Feeds

Samsung adopts latest 3D chip stack tech

Follows IBM, Intel

The Power of One Brief: Top reasons to choose HP BladeSystem

First IBM, then Intel, now Samsung. The South Korean chip maker today said it too was going to implement the 'Through Silicon Via' (TSV) technique to allow it to stack layers of chip dice more efficiently.

TSVs are tiny tubes drilled through a chip's silicon foundation and filled with metal and capped with connector bumps. The tubes provide a high-speed route for power and for data between dice places one above the other. The TSV approach also allows chip makers to add many, many more chip-to-chip connections than they can if they're limited to wiring chip packages or even separate dice together.

IBM announced its move to TSVs two weeks ago. Intel said much the same thing last week. Both want to use the method to connect memory to processors, and processors to processors. Samsung today said it would use the technique as a way of stacking memory chips more efficiently.

Samsung memory module

As a prototype, it's connected four 512Mb DDR 2 SDRAM dice to form a single 2Gb/256MB chip. A heap of these were used to create a 4GB DIMM - double the maximum capacity currently found on memory modules designed for desktops rather than servers.

Not that these will be coming to market any time soon: Samsung said it was developing the process for "next-generation computing systems in 2010 and beyond".

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.