Need of cisc cpu - computer architecture, Computer Engineering

Need of CISC CPU -  computer architecture:

Why is Intel spending money and time to manufacture the Pentium II and the Pentium III?

The answer of this question is simple, backward compatibility. The IBM compatible PC is the most widespread computer in the world. Intel desired a CPU that would run all the applications that are used by 100 million users. Alternatively Motorola which builds the 68xxx series which was utilized in the Macintosh made the transition and together with IBM and Apple built the Power PC (PPC) a RISC CPU which is installed in the new Power Macs. As of Intel and the PC manufacturers are earning more money but with Microsoft playing in the RISC field as well (Windows NT runs on Compaq's Alpha) and having the pro mise of Java the future of CISC isn't obvious at all.

Significant lessons that can be learnt here is that superior technology is a factor in the computer industry, but also impacted by marketing and price as well (if not more).

 

Posted Date: 10/13/2012 3:45:28 AM | Location : United States







Related Discussions:- Need of cisc cpu - computer architecture, Assignment Help, Ask Question on Need of cisc cpu - computer architecture, Get Answer, Expert's Help, Need of cisc cpu - computer architecture Discussions

Write discussion on Need of cisc cpu - computer architecture
Your posts are moderated
Related Questions
Explain Bottom-up Parsing Techniques A parser can begin with the input and attempt to rewrite it to the start symbol. Instinctively, the parser attempts to locate the most bas

Ring This is a easy linear array where the end nodes are connected.  It is equivalent to a engage with wrap around connections. The data transmit in a ring is normally one dire

It is an object of a number of classes whose purpose is to indicate that a real object of that class does not exist. One common use for a null object is a return value from a membe

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

What are the basic functions of Database utility? The basic features of database utility are: Make database objects. Remove database objects. Adjust database obj

What is logical address space and physical address space? The set of all logical addresses generated by a program is known as a logical address space; the set of all physical a

Q. Convert the following BINARY numbers into OCTAL, double check by converting the result OCTAL to BINARY. a) 111.111 b) 10110111 c) 0.11111

An analog information signal, whose maximum frequency is 6000Hz, is to be transmitted using a PCM system. The quantization error must not exceed the ±1 % of the peak-topeak analog

Q. What is the dissimilarity between a lens and a mirror? Answer:- A mirror is a reflective surface that light passes through the glass and hits the silver backing reflect

Illustrate some notations of object modeling notations A classifier is a mechanism which describes behavioural and structural features. In UML significant classifiers are cla