Feeds

iPad's brain not so unique

A4 core coming to Android?

High performance access to file storage

Taking the tear-down to the microscopic level, UBM TechInsights concludes that Apple's A4 processor is manufactured by Samsung and will share a core with that company's next Android handset.

The A4 is used in the iPad as well as the next-generation iPhone announced on Monday, and is generally considered to be the product of Apple's purchase of PA Semi in 2008.

Most of Apple's application processors are manufactured by Samsung, as UBM TechInsights has already established (pdf), but this time they've been busy comparing the A4 processor to the one used in the Samsung Wave, and reckon there's a fair bit of overlap.

In common with almost all smartphones both the Wave and the iPhone have two processors: one running a real-time OS and handling radio communications, while the other runs something a little more consumer-friendly and is used to host applications running on the phone. Alone among smartphone operating systems, Symbian can support proper real time radio functions, making a single-processor smartphone possible... but still not very desirable.

Both the A4 and the S5PC110A01 are ARM based - again in common with just about every smart phone out there - and a very-close-up view of the chips shows what appears to be exactly the same ARM core in both:

Cores compared

A comparison slide from UBM TechInsight's detailed analysis (pdf)

Being as the S5PC110A01 is using an ARM Cortex A8 core, UBM Concludes that Apple is using the same thing, and the same scale of production (45 nanometre). Given the chip is already being used in the Samsung Wave it makes sense that it will turn up in the company's next Android offering, the Galaxy S.

The processor is, of course, a lot more than its core. The Wave uses Imagination Technology's PowerVR SGX 3D video engine on the same die. Apple uses the same family, though exactly which model remains hard to prove.

But this does mean that Samsung is getting really good economies of scale manufacturing that core at least, and that we'll soon be able to see Android and iOS running side by side on the same processor, which should prove interesting. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.