Intel Buys an ARMy. Maybe
Is Intel in trouble? Since it is the #1 semiconductor company and, shipping 22nm in Q4 this year with 14nm in 2013, it is two process generations ahead of everyone else it is hard to see why it would be. Intel, of course, continues to dominate the market for chips for notebooks, desktops and servers. But therein lies the problem. Pads are killing netbooks and nibbling at notebooks. These are not growing markets and actually are starting to gradually shrink. Instat reckons that in Q1 2011 PC volumes are down 2-3% from Q1 2010, largely due to incursion of iPads.
The growing markets are largely ARM-based: smartphones and iPad type computers. Intel’s approach to these markets has not been a success. First, after its acquisition of (part of) Digital’s semiconductor business it got StrongARM, renamed it Xscale, and invested something like a billion dollars in trying to penetrate the communications business. Eventually it disposed of that business to Marvell in a fire sale. Depending on what residual rights they retained this could turn out to have been an enormous strategic error. They didn’t just give up a ARM manufacturing license, they gave up a do-pretty-much-anything ARM architectural license.
To read the full article, click here
Related Semiconductor IP
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
Related Blogs
- 'Take An ARM licence,' Saxby Tells Intel.
- If an Intel 10nm transistor fell in the ARM forest
- Intel buys Tower - Best way to become foundry is to buy one
- Morgan State University (MSU) Leveraging Intel 16 and the Cadence Tool Flow for Academic Chip Tapeout
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol