Feeds

Intel P55-based motherboards

The best boards for 'Lynnfield' Core i5s and i7s

The Power of One Brief: Top reasons to choose HP BladeSystem

Despite the limited space on a Micro-ATX board it feels as though Gigabyte has managed to pack in all the features of a full sized motherboard although this isn’t exactly true. If you install two graphics cards in CrossFireX mode, the Firewire and USB headers at the foot of the board are likely to be blocked.

Gigabyte P55M-UD4

The Micro-ATX form-factor makes accomodating big graphics cards tricky

If you install two really big cards such as Radeon HD 5850s or 5870s, you can kiss goodbye to the front panel headers.

We strongly advise that you think of the second PCIe slot as something to be used for a sound card or TV tuner and forget about CrossFireX.

The MIT (Motherboard Intelligent Tweaker) section of the Bios is arranged differently from previous Gigabytes and is especially easy to navigate. The MIT Current Status, Advanced Frequency, Memory and Voltage settings make the business of overclocking as easy as pie. We were able to get our Core i7 870 up to 3.96GHz without much effort and it stormed through Cinebench at a furious pace.

Gigabyte P55M-UD4

The low price of the Gigabyte makes it a tempting proposition but we consider Core i7 to be an enthusiast product and the P55M-UD4 is a little too basic to make us reach for our credit card.

Reg Rating 80
Price £120 Click here for the best online price
More Info Gigabyte's website

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.