When you want to have it all, including the ability to shift smoothly between the worlds of play and productivity, there's Windows Vista Ultimate. You'll never have to worry about having the most advanced capabilities—they're all here. This edition of Windows Vista offers an advanced, business-focused infrastructure, mobile productivity, and a premium home digital entertainment experience, all in a single offering.Specifically, Windows Vista Ultimate offers all of the features found in Windows Vista Home Premium, including Windows Media Center, Windows Movie Maker with high-definition support, and Windows DVD Maker. It also offers all of the features found in Windows Vista Business, including business networking, centralized management tools, and advanced system backup features. And Windows Vista Ultimate has all of the new security and data protection features that help take Windows Vista to a whole new level of dependability.In addition, Windows Vista Ultimate includes support for all of the new mobility features in Windows Vista, including Windows Tablet and Touch Technology, Windows SideShow, Windows Mobility Center, and other new, advanced mobility features.Exclusive to Windows Vista Ultimate are Windows Ultimate Extras. Windows Ultimate Extras are add-ons that extend certain capabilities of your operating system or just make using your PC more fun. Windows Ultimate Extras currently available include:
Windows DreamScene, an Extra that enables you to use looped, full-motion video as your desktop wallpaper instead of a static image
Windows Hold’em, a poker game for players of all skill levels
Language packs for Windows multi-language interface, where users can install and use multiple languages on a single PC. Great for multi-lingual households or if you are learning a new language.
Secure Online Key Backup, where Ultimate users can store their BitLocker recovery password and Encrypting File System certificate on Windows Marketplace’s Digital Locker website for access to the key anytime, anyplace, and from any computer that has an Internet connection
BitLocker Drive Preparation Tool, an automated tool which removes the complexity of setting up your PC to use this exclusive data security feature.
Monday, April 6, 2009
IBM System i™ 515 Express
For small to mid-sized businesses with less than 40 users, tired of dealing with the challenges of Microsoft® Windows®-based servers. An easy-to-manage, easy-to-secure and highly reliable alternative to Windows®-based servers. The System i Express models runs thousands of proven industry solutions that are sure to fit the needs of almost any business.
INTEL CORE 2 EXTREME
Whether it's gaming, digital photography, or video editing, today's high-impact entertainment demands breakthrough technology. Now with a new version based on Intel's cutting edge 45nm technology utilizing hafnium-infused circuitry to deliver even greater performance and power efficiency.When more is better-with four processing cores the Intel Core 2 Extreme processor delivers unrivaled¹ performance for the latest, greatest generation of multi-threaded games and multimedia apps.Now with a new version based on Intel's cutting edge 45nm technology utilizing hafnium-infused circuitry to deliver even greater performance and power efficiency. The Intel® Core™2 Extreme processor QX9770 running at 3.2 GHz delivers the best possible experience for today's most demanding users.
Intel® Board D945GCPE
The Intel® Desktop Board D945GCPE Essential Series offers a cost-efficient integrated graphics solution for the budget conscious user.
This board is built with affordability and flexibility in mind, and supports Intel® Core™2 Duo processors, Intel® Pentium® Dual-Core processors, Intel® Pentium® D processors, Intel® Pentium® 4 processors, Intel® Celeron® 400 Sequence processors, and Intel® Celeron® D processors up to 1066/800 MHz system bus in the LGA775 package. Other features include dual-channel DDR2 667/533 MHz SDRAM, Intel® Graphics Media Accelerator 950 (Intel® GMA 950), integrated 10/100 Network Connection, Intel® High Definition Audio (4 channel audio) and up to eight USB 2.0 ports.
This board is built with affordability and flexibility in mind, and supports Intel® Core™2 Duo processors, Intel® Pentium® Dual-Core processors, Intel® Pentium® D processors, Intel® Pentium® 4 processors, Intel® Celeron® 400 Sequence processors, and Intel® Celeron® D processors up to 1066/800 MHz system bus in the LGA775 package. Other features include dual-channel DDR2 667/533 MHz SDRAM, Intel® Graphics Media Accelerator 950 (Intel® GMA 950), integrated 10/100 Network Connection, Intel® High Definition Audio (4 channel audio) and up to eight USB 2.0 ports.
