Differentiating i3, i5, and i7


Many people out there don’t know about the difference between Intel’s new series of processors. The i3, i5, and i7. These are just great processors, made for everyone on the planet, satisfying everyone’s needs, making you smileJ.
Everyone don’t need an i7 (The KING), and only KINGs can afford to one of them. These processors use minimum number of cores to perform well. They use Hyper Threading which enables these processors to work as two cores. Speaking of which, I’ll have to explain a lot, like about threads, thread life cycle etc.
Well now I’ll give a good basic clear explanation and provide links to more true information. How about that? J

Intel Core i3

The Intel Core i3 is the first guy, an entry level processor in the great “i” series. In simple words this guy is an intelligent dual core processor. The i3 uses 2 cores with Hyper threading technology yielding a quad core like processing.

Open “Control Panel\All Control Panel Items\Administrative Tools”, look for a “Computer Management” icon, open it, and check the device manager. You will find 4 processors with same clock speed under the processors (collapse it).

This processor series features



Intel Core i5

This processor series features


·         
This is recommended almost all applications, including programming, multimedia processing, image processing etc.

Intel Core i7

This is the best of all. As mentioned above, the KING of all. This processor is available in 4 Cores and 6 Cores (Extreme). The i7s have higher clock speeds and large cache memory. This is the best processor ever, the best ever for gamers!

This processor series features


·        
More precise information is shown below, from Wikipedia.


BrandDesktopLaptop
Code-namedCoresFabDate releasedCode-namedCoresFabDate released
Core Solo
Desktop version not available
Yonah165 nmJanuary 2006
Core Duo
Desktop version not available
Yonah265 nmJanuary 2006
Core 2 Solo
Desktop version not available
Merom-L
Penryn-L
1
1
65 nm
45 nm
September 2007
May 2008
Core 2 DuoConroe
Allendale
Wolfdale
2
2
2
65 nm
65 nm
45 nm
August 2006
January 2007
January 2008
Merom
Penryn
2
2
65 nm
45 nm
July 2006
January 2008
Core 2 QuadKentsfield
Yorkfield
4
4
65 nm
45 nm
January 2007
March 2008
Penryn445 nmAugust 2008
Core 2 ExtremeConroe XE
Kentsfield XE
Yorkfield XE
2
4
4
65 nm
65 nm
45 nm
July 2006
November 2006
November 2007
Merom XE
Penryn XE
Penryn XE
2
2
4
65 nm
45 nm
45 nm
July 2007
January 2008
August 2008
Core i3Clarkdale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
Q3 2012
Arrandale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
June 2012
Core i5Lynnfield
Clarkdale
Sandy Bridge
Sandy Bridge
Ivy Bridge
Ivy Bridge
4
2
4
2
4
2
45 nm
32 nm
32 nm
32 nm
22 nm
22 nm
September 2009
January 2010
January 2011
February 2011
April 2012
April 2012
Arrandale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
May 2012
Core i7Bloomfield
Lynnfield
Gulftown
Sandy Bridge
Ivy Bridge
4
4
6
4
4
45 nm
45 nm
32 nm
32 nm
22 nm
November 2008
September 2009
July 2010
January 2011
April 2012
Clarksfield
Arrandale
Sandy Bridge
Sandy Bridge
Ivy Bridge
4
2
4
2
2
45 nm
32 nm
32 nm
32 nm
22 nm
September 2009
January 2010
January 2011
February 2011
May 2012
Core i7
Extreme Edition
Bloomfield
Gulftown
Sandy Bridge-E
4
6
6
45 nm
32 nm
32 nm
November 2008
March 2010
November 2011
Clarksfield
Sandy Bridge
Ivy Bridge
4
4
4
45 nm
32 nm
22 nm
September 2009
January 2011
May 2012




 

Hacking And Cracking





      There are many words that confuse us, when in the field of computer. Such a term is 'Hacking'. Most of us know what is hacking, we usually see cyber crimes in the news. Most probably like this “Unknown hacker manipulated the server of the City bank”, Such a news in the leading channels and newspapers could actually manipulate the word 'hacker' or entirely the process 'hacking'. Then what is Hacking?
Now I am going to discus about Hacking. Before knowing about hacking we should know about, what Cracking is? Cracking is something just opposite of Hacking. It's a process where computerphiles invades others computers through the network, they simply corrupt data, or spy into our data and manipulate it! And to the core it is not at all hacking.
Let me highlight an example... Everyone have an e mail ID most probably with yahoo, gmail, hotmail etc such common e mail providers, and all you will have a username and password. The username will be known to any one who knows the e mail ID. Example: name@yahoo.com here name stands for the username and the password will be known only to the user. Now to the subject, Cracker will acquire the password with means of some critical data which is known only by the email providers! Thus he manipulate everything, now he can send mail to anyone in the world, deletes your important mails and data using your email id and the password he just cracked, this creates problems.
These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer.
Now you may have got an idea about cracking, or who a cracker is?. A confusion may arise in your thoughts about the process hacking, let me solve it.
A hacker is also a computerphile-a person totally engrossed in computer programming and computer technology. Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick. So hacking is just something positive.
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
The action of a cracker is offensive, so never crack!




By: Vishnu Balaji

 

Popular Posts