that's for sure. And with Intel's new process and the plans for continuously jamming more cores onto a die at higher speeds, I think we're in for a real ride over the next 5 years or so.



    No comments:

    Post a Comment