In-depth

What’s so great about Intel’s Sandy Bridge?

Intel’s latest generation of processors, codenamed Sandy Bridge, was recently released to huge acclaim. Clive Webster investigates what all the fuss was about.

Intel's latest range of processors shows a significant change in Intel's approach to computing, as its latest Sandy Bridge processor architecture has been engineered for laptops. A few years ago, describing a processor as for laptops' would have been a polite way to say it was pointlessly slow or extortionately priced. However, this new range of processors is not only very power-frugal, but also very fast and yet reasonably priced. The only downside is determining a Sandy Bridge CPU from a previous-generation Core i3, Core i5 or Core i7 processor.

Intel is (erroneously) referring to the Sandy Bridge range as its 2nd Generation Core processor, but we've had Intel CPUs branded as Core since early 2006 and have seen at least three new Core-branded CPU designs since then. Intel hopes that the 2nd Generation' tag differentiates the new range of Core i3, Core i5 and Core i7 processors from the previous range.

Another way to spot a Sandy Bridge processor is that the model number is four digits long while previous-generation CPUs have three-digit model numbers. The final clue to finding a Sandy Bridge CPU is the new socket: LGA1155. It might sound less complex than the LGA1156 socket it essentially replaces, but it's a completely new (and incompatible) design. The LGA1156 range will continue as a cheaper option, however.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019