Vulnerabilities / Threats // Insider Threats
11/10/2010
02:23 PM
50%
50%

AMD Processor Roadmap Points To Tablets

Content to let rival Intel lead the way, AMD plans to release Krishna and Wichita accelerated processing units in 2012.

Advanced Micro Devices' latest product roadmap shows that the chipmaker is preparing to enter the emerging market for tablet-style computers, but at the pace of a follower, not a technology leader.

AMD released its roadmap Tuesday during its annual Financial Analyst Day at the company's Sunnyvale, Calif., headquarters. The company's plans, as one would expect, includes processors with more cores, more memory and better performance-per-watt.

But AMD's preparations for the tablet market, which is expected to grow quickly over the next few years, show the company is willing to let Intel lead the way before jumping in with processors that will likely be low-cost workhorses that get the job done without offering too many frills.

"AMD meets market demand, while Intel tries to be the pioneer," Greg Richardson, analyst for Technology Business Research, told InformationWeek.

Rather than be the first to market, AMD plans to release processors for tablets and netbooks in 2012. Code-named Krishna and Wichita, the chips will be based on 28-nanometer technology and will be what AMD calls "accelerated processing units." APUs combine the graphics processor and CPU on the same piece of silicon for better performance.

All AMD processors by the end of 2012 will be based on one of two new core designs, code-named Bulldozer and Bobcat. The former is aimed at high-performance desktops, workstations and servers, while the latter is targeted at PCs that require low-power chips, such as tablets and smaller, lighter laptops. AMD plans to releases its first APUs, which will be based on the new core designs, starting next year.

In the tablet market, AMD will be about a year behind Intel, which goes into production this year on processors based on its next-generation microarchitecture, code-named Sandy Bridge. The new 32-nm design will be the foundation of Intel's second-generation Core processor family and will also be used in tablet-bound chips. Sandy Bridge processors are expected to be available early next year, starting in laptops and desktops.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?