SEAGATE HARD DISK
Seagate® Barracuda® desktop drives deliver superior performance, reliability and value for all your application needs—from mainstream PCs to performance PCs, gaming PCs, workstations, desktop RAID and personal external storage devices.
Now available in capacities up to 1 TB, Barracuda desktop drives have proven to be the most widely used and trusted desktop hard drive in the world.
Barracuda desktop drives are available with SATA or ATA interfaces.Key Features and Benefits
Capacities from 80 GB to 1 TB
Perpendicular recording technology
ATA or Serial ATA interfaces
Wide range of cache options, from 2 MB to 32 M
Fast performance
Superb reliability
Eco-friendly power levels
5-year limited warranty
Now available in capacities up to 1 TB, Barracuda desktop drives have proven to be the most widely used and trusted desktop hard drive in the world.
Barracuda desktop drives are available with SATA or ATA interfaces.Key Features and Benefits
Capacities from 80 GB to 1 TB
Perpendicular recording technology
ATA or Serial ATA interfaces
Wide range of cache options, from 2 MB to 32 M
Fast performance
Superb reliability
Eco-friendly power levels
5-year limited warranty
AMD Phenom™ X4 9000
The ultimate megatasking experience. Featuring true multi-core design and award-winning AMD64 technology with Direct Connect Architecture, AMD Phenom™ X4 9000 Series processors deliver the ultimate megatasking experience by providing direct and rapid information flow between processor cores, main memory, and graphics and video accelerators. AMD Phenom™ X4 9000 Series processors have the technology to break through the most challenging processing loads. AMD Phenom™ X4 9000 Series processors feature low latency access to main memory for amazingly rapid response and phenomenal system performance. AMD Phenom™ X4 9000 Series processors were designed for megatasking—running multiple, multi-threaded applications. Surge through the most demanding processing loads, including advanced multitasking, critical business productivity, advanced visual design and modeling, serious gaming, and visually stunning digital media and entertainment.
Nvidia's new graphics chip
Nvidia's new graphics chip, the GeForce GTX280, is the latest in what's felt like a steady stream of new high-end GPUs this year, most from Nvidia. And true to Nvidia's recent marketing push, the GTX280 not only includes powerful 3D graphics capabilities, but it's also one of the first consumer graphics cards that can take over certain application processing tasks. Like most high-end 3D cards, the GTX280 (reviewed here on the Asus ENGTX280) is expensive at $650, which is about $50 more than we're used to for the fastest single-chip 3D card on the market. For that price, you get a measurable if not revolutionary performance edge. And while we're intrigued by the idea of GPU-based application processing, that capability still needs the software to catch up before it's truly useful. At the very least, wait until ATI's next-generation cards come to light next week before making a purchase. If you're interested in the GTX280 for application processing, we'd also suggest holding off until the software emerges. Just keep in mind that by the time we do see such applications, Nvidia's next expensive 3D card will be that much closer. There's actually quite a bit to talk about with the GTX280. In addition to the 3D and application processing, Nvidia has built-in support for its newly acquired PhysX physics processing software framework. It's also a part of Nvidia's HybridPower ecosystem, which has implications for system power consumption.
The biggest competitor to the GTX280, at least for now, is Nvidia's GeForce 9800GX2. That card, released only three months ago, uses two 9800 chips on a single graphics card, and sells for about $600. The GeForce GTX280 is designed to replace it. Because the GTX280 is a single chip card, one of its advantages is that you don't need to worry about how well a game can take advantage of a two-chip card, like the 9800GX2, or a traditional multicard set up.
What's most important is that the GTX280 comes in faster than the 9800GX2 on actual game tests. The 3DMark 2006 and 3DMark Vantage scores are interesting, but as synthetic benchmarks, they don't exactly represent real world gameplay. We're most impressed by the Crysis results. The GTX280 still can't hit the hallowed ground of 60 frames per second we like to see in our shooters, but it makes a significant leap over the 9800GX2. You will still experience some chop if you dial Crysis all the way up, but at 1,280x1,024-pixel resolution at high quality, you should get fairly smooth gameplay.
