Feeds

Top scientist and Itanic critic ‘leaves’ NEC

Fear The Fist

  • alert
  • submit to reddit

Who will now dare criticize Intel's Itanium processor? Even some of the most distinguished engineers in the industry might now have second thoughts before speaking freely on the subject.

NEC's chief technologist poked fun at the IA-64 instruction set at an industry conference in July, and has now paid the price with his job.

Leonard Tsai confirmed that he had left NEC two weeks after making the remarks at the Platform Conference in San Jose, and that his departure was related to his comments. He had been Chief Technologist at NEC Systems Inc. since July 1998, and represented the company on several industry initiatives.

Earlier this year a UC Berkeley academic underwent an extraordinary conversion from being an Itanium critic to a born-again supporter. (See: Miracle cures Berkeley man of Itanic wickedness).

NEC is a major Intel customer and Itanium OEM. Tsai had claimed Chipzilla was bullying OEMs into supporting Itanic. An email from Intel's server executive "Iron" Mike Fister drew this response from NEC management, reports InfoWorld:

"Kobayashi wrote back to me and said, 'Oh my gosh, let me make the situation better,'" Fister said.

Tsai left on August 1.

So beware, then, The Fist. ®

Related Stories

Miracle cures Berkeley man of Itanic wickedness
Itanic: It's all academic now - Official
Itanic OEM slams Itanic

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.