Feeds

Intel: watch out for those network building blocks

Level One, Softcom -- what's next?

  • alert
  • submit to reddit

High performance access to file storage

A week ago, we pointed out that Intel's share price was on an inexorable rise and indeed when Wall Street shut Friday, with the price at $66¼, not too far off the $75 we predicted then. Intel's financial results come out Tuesday and we see no reason why its price shouldn't rise further tomorrow, given that it's expected to show little pain from competing processor companies such as AMD, Cyrix et al. When Craig Barrett, CEO of Intel, was in London a few weeks ago, he said that his company was in the business of providing "building blocks" to the computer industry. Employing not a little stealth, Intel has been ensuring that over the last year it has some of those blocks in place, particularly in the area of high-speed networking and datacoms. Last Thursday it bought privately owned Softcom Microsystems but this is only one item in the $3 billion Intel has spent over the last year on moving into the networking and telecomms market. One of its bigger acquisitions, Level One, which cost Intel $2.2 billion, went practically unnoticed by the world+dog when it was bought on the 5th of March this year. This time last year, Intel struck a strategic relationship with Level One, so perhaps the deal should have been foreseen. Intel's ambition to own the building blocks of the computer industry now extends far beyond the microprocessor in your desktop, notebook or server PC. It is remodelling itself as an Internet company and if it owns a good chunk for the building blocks for that phenomenon, it will be in a vastly more powerful position than before. Internet server farms and deals with ISPs and language translation companies, as well as companies like Level One and Softcom, all fit into Barrett's building block model. He's a manufacturing man, so look out for more infrastructure buys. Intel has 67,000 employees and The Register only has eight journalists, so sometimes it's hard to track Chipzilla in its move to become an even bigger player in the world wide market. But trace elements and particulates such as Softcom all provide the clues to the scale of Satan Clara's ambitions. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.