The biggest competitor to the GTX280, at least for now, is Nvidia's GeForce 9800GX2. That card, released only three months ago, uses two 9800 chips on a single graphics card, and sells for about $600. The GeForce GTX280 is designed to replace it. Because the GTX280 is a single chip card, one of its advantages is that you don't need to worry about how well a game can take advantage of a two-chip card, like the 9800GX2, or a traditional multicard set up.
What's most important is that the GTX280 comes in faster than the 9800GX2 on actual game tests. The 3DMark 2006 and 3DMark Vantage scores are interesting, but as synthetic benchmarks, they don't exactly represent real world gameplay. We're most impressed by the Crysis results. The GTX280 still can't hit the hallowed ground of 60 frames per second we like to see in our shooters, but it makes a significant leap over the 9800GX2. You will still experience some chop if you dial Crysis all the way up, but at 1,280x1,024-pixel resolution at high quality, you should get fairly smooth gameplay.
TOP COMPUTER THREATS
The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content. However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties...
Here are the Top Twelve Threats No Computer User Should Ignore:
1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware freeware downloaded from the web.3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.7. Dialers - for those of us still with dial up modems, dialer programs redirect calls to a very expensive number. You won't know until you get the bill.8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!12. Stranger-danger - For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.Three Step Action PlanThere are three essential steps that should be taken to ensure your PC is kept threat-free.
Firstly, be sensible when opening attachments or following email instructions from apparently reputable sites.
Secondly, make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.
Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.
Here are the Top Twelve Threats No Computer User Should Ignore:
1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses.2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware freeware downloaded from the web.3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host.4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC.5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers.6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature.7. Dialers - for those of us still with dial up modems, dialer programs redirect calls to a very expensive number. You won't know until you get the bill.8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites.9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits.10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided.11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on!12. Stranger-danger - For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom.Three Step Action PlanThere are three essential steps that should be taken to ensure your PC is kept threat-free.
Firstly, be sensible when opening attachments or following email instructions from apparently reputable sites.
Secondly, make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security.
Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out.
Features
Transform complex and visually intensive data into actionable information enabled by up to eight computational cores of pure performance.
Enjoy optimized visualization by balancing processing, memory and bandwidth resources to deliver rich visual experiences.
Do more in less time with up to 6X the throughput¹ so you can mega-task your way through parallel workflows
Enjoy optimized visualization by balancing processing, memory and bandwidth resources to deliver rich visual experiences.
Do more in less time with up to 6X the throughput¹ so you can mega-task your way through parallel workflows
Intel® Xeon® Processors LV and ULV
The Intel® Xeon® processor LV and Intel® Xeon® processor ULV are members of Intel’s growing product line of multi-core processors. Each dual-core processor combines the benefits of two high-performance execution cores with intelligent power management features to deliver significantly greater performance-per-watt over previous single-core Intel Xeon processor-based platforms. The dual-core/dual-processor capabilities are ideal for a wide range of low-power communications and embedded applications.
Intel® Pentium® Dual-Core Processor E2160
The Intel® Pentium® dual-core processor delivers great performance, low power enhancements, and multitasking for embedded computing. The Intel® Pentium® dual-core processor E2160Δ with a thermal design power of 65 watts delivers energy-efficient dual-core performance for cost-sensitive embedded designs. Intel® 65nm process technology makes it possible to integrate two complete execution cores in one physical package, providing advancements in simultaneous computing for multi-threaded applications and multi-tasking environments.
This dual-core processor is well suited for a wide range of performance-intensive, low-power embedded applications in smaller form factors such as interactive clients (i.e., point-of-sale terminals and ATMs), gaming platforms, industrial control and automation, and print imaging. While incorporating advanced processor technology, these processors remain software-compatible with previous IA-32 processors.
