Feeds

Core 2 Duo-ready software compendium

Enter the age dual-core computing with these Core 2 Duo-friendly applications

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Here is a selection of some of the many, many applications and utilities that are ready to take full advantage of Intel's dual-core processor architecture. All software applications will gain from the higher processing performance the Intel Core 2 Duo delivers, but programs specially written to be 'multi-threaded' are ready to make the most of the Core 2 Duo's two-processors-in-one design.

The number of multi-threaded applications is growing all the time. Check back regularly to see if your favourite software is ready to take full advantage of the multi-core computing future driven by Intel's Core 2 Duo and Core 2 Extreme processors. Software developers are welcome to submit there multi-threaded apps for inclusion too.

Games

  • Anno 1701
  • Black and White 2
  • City of Villains
  • Elveon
  • ER
  • Falcon Force
  • Galactic Civilizations II
  • Heavy Duty
  • Juiced
  • Law and Order: Criminal Intent
  • Paraworld
  • The Apprentice
  • The Movies
  • Quake 4

Imaging and Graphics

  • 3D Studio Max
  • Adobe Premiere
  • Adobe Premiere Elements
  • Adobe Photoshop
  • Adobe Photoshop Elements
  • Autodesk Maya

Multimedia

  • Apple iTunes
  • Avid Liquid V8
  • Cakewalk Dimension Pro
  • Cakewalk Kinetic
  • Cakewalk Music Creator 3
  • Cakewalk Project 5
  • Cakewalk Pyro 5
  • Cakewalk Sonar 5/Home Studio Version 4/Power Studio
  • Maxon Cinema 4D
  • Maxon Body Paint 3D
  • Steinberg Cubase SX3
  • Steinberg Nuendo 3
  • MainConcept H.264 Encoder 2
  • Microsoft Movie Maker
  • Microsoft Windows Media Encoder
  • Muvee autoProducer 5
  • Neatware Ladybug Player Vista
  • Neatware MyrmecoX Studio
  • newplugins Vehicle Studio 1.7
  • Nero 7
  • Rhozet Carbon
  • Rhozet Graphite MPEG Grid Encoder
  • Roxio Easy Media Creator 8

Productivity

  • Abbyy FineReader (OCR)
  • Abbyy FormReader (OCR)
  • Corel WordPerfect Office X3 Standard Edition
  • Dragon NaturallySpeaking 8
  • FormRouter .NET
  • Haansoft Hangul2005
  • IBM DB2 Universal Database 9
  • Microsoft Office
  • Microstrategy 8
  • MySQL Database 5
  • ProspectSoft Contact Management
  • ProspectSoft CRM Pro
  • Scansoft OmniPage Pro 15

Security

  • Check Point Integrity
  • Check Point InterSpect
  • Check Point VPN-1 Power
  • Check Point VPN-1 UTM
  • Kaspersky Anti-Virus 6.0
  • Kaspersky Internet Security 6.0
  • Neusoft Neteye Firewall/VPN
  • Panda Platinum 2006 Internet Security
  • Panda Titanium 2006 Antivirus + Antispyware

Networking and Comms

  • AdventNet Zoho Virtual Office
  • CommuniGate Pro 5.1
  • Haansoft WorkDesk 2005
  • IBM Lotus Notes
  • iPass ExpressConnect 3.0
  • SightSpeed 4.6
  • Skype 2.0
  • Stardock Multiplicity

Utilities

  • BeInSync
  • Diskeeper 10
  • Euroosft PC Builder
  • Eurosoft PC-Check

Development

  • Absoft Express and Standard Fortran 10
  • Absoft Fortran and C/C++ Solutions
  • Absoft FX2 Debugger
  • Absoft High Performance Computing SDK
  • Absoft Pro Fortran Compiler Suite
  • Intel Cluster Tools
  • Intel Compilers
  • Intel Peformance Libraries
  • Intel Threading Tools 2.2
  • Intel vTune Performance Analyzer

Engineering and Scientific

  • Flow Science FLOW-3D 9.1
  • Parametric Technology Windchill

Middleware

  • Trinigy Vision Engine 6.0
  • Havok Physics API Software Development Kit

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.