Feeds

Computex 2006 - Full Coverage

This year's key stories

  • alert
  • submit to reddit

Top three mobile application threats

Fast access to the key stories from this year's show.

Chipsets

Intel does HD with G965 chipset
ATI RS600 chipset surfaces
Intel rolls out P965/ICH8 chipset
Nvidia rolls out Intel edition nForce 500 chipset trio

CPUs

AMD defines itself as the joker in the pack
Laptop vendors to adopt desktop 'Conroe' chip?
AMD to re-badge Transmeta CPUs
VIA to push thin-client concept at big business

Digital media

Adata shows solar powered USB memory key
Nvidia talks Purevideo HD
Philips, Lite-on, BenQ prep Blu-ray drives

Graphics

AverMedia shows Mac USB TV-tuner
Working dual X1600XT from GeCube
MSI makes 'first' upgradeable SLI graphic card
Leadtek rebuts Foxconn handover claim
ATI announces PVR-friendly TV chip
Asus readies HDMI-enabled graphics cards
ATI pitches CrossFire certification scheme
ATI claims crown in physics-on-GPU performance
Nvidia launches dual-GPU GeForce 7950 GX2

Mobile

DVB-H on display
Acer touts 'beyond the norm' monster 20.1in laptop
Dialogue demos 'unique' laptop display rig
Nvidia bids for next-gen handheld biz

Motherboards

Watercooled motherboard from Asus
Socket F mobos sneak out at Computex
Nvidia nForce 590 mobos shown by ECS and DFI
Iwill punts 16-FB-DIMM Xeon mobo
ECS heralds 'Broadwater' mobos

PCs

Shuttle readies CrossFire XPC
Gigabyte gives 'Merom' room in mini media PC
FIC makes play for slimmest media centre PC
Tyan unleashes 16-core 'personal' supercomputer

VoIP

PC-less VoIP Wi-Fi phone
Intel pitches VoIP card at office-PC users

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.