The Shift to ARM-Based Processors: AWS’s Entry, Telecom Industry Advantages, and The Rise of New Competitors

The telecom industry has been dominated by x86 technology for decades; however, Amazon Web Services (AWS) is looking to transform the industry by working with Nokia and other software companies to offer an architectural choice for telcos.

Is x86 technology losing favor with the telecom industry?

Ishwar Parulkar, AWS’s chief telecom technologist, stated that there isn’t an abundance of industry love for x86. Parulkar has been in the telecom industry for over two decades, and he believes that the industry is ready for a change.

AWS Enters the Chip-Making Business

AWS’s interest in the telecom industry has grown over the years, and in early 2015, the company purchased Annapurna Labs, a semiconductor business. This acquisition allowed AWS to enter the chip-making business, and the company started developing its own processors.

Why are telcos turning to Arm’s technology?

The popularity of Arm’s technology in the telecom industry is due to its energy efficiency and the related cost benefits. Arm processors consume less power, resulting in lower operating expenses.

Additionally, for most workloads, the price-performance ratio of ARM-based processors is around 40% lower than x86-based processors.

AWS is actively making efforts to facilitate the porting of existing software

AWS is actively working to port existing software to Arm technology. The company is also supporting Arm with the development of libraries that will make the process of porting software to Arm technology easier.

Nokia’s proposed accelerator card for use with Graviton chips

Nokia has been touting an accelerator card that could be used in conjunction with AWS’s Graviton chips for the radio access network (RAN) stack. The proposed accelerator card is designed to make the transition from x86 to Arm technology easier for telecom companies.

Collaboration between Ampere Computing and HPE on an Arm-powered RAN product

Ampere Computing, another chip manufacturer, is collaborating with server maker HPE on an Arm-powered RAN product. This product is expected to make use of Ampere’s Altra processor, which is designed specifically for the data center and cloud environments.

Is x86 technology still the only choice?

Without real commercial progress by AWS and other companies in the industry, x86 technology could remain the only choice for telcos. However, AWS’s efforts to challenge the industry’s reliance on x86 technology should not be underestimated. Last year, AWS’s Graviton processors gained a 3% share of the market. As AWS continues to collaborate with Nokia and other software companies, we can expect to see more progress towards Arm-based processors in the telecom industry.

The telecom industry is ready for a change, and AWS’s collaboration with Nokia and Ampere Computing is a step in the right direction. The cost-effective and energy-efficient Arm-based processors are becoming more popular, and AWS’s efforts to port existing software to Arm technology will make the transition easier for telcos. While x86 technology remains dominant, the industry is ready for a change, and AWS is leading the charge.

Explore more

Unlinked: Bridging Gaps in Data Governance Strategies

Imagine a sprawling organization with cutting-edge technology, vast data resources, and ambitious goals, yet it struggles to achieve its strategic objectives due to hidden disconnects in its data governance framework, a scenario far too common in today’s fast-paced business landscape. Data serves as the backbone of decision-making, and many enterprises invest heavily in strategies and systems, but the execution often

How Is Ad Fraud Hurting B2B Lead Generation Efforts?

In the intricate world of B2B marketing, where every lead represents a potential long-term business relationship, the specter of ad fraud looms large, threatening to undermine carefully crafted strategies and drain valuable resources. Unlike consumer-focused campaigns where fraud often manifests as wasted ad impressions, in the B2B realm, the damage is more insidious, primarily targeting lead generation efforts. Fake leads,

DragonForce Claims Belk Data Breach in Retail Cyber Wave

What happens when a trusted retail name, a cornerstone of shopping in the southeastern United States, falls prey to a ruthless cybercriminal cartel? Picture thousands of customers’ personal details exposed, a company’s reputation hanging by a thread, and an unseen enemy gloating over stolen data. This is the reality for Belk, a North Carolina-based department store chain with nearly 300

GLOBAL GROUP RaaS Unleashes AI-Driven Ransomware Threat

In an era where digital threats evolve at an alarming pace, a new ransomware-as-a-service (RaaS) operation known as GLOBAL GROUP has emerged as a formidable challenge to global cybersecurity, targeting critical industries with unprecedented sophistication. Having surfaced in June of the current year, this operation rapidly established itself as a significant player in the cybercrime landscape by claiming numerous victims

WhatsApp Zero-Click Exploit – Review

Imagine a scenario where a simple notification on a messaging app like WhatsApp could silently compromise an entire device, executing malicious code without the user ever tapping a button or opening a message. This chilling possibility is not science fiction but a real threat known as the zero-click exploit, a vulnerability so stealthy that it has become a top priority