Feeds

ATI to unveil Rage 6 on 24 April…

...the day before Nvidia launches the NV11 and NV15

  • alert
  • submit to reddit

Top three mobile application threats

ATI admitted today it is working on a high-end, high-margin 3D graphics chip. Speaking to Reuters, CFO Jim Chwartacky said: "We will be announcing a high-end product that reinforces and extends our reach into the higher margin part of the PC market." Not that we're entirely surprised. Surely Chwartacky is referring to the upcoming Rage 6, which the company has already scheduled a 24 April (the first day of the WinHEC event) booze-up during which company president and CEO K Y Ho will unveil the next-generation chip. Some of the technologies Rage 6 will contain were unveiled at last month's Game Developer Forum, though they were rather overshadowed by Microsoft's X-Box launch. ATI engineers showed of their Charisma Engine transform and lighting system and its Pixel Tapestry Architecture. Incidentally, Nvidia will use WinHEC to launch the successor to the GeForce 256 - or, as the company puts it, "usher in a new era of 3D graphics". The launch will take place on 25 April - the day after ATI's - and we expect to see the NV15 and/or the mobile NV11. ATI earlier this week announced revenue and income growth of 28 per cent and 136 per cent, respectively. The company attributed the results, for its second quarter, to strong sales of its Rage 128 Pro and Rage Mobility 128 chips. However, it noted that margins are on their way down, reaching 33.2 per cent from Q1's 34.1 per cent, thanks to the shift toward the low-end of various ATI products plus rising production costs. Chwartacky said ATI is poised to take advantage of the mobile computing market, which suggests the company has signed up some more notebook manufacturers to join Apple, which offers the latest Rage Mobility in its high-end PowerBook G3. ® Related Stories ATI records 136 per cent profit hike ATI to demo gigatexel renderer, animation accelerator Nvidia NV11 goes mobile too Nvidia hides NV11, NV15 under CeBIT bushel

3 Big data security analytics techniques

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.