Feeds
90%

AMD 780G integrated DirectX10.1 chipset

Leaves Nvidia and Intel standing?

3 Big data security analytics techniques

With Hybrid graphics enabled the HD 3450 combines with the 780G to increase the 3DMark06 score to a hair below 2000 marks. There’s no denying that Hybrid graphics works as advertised but it’s hard to see why you’d bother increasing graphics performance by a relatively small margin. There’s a back-handed compliment hidden in there as this is the first time we’ve ever seen a situation where you’d consider using the integrated graphics when you have the option of using a passively cooled and silent graphics card.

Gigabyte's 780G-based MA78GM-S2H

Gigabyte's 780G-based MA78GM-S2H: runs cool, not warm

You’ll see from the test results that 780G eclipses the Radeon X1250 graphics in AMD's older 690 chipset. More importantly, the Universal Video Decoder (UVD) chip in the 780G will handle Blu-ray playback with the minimum of fuss and a CPU load in the range of 20-30 per cent from upwards of 90 per cent - not that it dropped any frames, mind. For the record, this was Casino Royale on a Pioneer BDC-S02 Blu-ray drive with CyberLink PowerDVD 7.3 software running under Windows Vista Ultimate 32-bit.

You may be wondering about the Athlon X2 BE-2400 processor that we used to test the 780G as AMD tells us that it is a "new addition to the AMD line of 45W dual-core desktop CPUs [that includes the] Athlon X2 BE-2300, BE-2350 and BE-2400. At 2.5GHz, it’s quite an able CPU for such a low power threshold".

The inclusion of this processor in the review kit along with a £65 Gigabyte GA-MA78GM-S2H motherboard and 2GB of relatively slow Corsair CM2X1024-6400C4 memory also tells a tale. AMD is putting the emphasis on the performance of the 780G without a hefty processor to drive it along.

Radeon HD 3200 UVD CPU usage
Radeon X 1250 UVD CPU usage

Blu-ray playback CPU usage: AMD 780G (top) and AMD 690G (bottom)

AMD also supplied reams of information about the need to ensure Cool‘n’Quiet is enabled. It quite correctly makes the point that most BIOS settings disable C'n'Q it by default, and that you shouldn’t monkey around with the power management scheme in Vista. Neither should you manually set the CPU multiplier or frequency as that locks the CPU frequency, which will over ride C'n'Q's attempts to vary CPU speed the better to keep the fan speed down - and thus generate less noise.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.