Feeds

Muscle chip strength leaves ARM shouldering meaty profit

High-end RISC cores boost $773m revenue headline

Secure remote control for conventional and virtual desktops

ARM, the eponymous designer of the chip architecture, had a stonking 2011 with revenue and profits up as it tightened its hold on both embedded and generic computing.

Revenue for the last quarter of 2011 was up by more than 20 per cent on the previous year, to £137.8m, while profit before tax jumped more than twice that percentage to £69m. For the whole of 2011 the numbers are very similar, revenue hitting £491.8m ($773m) and profit topping £229.7m ($362m), rather better than analysts had predicted.

Those numbers come on the back of 2.2 billion ARM-powered chips being sold globally in 2011, but equally important is the proportion of high-end silicon shifted, which generates bigger royalties than ARM's basic processor cores that are found embedded in white goods.

ARM, which is still based in Cambridge, licenses its RISC processor designs to fabs including Qualcomm and Samsung. ARM chips appear in just about every mobile phone and tablet computer, including the iPhone, but the older designs also pop up in everything from washing machines to talking toys.

So when pundits, and politicians, talk about the "internet of things" most of those things will have an ARM processor embedded inside them.

All of which generates licence fees for ARM, but it's the high-end chips that bring in the headline numbers. Once Windows 8 rolls out, the companies licensing ARM's blueprints will be able to compete with Intel on a level playing field, as Microsoft's new OS will happily run on either platform - which can only increase the number of ARM processors being produced.

Device manufacturers love ARM as it gives them a choice of suppliers - a phone maker can buy ARM chips from Samsung, Qualcomm or half a dozen other licensees, a factor which is just as important as the fabled power-sipping circuits from ARM's eggheads. ®

Beginner's guide to SSL certificates

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.