The Intel Pentium dual-core processor E2160 is validated with the Intel® Q35 Express Chipset and Intel® Q965 Express Chipset. The Intel Q35 Express Chipset platform brings a new level of power reduction in idle and maximum power, making it an ideal choice for embedded applications meeting high-performance, low-thermal specifications.
This dual-core processor is well suited for a wide range of performance-intensive, low-power embedded applications in smaller form factors such as interactive clients (i.e., point-of-sale terminals and ATMs), gaming platforms, industrial control and automation, and print imaging. While incorporating advanced processor technology, these processors remain software-compatible with previous IA-32 processors.
The Intel Pentium dual-core processor E2160 is validated with the Intel® Q35 Express Chipset and Intel® Q965 Express Chipset. The Intel Q35 Express Chipset platform brings a new level of power reduction in idle and maximum power, making it an ideal choice for embedded applications meeting high-performance, low-thermal specifications.
Intel Pentium M Processor
The Intel® Pentium® M processor utilizes a new microarchitecture to meet the current and future demands of high-performance, low-power embedded computing, making it ideal for medium-to-large enterprise communications applications, transaction terminal, interactive client, and industrial automation applications. While incorporating advanced processor technology, it remains software-compatible with previous members of the Intel® microprocessor family.
Intel® Xeon® Processor 5000/3000 Sequence
Breakthrough performance, energy efficiency, extended lifecycle support and common socket Intel Xeon processor-based systems make them the ideal choice for compute-intensive embedded, storage and communications applications.
Lower thermal design power (TDP) and higher Tcase temperature Intel Xeon processor options are ideal options for low power consumption and/or compliance with the AdvancedTCA* form factor and NEBS level-3 thermal specifications*.
Lower thermal design power (TDP) and higher Tcase temperature Intel Xeon processor options are ideal options for low power consumption and/or compliance with the AdvancedTCA* form factor and NEBS level-3 thermal specifications*.
Intel® Core™2 Duo Processors
Based on Intel's revolutionary Intel® Core™ microarchitecture, the Intel® Core™2 Duo processors were designed from the ground up delivering the best system level overall performance per watt. To meet the needs of the embedded platforms, there are multiple processors in offering: the new Intel® Core™2 Duo processor T9400, the Intel® Core™2 Duo SL9400, SL9380, SP9300, SU9300 and the Intel® Core™2 Duo processor E8400, E7400 based on industry-leading 45nm process technology, as well as the Intel® Core™2 Duo processor E6400, the Intel® Core™2 Duo processor E4300, the Intel® Core™2 Duo processors T7500 and T7400, the Intel® Core™2 Duo processors L7500 and L7400, and the Intel® Core™2 Duo processor U7500. These processors utilize the Intel® Core™ microarchitecture along with the following key features:
Intel® Wide Dynamic Execution enabling delivery of more instructions per clock cycle to improve execution time and energy efficiency.
Intel® Intelligent Power Capability designed to deliver more energy-efficient performance. The 45nm process technology delivers a new super shuffle engine, which improves existing SSE instructions while enabling significant gains on the latest SSE4 instruction set. As a result, SSE4-optimized applications such as video editing and encoding in high-definition resolution will see additional performance improvements.
Intel® Smart Memory Access improves system performance by optimizing the use of the available memory data bandwidth.
Intel® Advanced Digital Media Boost accelerates a broad range of applications, including video, speech and image, photo processing and encryption.
Intel® Advanced Smart Cache Provides a higher-performance, more efficient cache subsystem
Intel® Wide Dynamic Execution enabling delivery of more instructions per clock cycle to improve execution time and energy efficiency.
Intel® Intelligent Power Capability designed to deliver more energy-efficient performance. The 45nm process technology delivers a new super shuffle engine, which improves existing SSE instructions while enabling significant gains on the latest SSE4 instruction set. As a result, SSE4-optimized applications such as video editing and encoding in high-definition resolution will see additional performance improvements.
Intel® Smart Memory Access improves system performance by optimizing the use of the available memory data bandwidth.
