Things could get better in the coming quarters
According to details revealed during its Q1 2021 financial call, AMD is ramping up GPU production and expects increase sales from Radeon RX 6000 series in the coming quarters.
The GA106, GA104, and GA102
According to various rumors around the net, it appears that Nvidia is preparing updated Ampere GPUs that will limit crypto-mining, eventually covering the entire RTX 30 series lineup.
Navi 12 GPU spotted in AMD Direct Rendering Manager
With Nvidia trying to push cryptominers to its Cryptocurrency Mining Processors (CMPs), it was just a matter of time before we saw a similar move from AMD. According to the latest rumors, it appears that AMD might be preparing to do just that.
Rumours are true
It is looking like the rumours are true and Samsung and AMD are about to announce their new custom GPU.
Line of GPUs for crypto mining
Nvidia has prepared quite a few surprises, including its newest line of Cryptocurrency Mining Processors (CMPs), dedicated GPUs for mining. According to what is known so far, there will be a total of four CMP SKUs, ranging from 26MH/s to 86MH/s.
In design and on "advanced node"
During its Big Navi RDNA 2 event, AMD CEO, Dr. Lisa Su, briefly talked about the future of GPU graphics, saying that RDNA 3 is on track.
RX 6900 XT, RX 6800 XT, and RX 6700 series
After the initial leak earlier this week, a full set of details for the entire upcoming Radeon RX 6000 series has found its way online, detailing a total of four SKUs, including the flagship RX 6900 XT which could be an AMD exclusive.
Tiger Lake paired up with Intel discrete GPU (DG1)
The VivoBook Flip 14 has already been announced with Intel's Tiger Lake CPU and it might also feature Intel's discrete GPU.
Total hardware control
Earlier this week, there were some rumors that Apple will use its graphics IP to build the discrete graphics processors, probably starting with a notebook first, and we can assure you that these plans are real.
Dutch boffins have found another flaw in Intel processors which enables attacker-controlled code executing on one CPU core to leak sensitive data from other software running on a different core.