Feeds

Mobo makers dash to prep VIA-based P4 boards

Now the war's over

  • alert
  • submit to reddit

Asustek and MSI have said they will release motherboards based on VIA's upcoming 800MHz frontside bus Pentium 4 chipset, the PT400, DigiTimes reports. Gigabyte said it is evaluating the technology.

Surprise, surprise. No sooner is the long-running legal battle between VIA and Intel sorted out, and the mobo makers decide they want to offer VIA-based Pentium 4 products after all.

During the fight, Elitegroup was the only major mobo player willing to release boards based on VIA's P4X range, which Intel at the time claimed violated its intellectual property. Indeed, Elitegroup was named as a co-defendant. Such action persuaded other mobo makers that discretion was the better part of valour.

VIA was forced to release its own line of motherboards in order to ship its own chipsets in volume.

Elitegroup gambled that the lawsuits would be settled soon enough. In September 2001 we predicted that VIA and Intel would come together and cross-license their respective patents. We got the date wrong - we thought it would happen in 2002.

DigiTimes reports that MSI's PT400-based board is due next month, Asustek's in June. ®

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.