Intel® Advanced Digital Media Boost accelerates a broad range of applications, including video, speech and image, photo processing and encryption.
Intel® Advanced Smart Cache Provides a higher-performance, more efficient cache subsystem
NET vs. Java and Java EE
The CLI and C# have many similarities to Sun's JVM and Java. They are strong competitors. Both are based on a virtual machine model that hides the details of the computer hardware on which their programs run. Both use their own intermediate byte-code, Microsoft calling theirs Common Intermediate Language (CIL; formerly MSIL) and Sun Java bytecode. On .NET the byte-code is always compiled before execution, either Just In Time (JIT) or in advance of execution using the ngen.exe utility.With Java the byte-code is either interpreted, compiled in advance, or compiled JIT. Both provide extensive class libraries that address many common programming requirements and address many security issues that are present in other approaches. The namespaces provided in the .NET Framework closely resemble the platform packages in the Java EE API Specification in style and invocation..NET in its complete form (Microsoft's implementation) is only available on Windows platforms and partially available on Linux and Macintosh, whereas Java is fully available on many platforms. From its beginning .NET has supported multiple programming languages and at its core remains platform agnostic and standardized so that other vendors can implement it on other platforms (although Microsoft's implementation only targets Windows, Windows CE, and Xbox platforms). The Java platform was initially built to support only the Java language on many operating system platforms under the slogan "Write once, run anywhere." Other programming languages have been implemented on the Java Virtual Machine but are not widely used.Sun's reference implementation of Java (including the class library, the compiler, the virtual machine, and the various tools associated with the Java Platform) is becoming open source under the GNU GPL license with Classpath exception. source code for the .NET framework base class library is available under the Microsoft Reference License, which is a closed-source license.The third-party Mono Project, sponsored by Novell, has been developing an open source implementation of the ECMA standards that define the .NET Framework, as well as most of the other non-ECMA standardized libraries in Microsoft's .NET. The Mono implementation is meant to run on Linux, Solaris, Mac OS X, BSD, HP-UX, and Windows platforms. Mono includes the CLR, the class libraries, and compilers for C# and VB.NET.The current version supports nearly all the APIs in version 1.1 of Microsoft's .NET and almost 96% of the APIs in version 2.0 of Microsoft's .NET. Support for the additional libraries in .NET 3.0 and 3.5 is in the early stages of development, as is support for C# 3.0 and LINQ.
What's New for 3.5 ?
The .NET Framework 3.5 provides the foundation for building connected and appealing applications, productively, on a wide variety of systems from the device to the data center.Microsoft continues to support developers using the .NET Framework platform by providing support for applications built in previous versions to the 3.5 release, so existing applications built for .NET Framework 2.0 or .NET Framework 3.0 will continue to work.The .NET Framework 3.5 adds new features in several major technology areas:
Deep integration of Language Integrated Query (LINQ) and data awareness.
Support for Web 2.0 AJAX-style applications and services in ASP.NET and WCF.
Full tooling support for WF, Windows Communication Foundation (WCF), and Windows Presentation Foundation (WPF), including the new workflow-enabled services technology.
New classes in the base class library (BCL) for the .NET Framework 3.5 address the most common customer requests..NET Framework 3.5 will ship with Visual Studio 2008 and will be available for separate download from MSDN. Microsoft .NET Framework 3.5 contains many new features building incrementally upon .NET Framework 2.0 and 3.0, and includes .NET Framework 2.0 service pack 1 and .NET Framework 3.0 service pack 1...
Deep integration of Language Integrated Query (LINQ) and data awareness.
Support for Web 2.0 AJAX-style applications and services in ASP.NET and WCF.
Full tooling support for WF, Windows Communication Foundation (WCF), and Windows Presentation Foundation (WPF), including the new workflow-enabled services technology.
New classes in the base class library (BCL) for the .NET Framework 3.5 address the most common customer requests..NET Framework 3.5 will ship with Visual Studio 2008 and will be available for separate download from MSDN. Microsoft .NET Framework 3.5 contains many new features building incrementally upon .NET Framework 2.0 and 3.0, and includes .NET Framework 2.0 service pack 1 and .NET Framework 3.0 service pack 1...
