Feeds

Intel to extend data centre tyranny into mobile, says CFO

War on ARM won't be over by Xmas, admits Chipzilla mogul

Next gen security for virtualised datacentres

Intel's CFO has rubbished ARM's prospects of making a serious dent in the data centre, arguing that whatever the chip IP developer is aiming at, Intel will be well ahead. At the same time, Stacy Smith insists that Intel will soon be eating into ARM's position in the mobile arena, despite the recent flight of its anchor partner in that market.

Stacy Smith, speaking after an investor conference in London, cited his own experience as a former Intel CIO to argue that the prospect of switching to an ARM architecture that was not backwards compatible with x86 would be something that would fill a datacentre manager with dread.

For its part, Intel's roadmap over the coming years has been radically refocused around lower power. At the same time, its takeover of McAfee will see security hooks built into its products from mobile devices right down or up to its server chips.

"They're talking five years out they might be there. It's a long time," said Smith. "It's going to change so much, where they're aiming at, we're not going to be there."

Few would doubt Intel's ability to fight hard in the data centre. However, Smith went on to argue that Intel will soon be making serious inroads into the mobile market – the long-standing domain of ARM.

Intel has made multiple runs at the mobile phone market, with little to show for it. Its partnership with Nokia made Intel appear to have had a chance of cracking it, only for the wounded Finnish giant to turn frigid and leap into the arms of Microsoft.

Smith accepted this was a setback, but said Intel had now switched its resources to other partners, and we could expect to see products shipping between now and the beginning of next year.

Asked if this meant little prospect of products shipping for the holiday buying season, Smith said missing the Christmas sales window wouldn't detract from its momentum in the market.

Intel's efforts to get into the phone and other mobile markets has seen it tie up with some slightly obscure partners. It won't be like that this time, said Smith.

"These are going to be people you've heard of."

Readers with long memories will notice the irony in all of this. Intel has its own ARM licence, and in the early part of the century based one of its attempts to break into mobile phones on the ARM architecture. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.