Feeds

Intel names 'Bearlake' gaming PC chipset

The Power of One Brief: Top reasons to choose HP BladeSystem

Intel launched its next-generation performance desktop chipsets last week, announcing version of the platform codenamed 'Bearlake' for games machines, mainstream PCs and budget systems.

The top-of-the-line X38 is designed to connect to Intel's four-core Core 2 Extreme processor. Like the other chipsets in the series, the X38 will be ready for the 'Penryn'-based 45nm Core chips due to appear late 2007/early 2008. Unlike its siblings, the X38 will contain PCI Express 2.0 technology - in the form of two PCIe x16 slots for a pair of co-operating graphics cards - and what Intel calls Performance Auto-tuning, a way of dynamically overclocking the processor and system components.

As past leaks have revealed, the X38 will support a 1333MHz frontside bus speed and connect to DDR 3 memory clocked also at 1333MHz.

The P35, G35 and G33 will target mainstream processors - the Core 2 Duo and Core 2 Quad - and, in the case of the G series chips, incorporate a DirectX 10-class graphics core and support for HDTV-friendly HDMI ports. The GPU will have the horsepower for HD DVD and Blu-ray Disc content decoding, Intel said.

At the bottom of the line is the G31, a cheaper chip aimed at low-cost systems based on Celeron and Pentium processors - both due for upgrades that will seen new versions based on the same underlying chip architecture as the Core series.

The P35 and G33 will arrive first, in Q2. The X38 and G35 will follow in Q3, as will the G31.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.