Happy 40th birthday, Intel 4004!

The first of the bricks that built the IT world

The Power of One Infographic

'We just plain ran out of atoms'

But that relatively straightforward sequence of improvements didn't last. In the early 2000s, Bohr told us, "Traditional scaling ran out of steam." The problem was that as process sizes got smaller and smaller, circuits tended to leak more power proportional to the amount of electrons that are doing useful work.

Or, as Bohr put it, "We just plain ran out of atoms." When you're talking about gate oxides, he explained, a 1.2nm deposit is only about six atomic layers thick.

At that point, Bohr said, it became clear that it was necessary to investigate, develop, and introduce what he called "revolutionary features", such as strained silicon, then high-k metal gate, and most recently what Intel calls tri-gate transistors and much of the rest of the world calls FinFET structures.

Intel 8008

Intel 8008: 800KHz, 10-micron process (click to enlarge)

But we're getting ahead of ourselves. On the architectural side, there were plenty of developments underway while the process engineers were busily scaling down the chips' transistors.

Pawlowski wasn't in on the earliest days of the 4004's morphing into the 8-bit 8008 of 1972, and then the development of the much more capable 8-bit 8080 in 1974, which was the microprocessor that really got the ball rolling.

The 8080 wasn't alone, though – there was plenty of competition in the earlier days, such as the Zilog Z80, Motorola 6800, and MOS Technology 6501, which Pawlowski told us were all essentially equal competitors at the time.

"The 8080 was essentially just a simple processor," he told us, "but it had a program counter, it had these nice, wonderful eight registers that we have today, the eight-bit registers. Then the 8085 was an extension of that – it was essentially a 5-volt part."

Pawlowski's first baby at Intel was the 8086, which had a 16-bit external bus, unlike its compatriot, the 8088, which had an 8-bit external bus.

The 8088's claim to fame was that IBM chose it for its groundbreaking IBM Personal Computer – aka the Model 5150 – which it introduced in 1981. According to Pawlowski, IBM chose the 8088 because its 8-bit external bus was compatible with peripherals that had been developed for the smaller-market 8080 and the 8085.

Intel 8080

Intel 8080: 2MHz, 6-micron process (click to enlarge)

After the 8086/8 came the 80286, which Pawlowski described as not a ground-breaking departure, but rather "just a better architecture than the 8086." The 80286 still required a math coprocessor, the 80287. Unfortunately, Pawlowski remembers, "The 286 added some interesting things, like with the math coprocessor they added an interrupt field which clobbered some of the old interrupt fields in the 8086."

All progress is not linear.

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story


Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.