Ubiquitous and Productive
The .NET Framework, including improvements like LINQ, provides a single platform to quickly build mobile desktop and server-based applications.
Compelling
With the .NET Framework, developers and designers can collaborate to create rich user experiences.
Connected
NET Framework empowers developers to build applications that require robust messaging systems or flexible workflows.
OVERVIEW
The .NET Framework is a development and execution environment that allows different programming languages and libraries to work together seamlessly to create Windows-based applications that are easier to build, manage, deploy, and integrate with other networked systems.Built on Web service standards, .NET enables both new and existing personal and business applications to connect with software and services across platforms, applications, and programming languages. These connections give users access to key information, whenever and wherever you need it.Microsoft .NET–connected software makes the "real-time" enterprise real by enabling information to flow freely throughout the organization, accessible to business partners, and delivering value to customers. With .NET-connected software, users can increase the value of existing systems and seamlessly extend those systems to partners, suppliers, and customers.
What is .Net Framework ??
The Microsoft .NET Framework is a software technology that is available with several Microsoft Windows operating systems. It includes a large library of pre-coded solutions to common programming problems, a runtime or virtual machine that manages the execution of programs written specifically for the framework, and a set of tools for configuring and building applications. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.The pre-coded solutions that form the framework's Base Class Library cover a large range of programming needs in a number of areas, including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers who combine it with their own code to produce applications.Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The CLR also provides other important services such as security, memory management, and exception handling. The class library and the CLR together compose the .NET Framework.The .NET Framework is included with Windows Server 2008 and Windows Vista. The current version of the framework can also be installed on Windows XP and the Windows Server 2003 family of operating systems.[2] A reduced "Compact" version of the .NET Framework also available on Windows Mobile platforms, including Smartphones.
Intel vs AMD
The release of Windows Vista and a round of price cuts by AMD prompted us to hatch a devious plan involving Vista, a new test suite full of multithreaded and 64-bit applications, fifteen different CPU configurations, and countless hours of lab testing. That plan has come to fruition in the form of a broad-based comparison of the latest processors from AMD and Intel, ranging from well under $200 to a cool grand, from two slow CPU cores to four fast ones, from the lowly Athlon 64 X2 4400+ and Core 2 Duo E6300 to the astounding Athlon 64 FX-74 and Core 2 Extreme QX6700.
So, how do the latest processors stack up in Windows Vista? Will a sub-$200 CPU suffice for your needs? Have price cuts allowed the Athlon 64 to catch up to the Core 2 Duo in terms of price-performance? What about power consumption and energy efficiency? Can any of these processors stand up under the weight of killer new games like Supreme Commander?
The matchups
The setup for this one is fairly simple. We're directly comparing processors from Intel at AMD at a range of price points. Intel has had a lock on the overall performance lead since the Core 2 Duo first hit the scene, but AMD has made clear its intention to maintain a competitive price-performance ratio. To do so, AMD will have to meet or beat each of the processors in Intel's current desktop lineup, which looks like so:
Model
Clock speed
Cores
L2 cache (total)
Fab process
TDP
Price
Core 2 Duo E6300
1.83GHz
2
2MB
65nm
65W
$183
Core 2 Duo E6400
2.13GHz
2
2MB
65nm
65W
$224
Core 2 Duo E6600
2.4GHz
2
4MB
65nm
65W
$316
Core 2 Duo E6700
2.66GHz
2
4MB
65nm
65W
$530
Core 2 Extreme X6800
2.93GHz
2
4MB
65nm
75W
$999
Core 2 Quad Q6600
2.4GHz
4
8MB
65nm
105W
$851
Core 2 Extreme QX6700
2.66GHz
4
8MB
65nm
130W
$999
Intel does offer lower cost options like the Core 2 Duo E4300 and its Celeron value-oriented processors, but our list includes the meat of the lineup.
