Feeds

Why Google and Amazon could end up cooking their own chips

Good lord, 'tech' firms doing technology!

Beginner's guide to SSL certificates

Open ... and Shut It used to be that the ante for being a serious player in the technology game was your own data centre. Or several. On this basis, Google, Facebook, Amazon, Microsoft and very few others have constructed hugely expensive data centres that centre much of the web's activity on them.

But among these web giants, it may no longer be enough to just have expensive data centre. Today's ante is increasingly the chip.

It was perhaps not a huge stretch for a hardware company like Apple to get in the chip business as it sought performance and margin gains on its iPhones and iPads. Initially this just meant that Apple started designing its own A6 processor, while still having Samsung actually manufacture the chips, along with some design help.

Now, according to a report in The Korea Times, Apple is poised to completely dump Samsung as a design partner and use it solely for manufacturing. This is helped by Apple's hiring of Jim Mergard, a chip design veteran who spent 16 years at AMD but was most recently employed by Samsung.

Apple's relationship with Samsung, in other words, is getting more distant all the time. As one Samsung source describes it:

There are three kinds of chip clients. Some want us to handle everything from chip design, architecture and manufacturing. Some want us to just design and manufacture. Some want us to just make the chips. Apple is now the third type.

This puts Apple in a position to move production to another fab, most likely TSMC, with which Apple recently signed a deal to produce quad-core processors for future devices.

But this isn't just an Apple story. Few would question Apple's willingness to go to great lengths to own as much as possible of its supply chain. But Amazon?

Yes, Amazon.

The Next Web reports that Amazon is considering acquiring Texas Instruments high-end processor business. As with Apple, the purpose would be to take more control of the chips powering Amazon's increasingly potent mobile business.

As some point out, however, this isn't exactly a match made in heaven. For example, Amazon doesn't push enough volume of devices to make the deal pay for itself. At least, not initially.

But what if Amazon CEO Jeff Bezos sees a future consumed with digital content? Well, in that case, he may not be able to afford not owning chip design on a grand scale, just as owning data centres has come to be essential.

Is this where the industry is heading?

Years ago, Tim O'Reilly warned the web giants, including Microsoft and Google, to: "Do what you do best, link to the rest." Worried about a future where the internet ceases to be the platform and is replaced by vendor-specific platforms, O'Reilly urged these tech titans to remember the power of the Internet operating system, comprised of "small pieces, loosely joined."

Well, that may have been where the web started, but it certainly doesn't feel like where it's going. Owning a data centre is a way to amass, store, and crunch massive quantities of data. Mobile devices, powered by chips, are increasingly the top data collection and dissemination point for these cloud services. It may be advantageous to own both, and not just one or the other.

At least, this seems to be the thinking as Google, Amazon, Microsoft, and Apple all get into the hardware business. This started just with the devices themselves, but is quickly becoming a matter of chips, the "brains" of the devices, too.

In other words, it's Compuserve 2.0 at web scale, and it's unlikely to be what we as consumers want in the long run, even if it makes our lives easier in the short run. ®

Matt Asay is senior vice president of business development at Nodeable, offering systems management for managing and analysing cloud-based data. He was formerly SVP of biz dev at HTML5 start-up Strobe and chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfresco's general manager for the Americas and vice president of business development, and he helped put Novell on its open source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears three times a week on The Register.

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
Amazon hopes FIRE STICK will light up its video service
We do streaming video? It seems we do...
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.