Feeds

Intel goes to ultraviolet extremes

The EUV prototype that (nearly) blows up

The Power of One Infographic

Research@Intel A long-awaited breakthrough in chip-making technology is inching closer towards commercial reality. But progress is slow and remains uncertain.

At Thursday's Research@Intel event in Mountain View, California, The Reg and other press folk sat down with Mike Mayberry, Intel's VP of technology and manufacturing, to discuss the company's future chip-fabrication goals. Among them was extreme ultraviolet lithography (EUV), which will help to cost-effectively shrink chip manufacturing below 32nm.

Intel is currently gearing up for its next-generation 32mn chips, but they will be built using a highly-refined version of tried-and-true immersion lithography technology - not EUV.

Unfortunately, to reach such a tiny process size, immersion lithography must use a complex and costly multiple-mask scheme. With prototype EUV technology, on the other hand, Intel Research has managed to use a more-straightforward masking system to print down to 24nm - but only in the lab.

Mayberry's labs have managed to "play tricks," as he put it, with immersion lithography to print features down to 15nm. "There are alternatives" to EUV, he said, "but they are not necessarily better alternatives than EUV working," adding that "You'd rather have a single-mask EUV approach."

But many EUV refinements remain to be made. According to Mayberry, "We've made considerable progress, but we're not yet to the point where we can safely predict that production will be on this date, on a Thursday, but we're continuing to work in that direction."

When EUV is introduced, Mayberry said, it will first be used in conjunction with immersion lithography. "We typically use a combination of wavelengths for every process," he said, "so we reuse some of the tools from the previous generation - you have to do that for cost-effective manufacturing."

The current energy source for EUV prototypes, said Mayberry, can produce around 10 wafers an hour once the process is finalized. "That's sufficient to do development," he said, "but not sufficient to do production."

That same source has been used in what he referred to as "burst mode" to produce five times that output, but Mayberry cautioned that "Burst mode means that you run it and - quick - you turn it off before it blows up."

Theoretically, he said, the system under development works, but researchers "have not yet shown commercial viability where you can run a tool for, let's say, a year in a row without anything more than regular maintenance."

Development EUV tools - the next step after the current experimental prototypes - should start to become available next year, said Mayberry, but their development cycle will most likely take two to three years. "That would put production in the 2012, 2013 time frame."

Though that date is not certain. As Mayberry put it, "If you went out and asked 20 people, you'd get probably 25 different opinions on when that would be." ®

Top three mobile application threats

More from The Register

next story
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.