Log in ....Tribune


Dot.ComLatest in ITFree DownloadsOn hardware

Monday, October 23, 2000
Latest in IT world

AMD scores over Intel

It seems that everything is not just okay for Intel. After the recent profit warning on the next quarter financial earnings of Intel, the company is now dogged by a string of recent glitches. The latest is that another chip giant Advanced Micro Devices (AMD) has scored a lead over the erstwhile-undisputed king of the chip. The AMD has recently released 2 new 1.2-GHz Athlon and the 800-MHz Duron processors, which will be used in systems from Compaq Computer, Gateway and Hewlett-Packard. This move will give the AMD a lead and also a higher market share from its rival - Intel, as there is still delay from the Intel in delivering its much-awaited Pentium IV processor. And the company is still recovering from the loss of its reputation by recalling its 1.13-GHz Pentium III chips. Moreover after the recall of 1.13 MHz Pentium III processor, AMD, has once again become the provider of fastest processor on the planet. The AMD has a presence in both budget and high-end segment. AMD gained foothold in the budget processor market by the launch of Duron in the month of June and now with the latest and fastest processor under its belt, it has become a potentially good alternative for Intel and many big PC brands like HP have started realising this.

 

Another security hole discovered

Microsoft's latest Internet browser has come into the eyes of storm once again after a bug hunter from Bulgaria detected a security hole in Microsoft's Internet Explorer 5.5, Outlook and Outlook Express. Earlier, during the month, a bug hunter from Hungary had discovered security holes in Internet Explorer 5.5, which had the potential danger of someone entering the hacked computer. As per the discovery of the latest security hole in Internet Explorer 5.5, a hacker can actually read files and also the URLs after enticing a person browsing with IE 5.5 to view a Web page or read an HTML message that has been created by this person for seeking entry into other's computers. The security hole also enables a hacker to enter into someone's computer system by delivering an e-mail of a Web page to someone who uses Outlook or Outlook Express and can then read and change files and other resources in the hacked computer.

Home Top