Texas Instruments to switch focus from cellphones, cut 1700 jobs
- 15 November, 2012 00:04
Texas Instruments will lay off 1700 employees as it refocuses its efforts away from the wireless sector - including cellphones and tablets - and toward embedded systems, the company announced Wednesday.
The news comes less than a month after TI said its wireless business recorded its third-straight quarter of losses.
TI has targeted its OMAP processors at cellphone and tablet PC makers, and its OMAP chips had found a number of big-name customers including Motorola, Samsung, Sony Ericsson, Huawei, Amazon and Barnes & Noble.
But TI said it plans to refocus its development efforts in new areas as device makers look to develop their own processors. Apple and Samsung, two of the top smartphone makers, both design their own chips, using technology from ARM Holdings.
During its most recent quarter, TI said wireless sector sales had fallen by almost half against the same period a year earlier. The business, which recorded a $US78 million profit in the same quarter a year ago, fell to a $US53 million loss.
Device makers are being influenced by Apple, which initially used off-the-shelf processors in its iPhone line and recently made a switch to an Apple-developed processor called the A6.
Embedded devices refer to products that are custom-designed to do a single job, such as a car navigation system or air conditioning controller.
"We have a great opportunity to reshape our OMAP processor and wireless connectivity product lines to concentrate on embedded markets," Greg Delagi, senior vice president of Embedded Processing at TI, said in a statement. "Momentum is already building with new embedded applications and a broad set of customers, and we are accelerating our efforts in these areas."
While TI's embedded business is doing better than its wireless division, the results are also falling.
Revenue dropped by 4 per cent in the most recent quarter, to make the embedded division larger than the wireless division, while profits fell 44 per cent to $63 million.
The layoffs will hit TI employees worldwide. The Dallas, Texas-based company said it hopes to save $450 million per year from the restructuring, which will incur a one-off cost of $325 million.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is email@example.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
IDC: Delivering Customer Value with Enterprise Flash Deployments
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.
Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the steps they can take to take advantage of what it has to offer. Read now.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.