Feeds

300 Irish jobs go at Intel

Nothing more to do

High performance access to file storage

Intel is firing 300 workers, six per cent of its Irish workforce, at a plant near Dublin because the product they have been making is obsolete.

The plant is at Leixlip, County Kildare, and a three-month long consultation process has begun with the workers involved, meaning the first departures will be in October. These are Intel's first mandatory redundancies in Ireland.

Two factories on the site will be consolidated and the process line in one, Fab 14, will be closed down. Demand for the product it makes is falling and Intel says its equipment is outdated. Apparently both fabs made 200mm wafers, while newer processes use 300mm ones.

Intel started its Leixlip operations in 1989. Fab 14 was started up in 1995 and has been working in conjunction with Fab 10 to produce flash memory and logic devices. There is a third fab - actually a pair of fabs, jointly called Fab 24 - on the site, which processes 300mm wafers.

When Intel set up the Numonyx joint-venture with STMicroelectronics in 2007 the Leixlip facility was not included. Intel contributed NOR flash operations to Numonyx with STMIcroelectronics contributing NAND and NOR flash.

It had been hoped that both Fab 10 and Fab 14 would be used to build Intel's 1270 processor, but that work is going to Intel plants in Arizona and Israel. Fab 14 will be prepared for new investment. There are 450 employees remaining in Fab 10, and questions are being asked about their long-term future.

Intel has already lost 200-300 jobs in its Irish workforce through a voluntary redundancy programme that came to a finish in May. The latest program, with the same eight-weeks pay for every year of service, will reduce Intel's total Leixlip workforce to 4,200, down from a peak of 5,000.

Dell closed down its Limerick operation earlier in the year, sending the jobs to Poland. Intel has assured the Irish government that it is staying in Ireland, where it has invested more than $6bn. ®

High performance access to file storage

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.