Solved

Pentium II ODP

Posted on 1999-01-14
5
170 Views
Last Modified: 2010-04-27
Anyone have any information on how Intel controls and locks the clock multiplier at 5.0x on the P2ODP/module for socket 8 processors? I wonder what it would take to modify the clkmul on this module?

John
0
Comment
Question by:iolair
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 9

Accepted Solution

by:
rmarotta earned 100 total points
ID: 1133347
If you're asking about info for over-clocking Slot 1 Pentium II CPU modules, the following site has info and addional links:

http://www.3dhardware.net/features/slot1voltage/index3.shtml

Let me know if you need more.
If this isn't what you are looking for, please reject the answer.

Regards,
Ralph
0
 

Author Comment

by:iolair
ID: 1133348
Thanks for your response. I will take a look at the URL that you provided, but the Pentium II Overdrive processor is not actually a slot 1 interface, it bolts right into the socket 8 that the Pentium Pro used to inhabit so I would imagine that the slot 1 information might not apply to this socket 8 module with undoubtably different pinouts. The clkmul is locked at 5.0x with a maximum of 66MHz for the FSB = 333MHz.

John
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1133349
Oops!  That info won't help much then.  Unless it gives you an idea of what to do in order to "trick" yours into using  a different multiplier.

Ralph

0
 

Author Comment

by:iolair
ID: 1133350
Ok, thats an idea......maybe I can get a data sheet for the P2ODP and see if I can ferrit out some clkmul info.

Thanks so much! :-)
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1133351
Good luck with it.
Ralph
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question