Feeds

ARM cores leg it into body of Big Blue, rub shoulders with Power network chips

British Cortexes licensed to thrill communications silicon

Beginner's guide to SSL certificates

IBM has announced it is licensing a basket of processor designs from ARM for its network equipment division.

The new deal means Big Blue can make use of ARM's Cortex-A15, Cortex-A12, Cortex-A7 and Cortex-M4 cores, as well as the ARM Mali-450 graphics processing unit. These are aimed at beefy phone and tablet chips, and IBM wants them to hopefully build better networks for mobile operators and the like.

"IBM is a top provider of custom-built, system-on-a-chip technology to communications companies - the silicon technology that has powered much of the mobile computing revolution," said Steve Ray, VP of microelectronics at Big Blue in a canned statement.

"With the addition of ARM's advanced 32-bit microprocessors and peripherals to our Power-based offerings, our clients will now have the broadest array of leading silicon technology and design services available - giving them the ability to create the next generation of communications hardware."

The new technology will perhaps boost IBM's continuing attempts to make its Power chip platform more relevant. While IBM has had a lot of success building networking and communications chips using the Power architecture, augmenting that with some ARM technology won't hurt.

"IBM's manufacturing leadership and expertise in semiconductor innovation means that this agreement will result in a highly competitive portfolio of custom ARM-based solutions being deployed by leading networking infrastructure companies worldwide," said Tom Cronk, general manager of ARM's processor division.

"Building on their longstanding engagement on ARM Artisan Physical IP, IBM's extensive commitment to ARM Cortex CPU and ARM Mali GPU technology reflects the increasing demand for optimized-for-function, energy efficient platforms." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.