Feeds

Intel's Otellini outlines chip strategy

No intention to squash rivals

  • alert
  • submit to reddit

High performance access to file storage

Paul Otellini, general manager of Intel's architecture business group, paid a whistle-stop visit to London today and outlined the company's business strategy. He also mentioned a new product which comes out next week which we're not allowed to talk about. So go here to find out about the 550MHz Pentium III. Otellini said: "Two years ago, we realised how important the Internet would be. We were looking for the new killer application. It appeared underneath us and it was the Internet." He said Intel's transition from the Pentium II to the Pentium III would be the fastest ever. "Very soon we'll have .18 micron on the Pentium III for both desktops and mobiles and that will give us economies of cost and speed," he said. He said that the Intel architecture will be the premier method of accessing the Internet. Although Intel is committed to developing the StrongARM platform, he said no one was entirely sure how successful the so-called appliance market would be. "It could be a zero billion dollar business," he said. He said that Intel had not yet had a chance to look at AMD's K7. "We look at every product competitively," he said. "Intel's major goal is typically to displace our own products and to bring out new products that better the old ones," he said. On Intel's pricing on the Celeron processor this year, he said: "We'll be as competitive as we need to be at the low end. We've always made money on the Celeron, it's a profitable product for us. You can't sell below cost -- it's illegal in the US. We don't aim to squash anybody, we aim to be competitive." He said Intel was happy with the progress of the IA-64 platform. "We announced the $250 million fund [earlier this week] to work on the next layer of applications for smaller companies that may not have the financial means to port ," he said. "I'm comfortable wthat we'll have enough target applications at the time of the Merced launch," he said. "IA-64 will be faster and more cost effective. We're trying to move to places where IA-32 does not yet reach." ® See also Intel's desktop chip prices Intel's mobile chip prices Intel's server chip prices

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.