Feeds

IBM boffins unveil 0.08 micron chip process

Electron beams replace light to boost chip transistor counts 1000 times

  • alert
  • submit to reddit

High performance access to file storage

Scientists at IBM working with colleagues at Nikon have developed a new technology that promises to boost the number of transistors built into a microprocessor by a factor of 1000. The technology, called Prevail (Projection Reduction Exposure With Variable Axis Immersion Lenses), uses beams of electrons to etch the transistors into silicon in place of the optical beams used by chip makers today. The IBM team unveiled the technology earlier this week at a meeting on the International Society for Optical Engineering, held in Santa Clara, California. To increase the transistor count using optical technology, you need to reduce the wavelength of the light used in the etching process. Today's chips contain transistors of 0.18 micron in length, roughly one hundredth of a millimeter. The next stage is to get that down to 0.1 micron. However, electrons have an effective wavelength one hundred thousand times smaller than the light used in lithography today, the upshot of which is it allows chip makers to create transistors thousands of times smaller than they can now. Electron beam technology however presents problems in terms of mass production, because the lines have to be etched one at a time. Current technology on the other hand allows multiple chips to be 'projected' at the same time. A key aspect of the IBM-Nokin breakthourgh, however, is that the electron beam can be projected in a pattern etching many lines simultaneously. IBM's proof of concept system has produced transistors at 0.08 microns -- two and a quarter times smaller than current 0.18 micron transistors, but the research team believes the technology can be refined to shrink that down to beyond 0.03 microns. However, they admit that's going to take some time - it took most of the last decade just to develop the technology and turn it into a working model. ® Related Stories Researchers beat Moore's Law with quantum magic Big Blue boffins to unveil 4.5GHz CPU breakthrough Motorola slims chip transistors to quarter of current size Boffins pave way for 400x rise in CPU transistor count US scientists develop molecular memory Gas chips to replace semiconductors, predicts boffin

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.