Feeds

Intel, Mitsubishi coy on cellular devices

Not that we mind speculating

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

In an intriguing announcement Intel says it will work with Mitubishi to produce chipsets for 3G mobile phones.

The intrigue largely comes from what's left unsaid, rather than the commitments. Cellular manufacturer Mitsubishi stop short of saying will produce devices, committing more cautiously to marketing 'chipsets and software' in Japan as a result of the agreement.

Nor is there any mention of StrongARM in the release, but it's obvious enough where a "high-performance, low-power" could come from. Mitsubishi was one of DEC's original licensees for StrongARM and has been a faithful licensee of ARM cores.

Which leaves the software question unanswered. Intel acquired two reference designs for CDMA and TDMA handsets when it acquired DSP Communications recently. We note that Symbian ported a version of its OS to StrongARM in the labs and continues to use it too as a reference platform, although licensees are committed to ARM7/9 or M-CORE processors.

Intel and Mitsubishi promise to have the chipsets ready in time for 3G's Japan launch. ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.