Feeds

Surprise! Intel smartphone trounces ARM in power trials

Tests show equal performance while sipping significantly less juice

High performance access to file storage

The industry analysts at ABI Research pitted a Lenovo smartphone based on Intel's Atom-based Clover Trail+ platform against a quartet of ARM-based systems, and Chipzilla's system not only kept pace with the best of them, but did so using less power.

"The benchmarks were impressive but the real surprise was the current consumption recorded during the benchmarks;" ABI Research engineer VP Jim Mielke said when announcing the results, "the new processor not only outperformed the competition in performance but it did so with up to half the current drain."

The Clover Trail+ phone in question was a Lenovo K900 powered by Intel's 32-nanometer 2.0GHz Atom Z2580 with two dual-thread Saltwell CPU cores in the Clover Trail+ platform along with two Imagination Technologies PowerVR SGX 544 GPU cores.

The ARM-based competition included – and first take a deep breath, as we're entering a dense thicket of specs – a Samsung Nexus 10 powered by a dual-core 1.7GHz Cortex-A15 and a Mali-T604 GPU; a Samsung i9500 Galaxy S 4 with a "big.LITTLE" Exynos Octa with a quad-core 1.6GHz Cortex-A15 and quad-core 1.2GHz Cortex-A7 coupled with a PowerVR SGX 544MP3 GPU; a Samsung i337 Galaxy S 4 with a 1.9GHz Qualcomm APQ8064T Snapdragon 600 with four Krait 300 cores and an Adreno 320 GPU; and an Asus Nexus 7 with an Nvidia Tegra 3 with four 1.2GHz Cortex-A9 cores and a ULP GeForce GPU.

ABI Research provided no details on the content and construction of their benchmarks, but the comparative results show the Z2850-equipped Lenovo K900 to be more than merely competitive with the ARM-based phones.

ABI Research smartphone benchmarks

Don't squint – click to enlarge

Of the five phones tested, the dual-core Lenovo K900 and quad-core Samsung i9500 and i337 Galaxy S 4s all scored in the 5000 range in ABI's CPU-scoring system, with the dual-A15 Samsung Nexus 10 and quad-A9 Asus Nexus 7 falling substantially behind.

What was of most interest, however, was that the Lenovo K900 hit its numbers using significantly less juice than did its two 5000-scoring Galaxy S 4 competitors. "Of the three," ABI writes, "Intel stood out with only 0.85A of average current vs. 1.38A for the Samsung Exynos Octa, and 1.79A for the Qualcomm APQ8064T."

Mielke praised Intel and offered his opinion as to why the ARM chips sucked more power. "Intel did significant work to bring the current drain down on their well-recognized high-performance processors, but the competitors did not help themselves," he said. "The ARM architecture used by nearly all of Intel's competitors is well known for its low-power performance but in bringing the processing power up closer to PC levels, the current drain has taken a significant hit."

Earlier this month, The Reg had a conversation with Intel spokesman Bill Calder, who expressed high confidence in his company's ability to enter the smartphone market. "The myth that Intel will never be able to get power down low enough to get into phones is gone," he said. "That debate is over."

If ABI Research's benchmark testing is to be trusted, Calder appears to be correct.

Mielke suggested another reason as to why he believes Intel – after years of disappointing products such as Menlow, Moorestown, and Medfield – can become a true competitor in the smartphone market. "Combining the high-end modems (the XMM6360 is used in both the Lenovo K900 and the Samsung Galaxy S4 i9500) with their application processors for high- to mid-tier solutions and single-chip EDGE chips for low-cost phones makes Intel a rare full portfolio provider," he said.

One last note: remember, the Clover Trail+ platform is based on a 32nm Saltwell compute core. When 22nm parts based on Intel's upcoming – and more advanced – Silvermont Atom microarchitecture are slipped into the Merrifield smartphone platform later this year, Chipzilla's hand should be strengthened.

Not that the ARM camp will stand still, of course – there's plenty of innovation still to come from Qualcomm, Samsung, Nvidia, and others. We're sure to see some serious competition – which means that we, the consumers, will be the ultimate victors. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.