Feeds
90%
core2_duo_final_tumb_tn

Intel 'Conroe' Core 2 Duo and Core 2 Extreme

Intel's next-gen architecture - it's here

The Power of One Brief: Top reasons to choose HP BladeSystem

For folks into 3D rendering, the Core 2 Duo architecture will save a lot of time. Starting with POV-Ray the Pentium D 960 took 6m 50s to render the default test with both cores, and 13m 24s on one core. The E6700 shaved over two minutes off the dual-core time, taking just 4m 30s/ The single-core test took 8m 58s. The X6800 took 4m 9s dual-core and 8m 9s single core - a 39.3 per cent and 39.2 per cent improvement, respectively.

The Core 2 Duo processors are definitely bringing some real advantage to multi-threaded applications, and as you can see from the CineBench 9.5 graph there's a huge improvement when you move to multi-core rendering. The X6800 isn't far from being twice as fast as the Pentium D 960 here, which is very impressive considering it has a much more modest clock speed.

core2_duo_final_cinebench

So what about gaming? Well, we had some issues with an unhappy CrossFire config, so the 3D tests are something we're going to have to re-visit at a later stage. However, in 3DMark 06 the Core 2 Duo processors doesn't appear to have a huge lead over the Pentium D 960, but the my impression of the time it took to run the benchmarks was that the Core 2 Duo chips were clearly faster.

core2_duo_final_3dmark06

Application security programs and practises

Next page: Verdict

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.