Feeds

AMD, IBM pool chipmaking development

Makes sense

  • alert
  • submit to reddit

AMD and IBM are teaming up to develop chipmaking processes for use in new high-performance processors.

IBM is of course a major semiconductor player and a powerhouse of materials and processor design. But like AMD, it is a minnow compared with Intel. An AMD-IBM combo should mean that both can now comfortably, or less uncomfortably than before, keep pace with the capex arms race set in train by Intel.

AMD and IBM say they will aim to improve microprocessor performance and cut power consumption, through the use of materials such as high-speed silicon-on-insulator (SOI) transistors, copper interconnects and improved low-k dielectric insulation.

The duo are also collaborating on 65nm and 45nm production technologies to be used in 300mm silicon wafers. They reckon the first 65nm chips will roll out of their respective fabs in 2005.

In January last year, AMD announced a deal with UMC, the Taiwanese contract semiconductor maker, to build a new 300mm wafer chipmaking factory in Singapore. But according to EE Times, the IBM deal means the end of this relationship. The UMC gig had only got to memorandum of understanding stage, AMD told the magazine. ®

Related story

AMD talks Ab Fab with UMC

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.