Feeds

Chip maker Centaur out-paces Intel, Samsung

Charity long-distance running, not processor performance

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

It's official: semiconductor developer Centaur, part of VIA, has rival chip maker Intel licked. Yes, the processor giant proved less fleet of foot than its considerably smaller rival... during the 28th Statesman Capitol 10,000 race this past weekend.

The sponsored 10km jog, organised by the Austin American-Statesman newspaper, takes runners on a trip through downtown Austin. Some folk run for the heck of it, others to raise money for good causes, quite a few even to win. The paper also challenges local corporates to field teams of runners.

On Sunday, 3 April, under clear skies, ten-person teams from Centaur, Intel, Samsung and others battled it out for athletic supremacy.

As any good overclocker knows, it's all about timing, and Centaur's team nosed past Intel's, with a team time of 3h 25m 56.6s to the chip giant's 3h 26m 30.8s.

To give Intel due credit, its fastest runner, Jim Cleary, came in ahead of Centaur's first man home, Keith Savage. He crossed the finish line in 30th place, with a personal time of 35m 57.4s. Savage took 37m 14.2s to complete the course, winning himself 46th place.

And even Centaur's team didn't top the corporate chart. It scored second place behind runners from National Instruments, which took a team time of 3h 15m 40.7s. Intel came third, followed by the first of three teams fielded by Samsung. Anteon Corp. came fifth. You can read the full corporate results here.

The race was won by Bernard Manirakiza of Abilene, Texas, one of the pre-race favourites, on account of being an NCAA Division II track champion at 800 and 1500 meters, and the mile. Still, this was his first road race, but he clocked a time of 30m 6s. Well done, Bernard - we salute you. And, indeed, all the teams and individuals who took part, with fast times and not-so-fast times. ®

Related stories

Olympic no-hopers immortalised online
IT Marathon girl goes head-to-head with perjuring peer
118 118 slapped for David Bedford caricature
David Bedford gets the hump over 118 118 ads
Baseball legend goes up for sale on the Net
Nike blames ebiz software on earnings shortfall

3 Big data security analytics techniques

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.