Feeds
75%

AMD Phenom 9500 processor

AMD's four-core desktop CPU squares up for a fight with Intel's Core 2 Quad

The Power of One Brief: Top reasons to choose HP BladeSystem

A native quad-core design sounds as though it should be better than two dual-cores that have been cobbled together, but life isn’t necessarily that straightforward. Core 2 has all sorts of deficiencies, including the use of a frontside bus (FSB) and a memory controller that is part of the chipset. In a server, you can hit all sorts of bottlenecks in performance when you gang up a number of multi-core Xeons, but in the desktop arena these limitations don’t seem to have any effect.

AMD Phenom 9500 - CPU-Z

All the details

Phenom uses an AM2+ socket which needs to be matched to an AM2+ motherboard if you want to get the benefits of Hyper Transport 3.0. We used an Asus M3A32-MVP Deluxe with AMD's 790FX chipset for testing. We also threw an Athlon 64 X2 6400+ into the equation on a Gigabyte GA-MA69G-S3H motherboard, and then mixed and matched the permutations of AM2 processor with AM2+ motherboard (X2 on Asus) and AM2+ CPU on AM2 motherboard (Phenom on Gigabyte).

Asus M3A32-MVP Deluxe WiFi mobo

Asus' M3A32-MVP Deluxe: AM2+ socket on board

We also ran a Core 2 Q6600 on an MSI Diamond X38 with OCZ PC3-1333 memory so we could see how a comparable Intel system would perform.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.