CETS to build systems exclusively using x64 architecture

CETS is apparently going to be the first company to build desktop, mobile, workstation and server systems that are exclusively x64 (that is, systems that have exclusively 64-bit architectures).

Other companies do build x64 systems, but apparently none build systems that are exclusively x64, meaning that many companies still also build x86 (32 – bit) systems.  What are the advantages of x64 systems?

A common misconception is that 64-bit architectures are no better than 32-bit architectures unless the computer has more than 4 GB of main memory. This is not entirely true:

Some operating systems and certain hardware configurations limit the physical memory space to 3 GB on IA-32 systems, due to much of the 3–4 GB region being reserved for hardware addressing. This is not present in 64-bit architectures, which can use 4 GB of memory and more. However, IA-32 processors from the Pentium II onwards allow for a 36-bit physical memory address space, using Physical Address Extension (PAE), which gives a 64 GB physical address range, of which up to 62 GB may be used by main memory; operating systems that support PAE may not be limited to 4GB of physical memory, even on IA-32 processors.

    Some operating systems reserve portions of process address space for OS use, effectively reducing the total address space available for mapping memory for user programs. For instance, Windows XP DLLs and other user mode OS components are mapped into each process’s address space, leaving only 2 to 3 GB (depending on the settings) address space available. This limit is currently much higher on 64-bit operating systems and does not realistically restrict memory usage.

    Memory-mapped files are becoming more difficult to implement in 32-bit architectures. A 4 GB file is no longer uncommon, and such large files cannot be memory mapped easily to 32-bit architectures; only a region of the file can be mapped into the address space, and to access such a file by memory mapping, those regions will have to be mapped into and out of the address space as needed. This is a problem, as memory mapping remains one of the most efficient disk-to-memory methods, when properly implemented by the OS.

    Some programs such as data encryption software can benefit greatly from 64-bit registers (if the software is 64-bit compiled) and effectively execute 3 to 5 times faster on 64-bit than on 32-bit.

      The main disadvantage of 64-bit architectures is that relative to 32-bit architectures, the same data occupies more space in memory (due to swollen pointers and possibly other types and alignment padding). This increases the memory requirements of a given process and can have implications for efficient processor cache utilization. Maintaining a partial 32-bit model is one way to handle this and is in general reasonably effective. For example, the z/OS operating system takes this approach currently, requiring program code to reside in 31-bit address spaces (the high order bit is not used in address calculation on the underlying hardware platform) while data objects can optionally reside in 64-bit regions.

    Currently, most proprietary x86 software is compiled into 32-bit code, with less being also compiled into 64-bit code (although the trend is rapidly equalizing, so much does not take advantage of the larger 64-bit address space or wider 64-bit registers and data paths on x86 processors, or the additional registers in 64-bit mode. However, users of most RISC platforms, and users of free or open operating systems (where the source code is available for recompiling with a 64-bit compiler) have been able to use exclusive 64-bit computing environments for years due to the likelihood of the existence of someone willing to compile the code thusly. Not all such applications require a large address space nor manipulate 64-bit data items, so they wouldn’t benefit from the larger address space or wider registers and data paths. The main advantage to 64-bit versions of such applications is the ability to access more registers in the x86-64 architecture.


ENTERPRISE TECHNOLOGY SOLUTIONS ARCHITECT, PRINCIPAL CONSULTANT and TECHNOLOGY, MEDIA & TELECOMMUNICATIONS CONSULTING MANAGER - Highly disruptive, non – standard approach in the Information Systems & Technology Industry of initiating game – changing strategies to overturn the status quo and make the biggest, longest – lasting impact possible Demonstrable abilities in fostering personal and business - professional processes that allow people to overcome adversity and a firm belief in protecting developments in evolving technologies further allowing me to: A) Provide professional real – time technology advice and consultation to: Ø C - level Ø B2B / B2E Ø Individual Clients thereby being regarded as a valued advisor to all, including formerly by senior management B) Bridge communication gap between: ØØ Technical projects and organizational management / client objectives ØØ Projects with differing objectives ØØ Technicians and non-technical management and users ØØ Diverse specialists integrating diverse and often conflicting viewpoints; thereby facilitating communication between each VAR / CHANNEL PARTNER RELATIONSHIPS: Current: Intel, Seagate, AMD Fusion Partner, Kaspersky Labs, Crucial, Microsoft, NVidia, Oracle Networks, Novell Networks, Sun Microsystems (Current VAR / CP Applications Pending: Cavium Networks, NetLogic Microsystems, ASUSTek, Tyan, Targus) Past: Intel, Adobe Systems, AMD, Belkin, Creative Labs, Logitech, Microsoft, Oracle Networks, Novell Networks, Panasonic, Philips Electronics Research, Seagate, Sharp Electronics Corp., Sun Microsystems, Toshiba, Trend Micro CORE DISRUPTIVE MANAGEMENT COMPETENCIES / DISRUPTIVE MANAGEMENT VALUE OFFERINGS: Revenue Growth Initiatives, Technology Collaboration, Sarbanes Oxley Compliance, Cost Optimization, SLA Targets, Infrastructure Technologies, Due Diligence Reviews, Change Management, E – Business, Web 2.0, New Business Development, Process Re – engineering ASSET MANAGEMENT COMPETENCY / OFFERING: Cumulatively managed over $1.2 billion in military POL and civilian technological and computing solutions assets. CORE TECHNOLOGY COMPETENCIES / TECHNOLOGY VALUE OFFERINGS: Industry Standard Architecture, System Design, Network Planning / Design, Network Integration, Tier I / Tier II Software / Hardware Support, Technology Deployment, Software Lifecycle, IT Service Management, Enterprise Consulting, Technology QA / QC

Tagged with: , , , , ,
Posted in CETS Systems built exclusively using x64 architecture

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: