Dear Windows-Help.NET Subscriber,
Bill Gates, talking at the annual Game Developers Conference, announced that Microsoft is entering the video game world with the introduction of a future-generation dedicated video game console, currently code-named X-Box, designed to deliver intense, action-packed games.
"Building on our strengths as a software company, X-Box will offer game developers a powerful platform and game enthusiasts an incredible experience," said Bill Gates, chairman and chief software architect at Microsoft. "We want X-Box to be the platform of choice for the best and most creative game developers in the world."
Familiar tools such as the Microsoft® DirectX® API will inspire movie-quality rendering, enhanced Internet gaming, and superior audio in future-generation games.
The market for consoles is a hotly contested one. Arriving on store shelves in the second half of 2001, the X-Box will compete directly against Sony's PlayStation2, Nintendo's Dolphin and Sega's Dreamcast.
Sony & Sega practically created the console market, and they'll have the advantage that they really know the consumers. But some analysts are already predicting that it's going to be a two platform world - between Sony and Microsoft.
X-Box Specification
vDirectX API v Intel Pentium III processor technology with Streaming SIMD Extensions v Custom 3-D NVIDIA graphics processor v 64MB of RAM v Custom 3-D audio processor v 8GB hard drive v 4X DVD drive with movie playback v Four game controller ports v Expansion port v Proprietary A/V connector v 100 MBps Ethernet
For more information see: X-Box to Deliver Ultimate Console Gaming Experience.
|
Computer Viruses got you worried? @Backup is the cure. Automatic file protection - online file access and storage. Try now, free for 30 days. Click here.
|
New Intel Protected Access Architecture Increases Security For Mobile PC's
Intel Corporation this week announced a new security architecture that provides increased data and asset protection for mobile PCs. Called the Intel® Protected Access Architecture, it works by identifying the authorized user of the mobile PC through a device such as a fingerprint reader, smart card or USB "key" before proceeding to boot up the system. If the person attempting to use the PC is not authorized, the system will not boot up, preventing access to the system's data and rendering the system useless. This approach provides a stronger security solution than "BIOS passwords" alone, and could also remove the burden of users having to remember some passwords.
|