Intel Completes 0.13-Micron Process Technology

Intel Corp. announced that it has completed the development of its 0.13 micron (130 nanometer) generation logic technology, allowing it to manufacture chips with transistors that are approximately 1/1000th the width of a human hair. This advanced process technology will begin volume manufacturing next year.

The company has built functional static RAMs and microprocessors with the technology, which features 70 nanometer (nm) transistor gate width, 1.5 nm gate oxide thickness, copper interconnects, and low-k dielectrics. Intel is the first to complete development of the 130 nm generation process technology. Intel will present details of this process technology at the International Electron Devices Meeting (IEDM) in December 2000.

The 130 nm logic process will operate at 1.3 volts or less, lowering the voltage in technologies by 20 percent. This will reduce power consumption and increase battery life in microprocessors targeted for mobile computing. Additionally, Intel has focused on reducing SRAM cell size in its 130 nm process. – Isaac Slepner

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.