Feeds

Apple admits to eating 'iPad chip designer'

Downs Intrinsity after PA Semi comes back up

Security for virtualized datacentres

Yes, Apple has borged Intrinsity, the Texas-based chip outfit that (supposedly) played a role in the design of the chip driving the iPad.

Today, the Jobsian cult confirmed the buy with the New York Times. Previously, profiles posted to the social networking site known as LinkedIn indicated that Apple had borged at least a trio of Intrinsity engineers.

After "people familiar with the deal" told The Times that Apple had actually bought the chip designer, a company spokesperson confirmed the acquisition. Then, of course, the spokesman declined to say what Apple planned to do with its new purchase. “Apple buys smaller technology companies from time to time, and we do not comment on our purpose or plans,” said an Apple spokesman.

On April 1, EDN reported that Intrinsity had been sold while speculating that Apple was the buyer. Then Macrumors dug up LinkedIn profiles indicating that at least three Intrinsity engineers had been eaten by the cult. Since the EDN report, Intrinsity's website has been "under construction".

EDN is among the many who have speculated that the iPad's A4 chip was designed by Intrinsity and manufactured by Samsung, Others had guessed the chip was built by engineers who moved to Apple after it acquired boutique chip designer PA Semi. But this particular speculation was blunted when the world realized that several PA Semi employees had left Apple in the wake of the acquisition.

At some point, multiple PA Semi employees - including engineers - departed the Jobsian cult to form a new company dubbed Agnilux, which has since been acquired by Google. The word from The New York Times is that Agnilux was acquired to help Mountain View port its Chrome and Android OSes to tablets and TV set-top boxes, but it's worth noting that Agnilux was reportedly working on "some kind of server" before it was borged.

Last year, Samsung told the world it had teamed with Instrinsity on a 1GHz ARM chip known as the Hummingbird, and Samsung manufactures the ARM chips underpinning the Apple iPhone, a smaller version of the iPad. This has led many to assume that the Hummingbird architecture is the basis for the the A4.

Intrinsity's roots run back to Exponential Technology, an outfit that worked to build ultra-fast PowerPC chips for the Mac in the 1990s before a falling out with Apple. The Cupertino company declined to actually use the chips and Exponential ended up suing the Mac maker. ®

New hybrid storage solutions

More from The Register

next story
Apple iPhone 6: Missing sapphire glass screen FAIL explained
They just cannae do it in time, says analyst
Slap my Imp up: Bullfrog's Dungeon Keeper
Monsters need to earn a living too
Oh noes, fanbois! iPhone 6 Plus shipments 'DELAYED' in the UK
Is EMBIGGENED Apple mobile REALLY that popular?
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
The Apple Watch and CROTCH RUBBING. How are they related?
Plus: 'NostrilTime' wristjob vid action
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.