Feeds

Intel to extend chip-tech dominance

Bad news for AMD, IBM

High performance access to file storage

According to an article in today's EE Times, Intel will "extend its lead over AMD, IBM and other microprocessor vendors" at next week's übergeekfest, the 2008 International Electron Devices Meeting (IEDM) in San Francisco.

Specifically, Intel will present papers that detail the company's latest advances in high-k/metal-gate technology, a transistor-manufacturing advantage that has competitors AMD and IBM struggling to play catch-up.

Although the phrase "high-k/metal-gate technology" may sound mind-numbingly esoteric, it's simple in concept - and the fact that Intel's got it and AMD and IBM don't is a powerful plus for the Santa Clara, California chipmeister.

Here's how it works: Simply put, a transistor in any chip is just a switch. Take a light switch, change the names of its parts into chip-speak, and the function of a transistor's gate becomes clear. When you flip a light switch's lever (gate), electricity flows from one wire (source) through the switch's circuitry (channel) to a second wire (drain). To make the switch work, however, there must also be insulation between the lever/gate and the circuitry/channel; in a transistor that insulation is called the gate dielectric.

Still with us? Good, because here's where the aforementioned high-k/metal gate technology comes into play - and why it gives Intel an advantage over other chippies.

As chipmakers have shrunk the sizes of their chips - essentially measured by the distances between transistors - the gate-dielectric insulation layer has shrunk as well. Problem: the thinner a gate dielectric, the more power it leaks, and the more power it leaks, the less efficient the transistor is and the hotter it gets. Both bad.

When chips first appeared back in the 1960s, gates were made of polysilicon, and gate dielectrics of silicon dioxide. At the current process-technology standard of 45nm, those two substances are stressed to their limits - they leak more than a Congressional staffer.

Enter - finally - high-k/metal-gate technology. Back in 2007, Intel replaced the silicon dioxide in the gate dielectric with a metal - hafnium - and the polysilicon in the gate with a proprietary metallic melange. The two substances work togethr to create a gate that has a "high-k," meaning superior insulation performance.

How superior? Intel claims that their high-k/metal-gate technology cuts leakage by about a factor of five. All good stuff.

IBM and AMD haven't kept up. Although AMD's technology partner IBM announced in 2007 that they were thiiis close to achieving high-k/metal-gate success, they haven't yet pulled it off. For their part, AMD's presentations for its 45nm family refer to high-k/metal-gate technology as a "future 45nm option."

While its competitors have been been struggling to get their gate acts in order, Intel has been busy perfecting a second-generation high-k/metal-gate technology in preparation for moving it down to its next-smaller process, 32nm, scheduled for broad release next year.

As if to rub its rivals' noses in the muck of their failure, Intel plans to use the IEDM 's bully pulpit to provide details about that second-generation technology, plus present a paper on their new system-on-a-chip (SoC) designs based on high-k/metal-gate low-power refinements. According to the EE Times article, Intel has "at least four SoCs in the works for systems outside its traditional PC markets. Tolapai is aimed at storage networks, Silverthorne at handhelds, Larabee at high-end visualization systems and Canmore at wired consumer devices." None are yet available for purchase, but they're all under test in Intel labs.

Finally, Intel is also expected to demonstrate its latest bit of wizardry: a high-speed, low-power, quantum-well, field-effect transistor - and as soon as The Reg figures out exactly what the hell that is, we'll let you know all about it. ®

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.