Collaborative foundation aims to boost MIPS adoption
The foundation will offer open-source OS distributions for MIPS, including Android, CentOS and Ubuntu
IDG News Service - A collaborative, nonprofit foundation has been started by a group of technology companies to boost the adoption of the MIPS processor architecture.
Imagination Technologies, Broadcom, Cavium, Ikanos, Ineda Systems, Ingenic Semiconductor, Lantiq, Nevales Networks, PMC and Qualcomm have founded "prpl," an open-source, community-driven foundation, Imagination Technologies said Thursday.
The company also separately announced that it will collaborate with Oracle to enhance Java for embedded and Internet of Things applications, and to optimize Java for the MIPS CPU architecture.
MIPS implementations are mostly used in embedded systems such as routers and video game consoles, which could make them particularly useful for the burgeoning Internet of Things market.
Imagination has been pushing to expand the use of MIPS chips since it bought the financially struggling MIPS Technologies in 2012. More than 3 billion MIPS units have shipped, according to the company.
Each member company will provide its particular expertise to the foundation's engineering groups. For instance, Qualcomm will focus on networking and build a community around OpenWrt, an operating system based on the Linux kernel that is often used to route network traffic.
"Instead of every company doing the work individually, they all come together in prpl. They do the work and every company benefits from that work," Imagination spokesman Alexandru Voica said.
Prpl will offer open-source OS distributions for MIPS, including Android, CentOS, Debian, Fedora and Ubuntu, essentially creating a repository for developers and others.
Working together in this way makes sense, said Richard Fichera, vice president and principal analyst of infrastructure and operations at Forrester Research. "As far as I can see, it is an intelligent strategy and program to boost MIPS, which has been under immense pressure from ARM for mobile device market share," he said.
Another focus of the foundation will be on enabling next-generation "data-center-to-device" portable software and virtualized architectures, Imagination said.
That strategy, however, is less to Fichera's liking. "MIPS lost its chance at the core data-center server market," he said, adding that he seriously doubts that anyone will invest in either silicon or systems to have another run at it.
"Any significant investment in a non-x86 server will be centered on ARM or possibly OpenPOWER rather than MIPS. However, MIPS is a perfectly good embedded compute resource, and is appearing in network-edge devices as programmable cores for both embedded network functions and as a user-programmable device," he added.
As for Imagination's collaboration with Oracle, the companies will work to bring broad Java support to 32-bit and 64-bit MIPS architectures for use in a broad range of applications including routers, other networking equipment, mobile devices and the Internet of Things, they said.
Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to email@example.com
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Processors White Papers | Webcasts