Feeds

Intel to return to discrete GPU arena

Back in the game after eight years

High performance access to file storage

Intel has committed itself to developing a discrete graphics product. It's been suggested for some time that it might have such a scheme in mind given the success of its integrated graphics products, and the fact that arch-rival AMD now owns ATI.

Intel hinted at such a move last month, but this is the first time it has come clean and admitted what it's up to.

The chip giant's statement of intent is all there in black and white on its website. Originally spotted by a Beyond3D forum poster, the situations vacant portion of Intel's online presence has a second devoted to the company's Visual Computing Group (VCG), which is "focused on developing discrete graphics products based on a many-core architecture targeting high-end client platforms".

If that's not about creating discrete GPUs for gaming and digital content creation, we'd like to what is.

The VCG is separate from the Chipset Graphics Engineering Group (CGEG), which again shows this isn't about making better integrated products, though we're sure VCG's efforts will feed into what the CGEG is doing.

Intel's last discrete graphics chip was 1998's i740, a product of the chip giant's 1997 acquisition of Chips & Technologies. At the time the i740 was knocked on the head, in 1999, Intel had two other GPUs in the works: the i752 and the i754. The i754 was canned around the same time as the i740 because the i752 was considered to be more than sufficient for the task in hand. Intel may have sampled the i752, but so far as we know it never made it to market, being canned later in 1999.

AMD's plans for ATI are predicate on its view that GPU technology will eventually be incorporated into the CPU as one core among many. Since Intel is building up its VCG team now, it's hard to see it offering product in the near term, so it's entirely possible it is working to the same gameplan as AMD, by establishing its own GPU team rather than acquiring one.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.