AMD, on the other hand, offers a dizzying array of Athlon 64 X2 models, from 3600+ to 6000+, generally in increments of 200 (or is it 200+?). Not only that, but AMD often sells multiple products under the same performance-related model number, just to keep smug members of the general public from becoming overconfident. For instance, the Athlon 64 X2 4400+ comes in a 90nm "Toledo" flavor that runs at 2.2GHz, has 1MB of L2 cache per core, and is intended for Socket 939 motherboards. The X2 4400+ also comes in the form of a 65nm chip code-named "Brisbane" that runs at 2.3GHz, has 512K of L2 per core, and slips into Socket AM2 mobos. Several of these features—fab process, clock frequency, cache size, and socket/memory type—may vary within the same model number.
Athlon 64 lineup - the most direct competitors to their Core 2 counterparts. Because we live in the now, all of these are newer-style Socket AM2 processors:
Model
Clock speed
Cores
L2 cache (total)
Fab process
TDP
Price
Athlon 64 X2 4400+
2.3GHz
2
1MB
65nm
65W
$170
Athlon 64 X2 5000+
2.6GHz
2
1MB
65nm
65W
$222
Athlon 64 X2 5600+
2.8GHz
2
2MB
90nm
89W
$326
Athlon 64 X2 6000+
3.0GHz
2
2MB
90nm
125W
$459
Athlon 64 FX-70
2.6GHz
4
4MB
90nm
125W x 2
$599
Athlon 64 FX-72
2.8GHz
4
4MB
90nm
125W x 2
$799
Athlon 64 FX-74
3.0GHz
4
4MB
90nm
125W x 2
$999
As you can see, AMD has a fairly direct answer for most members of the Core 2 range. Things start to get shaky at the high end, where the Athlon 64's lower performance takes its toll. The Athlon 64 X2 6000+ sells at a discount versus the Core 2 Duo E6700, and AMD has no answer to the Core 2 Extreme X6800, Intel's fastest dual-core processor. If you match up the two product lines against one another, the results look something like this:
Model
Price
Model
Price
Core 2 Duo E6300
$183
Athlon 64 X2 4400+
$170
Core 2 Duo E6400
$224
Athlon 64 X2 5000+
$222
Core 2 Duo E6600
$316
Athlon 64 X2 5600+
$326
Core 2 Duo E6700
$530
Athlon 64 X2 6000+
$459
Core 2 Quad Q6600
$851
Athlon 64 FX-72
$799
Core 2 Extreme QX6700
$999
Athlon 64 FX-74
$999So the comparisons are remarkably direct, by and large.
These things are never entirely simple, though, so we should roll out some caveats. One of the big ones involves those FX-series processors. You'll need two of them in order to populate a Quad FX motherboard, so they're priced (and listed above) in pairs. However, there's currently only one Quad FX motherboard available, and it costs about $350, which throws the value equation out of whack.
The value equation sometimes goes off-kilter the other way when AMD employs guerrilla price-war tactics like selling the Athlon 64 X2 4600+ for $125.99 on Newegg, well below the slower 4400+. AMD has several of these "Crazy Hector" deals going at Newegg right now, and none of them seem to involve the Athlon 64 models we've identified as direct competitors to specific Core 2 Duo models. That's probably an intentional facet of AMD's strategy.
So, how do the latest processors stack up in Windows Vista? Will a sub-$200 CPU suffice for your needs? Have price cuts allowed the Athlon 64 to catch up to the Core 2 Duo in terms of price-performance? What about power consumption and energy efficiency? Can any of these processors stand up under the weight of killer new games like Supreme Commander?
