Feeds
75%

Rock Xtreme X770 laptop with Nvidia GeForce 8800M graphics

Stellar gaming performance

Business security measures using SSL

In synthetic system tests like PCMark05 and PCMark Vantage there’s very little to choose between the two although the 8800M graphics do occasionally gain an edge which probably says more about synthetic benchmarks than it does about 3D graphics in day-to-day use.

PCMark 05 Results

Rock Xtreme X770 - PCMark05

Longer bars are better

PCMark Vantage Results

Rock Xtreme X770 - PCMark Vantage

Longer bars are better

It’s a completely different story in tests that put an emphasis on graphics, as the 8800M makes the 7950 Go look pathetic. In 3DMark06, the architecture of 8800M allows you to combine High Dynamic Range (HDR) lighting with anti-aliasing, while 7950 Go forces you to choose one or the other. In F.E.A.R Extraction Point, the 8800M has a small advantage but both chips do a very capable job. However, in Crysis, it’s 8800M GTX all the way.

F.E.A.R Extraction Point Results

Rock Xtreme X770 - FEAR XP

Average frames per second
Longer bars are better

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.