Intel shuts down the work of the 5G modem after Apple decides not to use it



[ad_1]



Apple reportedly informed the giant Intel processor that it would not use the latter's 5G modems in its 2020 mobile devices, which would lead to an interruption in their production.

The Israeli website Calcalist said that he had seen Intel's internal communications about the issue and also talked to people said to be familiar with the subject .

He said that the further development of the modem, known internally as "Sunny Peak" had been stopped and the staff involved would be directed to other efforts. The device, a 5G product, Wi-Fi and Bluetooth, has been specifically designed for future smartphones and other mobile devices from Apple.

Calcalist's Intel communications described Apple as the "key mobile client" of the 5G mobile modem. Expects that Apple will be the "main volume driver" for the product.

Apple would have faced "a huge effort" to launch 5G in its mobile devices, Intel Communications said, adding that the decision not to use the Intel modem was due to "many factors. "

Using a new Wi-Fi standard known as WiGig (802.11ad) in "any mobile product brings new and unexpected challenges," the communications said.

Intel told the site that it has not commented on its LEARN HOW TO REDUCE YOUR RISK OF CYBER ATTACK

Australia is a hot spot of cyber espionage.

As we automate, write and move to the cloud, more and more businesses depend on an infrastructure that has

Just an email to expose the payment process of An account, and for cyber-attackers, it costs a company thousands of dollars.

In the free white paper "6 Steps to Follow". Improve Your Cyber ​​Security »You will learn some simple steps you should take to prevent devastating and malicious cyberattacks from destroying your business.

Cybersecurity can no longer be ignored, you will learn in this white paper: [19659010] · How was the safety of the company violated?
· How much can it cost to be wrong?
· 6 tips

DOWNLOAD NOW

RANSOMWARE RECOVERY

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware arrived on September 5, 2013, when Cryptolocker was He quickly badigned many systems with hackers requiring users to pay for decryption keys.

Find out how a company has used cloud backup and storage software to protect PCs from their business and recover all their systems. strike.

DOWNLOAD THE REPORT!

[ad_2]
Source link