The matchups
The setup for this one is fairly simple. We're directly comparing processors from Intel at AMD at a range of price points. Intel has had a lock on the overall performance lead since the Core 2 Duo first hit the scene, but AMD has made clear its intention to maintain a competitive price-performance ratio. To do so, AMD will have to meet or beat each of the processors in Intel's current desktop lineup, which looks like so:
Model
Clock speed
Cores
L2 cache (total)
Fab process
TDP
Price
Core 2 Duo E6300
1.83GHz
2
2MB
65nm
65W
$183
Core 2 Duo E6400
2.13GHz
2
2MB
65nm
65W
$224
Core 2 Duo E6600
2.4GHz
2
4MB
65nm
65W
$316
Core 2 Duo E6700
2.66GHz
2
4MB
65nm
65W
$530
Core 2 Extreme X6800
2.93GHz
2
4MB
65nm
75W
$999
Core 2 Quad Q6600
2.4GHz
4
8MB
65nm
105W
$851
Core 2 Extreme QX6700
2.66GHz
4
8MB
65nm
130W
$999
Intel does offer lower cost options like the Core 2 Duo E4300 and its Celeron value-oriented processors, but our list includes the meat of the lineup.
AMD, on the other hand, offers a dizzying array of Athlon 64 X2 models, from 3600+ to 6000+, generally in increments of 200 (or is it 200+?). Not only that, but AMD often sells multiple products under the same performance-related model number, just to keep smug members of the general public from becoming overconfident. For instance, the Athlon 64 X2 4400+ comes in a 90nm "Toledo" flavor that runs at 2.2GHz, has 1MB of L2 cache per core, and is intended for Socket 939 motherboards. The X2 4400+ also comes in the form of a 65nm chip code-named "Brisbane" that runs at 2.3GHz, has 512K of L2 per core, and slips into Socket AM2 mobos. Several of these features—fab process, clock frequency, cache size, and socket/memory type—may vary within the same model number.
Athlon 64 lineup - the most direct competitors to their Core 2 counterparts. Because we live in the now, all of these are newer-style Socket AM2 processors:
Model
Clock speed
Cores
L2 cache (total)
Fab process
TDP
Price
Athlon 64 X2 4400+
2.3GHz
2
1MB
65nm
65W
$170
Athlon 64 X2 5000+
2.6GHz
2
1MB
65nm
65W
$222
Athlon 64 X2 5600+
2.8GHz
2
2MB
90nm
89W
$326
Athlon 64 X2 6000+
3.0GHz
2
2MB
90nm
125W
$459
Athlon 64 FX-70
2.6GHz
4
4MB
90nm
125W x 2
$599
Athlon 64 FX-72
2.8GHz
4
4MB
90nm
125W x 2
$799
Athlon 64 FX-74
3.0GHz
4
4MB
90nm
125W x 2
$999
As you can see, AMD has a fairly direct answer for most members of the Core 2 range. Things start to get shaky at the high end, where the Athlon 64's lower performance takes its toll. The Athlon 64 X2 6000+ sells at a discount versus the Core 2 Duo E6700, and AMD has no answer to the Core 2 Extreme X6800, Intel's fastest dual-core processor. If you match up the two product lines against one another, the results look something like this:
Model
Price
Model
Price
Core 2 Duo E6300
$183
Athlon 64 X2 4400+
$170
Core 2 Duo E6400
$224
Athlon 64 X2 5000+
$222
Core 2 Duo E6600
$316
Athlon 64 X2 5600+
$326
Core 2 Duo E6700
$530
Athlon 64 X2 6000+
$459
Core 2 Quad Q6600
$851
Athlon 64 FX-72
$799
Core 2 Extreme QX6700
$999
Athlon 64 FX-74
$999So the comparisons are remarkably direct, by and large.
These things are never entirely simple, though, so we should roll out some caveats. One of the big ones involves those FX-series processors. You'll need two of them in order to populate a Quad FX motherboard, so they're priced (and listed above) in pairs. However, there's currently only one Quad FX motherboard available, and it costs about $350, which throws the value equation out of whack.
The value equation sometimes goes off-kilter the other way when AMD employs guerrilla price-war tactics like selling the Athlon 64 X2 4600+ for $125.99 on Newegg, well below the slower 4400+. AMD has several of these "Crazy Hector" deals going at Newegg right now, and none of them seem to involve the Athlon 64 models we've identified as direct competitors to specific Core 2 Duo models. That's probably an intentional facet of AMD's strategy.
Subscribe to:
Posts (Atom)