Feeds

Intel to pay $1.4bn for Infineon WLS

But does it really need it?

Build a business case: developing custom apps

ARM and new markets

Intel could broaden its own mobile platform in two ways: purchase capabilities to boost the architecture it is building around Atom, or give up on trying to squeeze Atom into every market and support multiple platforms. Since WLS is wedded to the ARM architecture, we must assume the latter, especially as Intel said in its preliminary statement: "Intel is committed to serving WLS‘ existing customers, including support for ARM-based platforms."

Re-entering the ARM market is sensible, given the weight of market share and developer support the processor platform is acquiring in mobile, and even in markets Intel might have regarded as sacrosanct, like cloud servers and notebooks. WLS has an architectural ARM license, though this is confined to security applications, and a long relationship with the firm, which should be more positive than Intel‘s previous ARM related attempts – most recently, when it acquired the former StrongARM unit of Digital Equipment, turning it into XScale. WLS, at least, brings readymade channels and customers among the mobile giants, which StrongARM did not, leaving Intel to penetrate the unfamiliar territory ill-equipped.

But WLS‘ customers are not confined to the mobile majors. Its parent is a major player in automotive chips and this gives WLS key connections to an important expansion market for all chip firms targeting embedded devices, as cars become a new screen for internet and media consumption. And a key synergy that should not be underestimated is in security. Infineon has worked very hard on chip- level security and its ARM architectural license is centered on this area. The acquisition of McAfee indicated that Intel wants to dominate this segment as security issues become ever more complex with web access stretching to millions of diverse gadgets and embedded systems. In this respect, Infineon will bring far greater value than it does to the more obvious cellphone space. In its own statement, Intel said: "WLS‘ sale enables Infineon to expand leading position in markets for automotive, industry and security technologies," pointing to the real value.

The ARM deal was signed last November, and is targeted at high security SIM cards for multimedia applications. Infineon will integrate its proprietary security features into ARM‘s widespread CPU core implementation. The firm‘s 'Integrity Guard' hardware encrypts data across most parts of the physical chip implementation such as data buses and all memories as well as caches.

A further note of interest that emerged from the bare-bones statement was that Intel would use Infineon‘s baseband expertise to supports its plans to "accelerate LTE". We might all be forgiven for thinking Intel‘s plan had generally been to contain LTE in order to boost the WiMAX technology, over which it has far more influence. Infineon has some advanced LTE activities, including its R&D partnership with Nokia, and this will certainly enable Intel to participate in both 4G platforms, especially when LTE starts to appear in netbooks and notebooks (although, as in 3G, Intel could equally well have partnered in this area).

But it is clearly using its new acquisition plan to "out itself" in terms of the inevitable acceptance of LTE, and it said WLS "expands Intel‘s current Wi-Fi and 4G WiMAX offerings to include Infineon‘s 3G capabilities and supports Intel‘s plans to accelerate LTE. The acquired technology will be used in Intel Core processor-based lap- tops, and myriad of Intel Atom processor-based devices, including smartphones, netbooks, tablets and embedded computers." It will also enhance Intel‘s HSPA activities, via Infineon‘s 65nm HSUPA platform (XMM 6160), and upcoming 40nm HSPA platform (XMM 6260).

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.