Feeds

IBM and pals to start baking 28nm chips

Fast, efficient - just don't call it 'high-k/metal gate'

Secure remote control for conventional and virtual desktops

The march toward faster, more power-efficient microprocessors took another step Thursday when the IBM Technology Alliance announced the joint development of 28 nanometer process technology.

Alliance members include IBM, Singapore's Chartered, the recently-spun-off-from-AMD Globalfoundries, Germany's Infineon, Samsung, and Switzerland's STMicroelectronics. This global gaggle will work together to produce the process technology - already defined - that will be required to produce 28 nanometer high-k/metal gate silicon.

The Alliance, however, doesn't use the term "high-k/metal gate" to refer to that power-saving, leakage-reducing process technology - that's the terminology used by Intel, which first produced such chips in early 2007. The Alliance would prefer that you say "HKMG".

IBM and its partners were a bit late to the HKMG party, producing its first such silicon in April of 2008. While Intel started at 45 nanometer, however, IBM started at 32 nanometer. Now IBM and its partners - as well as Intel - have 28 nanometer in their sights.

Whatever you call it, HKMG - which replaces the polysilicon gates and silicon dioxide gate dielectrics in use since the 60s - is a major step forward in process technology.

As chips get smaller, their transistors are more prone to power leakage in the gate dielectric, leading to ineffiency and heat. An HKMG process can cut that leakage by five times or more.

Without HKMG technology, processes would be hard-pressed to keep up with Moore's Law, which states that chip complexities will double every two years. With HKMG, the Law remains in force - a least for a few more years.

According to the Alliance, early "risk production" of the 28 nanometer HKMG chips will begin in the second half of 2010. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.