Feeds

Intel to pay $1.4bn for Infineon WLS

But does it really need it?

SANS - Survey on application security programs

ARM and new markets

Intel could broaden its own mobile platform in two ways: purchase capabilities to boost the architecture it is building around Atom, or give up on trying to squeeze Atom into every market and support multiple platforms. Since WLS is wedded to the ARM architecture, we must assume the latter, especially as Intel said in its preliminary statement: "Intel is committed to serving WLS‘ existing customers, including support for ARM-based platforms."

Re-entering the ARM market is sensible, given the weight of market share and developer support the processor platform is acquiring in mobile, and even in markets Intel might have regarded as sacrosanct, like cloud servers and notebooks. WLS has an architectural ARM license, though this is confined to security applications, and a long relationship with the firm, which should be more positive than Intel‘s previous ARM related attempts – most recently, when it acquired the former StrongARM unit of Digital Equipment, turning it into XScale. WLS, at least, brings readymade channels and customers among the mobile giants, which StrongARM did not, leaving Intel to penetrate the unfamiliar territory ill-equipped.

But WLS‘ customers are not confined to the mobile majors. Its parent is a major player in automotive chips and this gives WLS key connections to an important expansion market for all chip firms targeting embedded devices, as cars become a new screen for internet and media consumption. And a key synergy that should not be underestimated is in security. Infineon has worked very hard on chip- level security and its ARM architectural license is centered on this area. The acquisition of McAfee indicated that Intel wants to dominate this segment as security issues become ever more complex with web access stretching to millions of diverse gadgets and embedded systems. In this respect, Infineon will bring far greater value than it does to the more obvious cellphone space. In its own statement, Intel said: "WLS‘ sale enables Infineon to expand leading position in markets for automotive, industry and security technologies," pointing to the real value.

The ARM deal was signed last November, and is targeted at high security SIM cards for multimedia applications. Infineon will integrate its proprietary security features into ARM‘s widespread CPU core implementation. The firm‘s 'Integrity Guard' hardware encrypts data across most parts of the physical chip implementation such as data buses and all memories as well as caches.

A further note of interest that emerged from the bare-bones statement was that Intel would use Infineon‘s baseband expertise to supports its plans to "accelerate LTE". We might all be forgiven for thinking Intel‘s plan had generally been to contain LTE in order to boost the WiMAX technology, over which it has far more influence. Infineon has some advanced LTE activities, including its R&D partnership with Nokia, and this will certainly enable Intel to participate in both 4G platforms, especially when LTE starts to appear in netbooks and notebooks (although, as in 3G, Intel could equally well have partnered in this area).

But it is clearly using its new acquisition plan to "out itself" in terms of the inevitable acceptance of LTE, and it said WLS "expands Intel‘s current Wi-Fi and 4G WiMAX offerings to include Infineon‘s 3G capabilities and supports Intel‘s plans to accelerate LTE. The acquired technology will be used in Intel Core processor-based lap- tops, and myriad of Intel Atom processor-based devices, including smartphones, netbooks, tablets and embedded computers." It will also enhance Intel‘s HSPA activities, via Infineon‘s 65nm HSUPA platform (XMM 6160), and upcoming 40nm HSPA platform (XMM 6260).

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

3 Big data security analytics techniques

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.