Vulnerabilities / Threats // Insider Threats
02:23 PM

AMD Processor Roadmap Points To Tablets

Content to let rival Intel lead the way, AMD plans to release Krishna and Wichita accelerated processing units in 2012.

Advanced Micro Devices' latest product roadmap shows that the chipmaker is preparing to enter the emerging market for tablet-style computers, but at the pace of a follower, not a technology leader.

AMD released its roadmap Tuesday during its annual Financial Analyst Day at the company's Sunnyvale, Calif., headquarters. The company's plans, as one would expect, includes processors with more cores, more memory and better performance-per-watt.

But AMD's preparations for the tablet market, which is expected to grow quickly over the next few years, show the company is willing to let Intel lead the way before jumping in with processors that will likely be low-cost workhorses that get the job done without offering too many frills.

"AMD meets market demand, while Intel tries to be the pioneer," Greg Richardson, analyst for Technology Business Research, told InformationWeek.

Rather than be the first to market, AMD plans to release processors for tablets and netbooks in 2012. Code-named Krishna and Wichita, the chips will be based on 28-nanometer technology and will be what AMD calls "accelerated processing units." APUs combine the graphics processor and CPU on the same piece of silicon for better performance.

All AMD processors by the end of 2012 will be based on one of two new core designs, code-named Bulldozer and Bobcat. The former is aimed at high-performance desktops, workstations and servers, while the latter is targeted at PCs that require low-power chips, such as tablets and smaller, lighter laptops. AMD plans to releases its first APUs, which will be based on the new core designs, starting next year.

In the tablet market, AMD will be about a year behind Intel, which goes into production this year on processors based on its next-generation microarchitecture, code-named Sandy Bridge. The new 32-nm design will be the foundation of Intel's second-generation Core processor family and will also be used in tablet-bound chips. Sandy Bridge processors are expected to be available early next year, starting in laptops and desktops.

1 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.