Tag: ultra

Internode strikes new Optus SHDSL deal 
By Ry Crozier | Mar 24, 2010 | Comment Now 
Last mile savings result in price cut for broadband services.
Linksys N Ultra Rangeplus Simultaneous Dual-N Band Wireless Router WRT610N 
By Stephen Withers | Feb 3, 2009 | Comment Now 
Although it’s not a screamer at short range, the good long-range performance (at 5GHz at least) makes the Linksys WRT610N an attractive choice
Internode Ultra bundles ADSL2+, VOIP and line rental 
Nov 18, 2008 | Comment Now 
Internode has launched a bundled service of ADSL2+ broadband, VoIP and a traditional phone line on a single plan.
Ultra mobile device use set to soar 
By Phil Muncaster | Sep 26, 2008 | Comment Now 
The number of ultra mobile devices (UMDs) is set to reach 200 million by 2013, with the industry worth around $27bn, according to new research by market analyst ABI Research.
Ultra low-cost laptops to remain niche 
By Robert Jaques | May 12, 2008 | Comment Now 
Ultra low-cost notebook PCs will remain niche products despite recent hype, and will not become market "blockbusters", experts predict..
SanDisk boosts Ultra II memory cards 
Sep 4, 2007 | Comment Now 
SanDisk unveiled a 4GB SDHC card and an 8GB Memory Stick Pro Duo card for its SanDisk Ultra II line at the IFA show in Berlin last week.
Nvidia wows gamers with 8800 Ultra 
By Clement James | May 4, 2007 | Comment Now 
New GeForce GPU is 'world's fastest'.
CeBIT: Samsung unveils Q1 Ultra 
By Ian Williams | Mar 26, 2007 | Comment Now 
Samsung has unveiled the successor to its first generation Ultra Mobile PC Q1, the Q1 Ultra, at the CeBIT trade show in Hanover.
Notebook Guardian ULTRA  
By Jayne Parkhouse | Nov 1, 2003 | Comment Now 
The tough Notebook Guardian certainly appears sturdy on initial visual contact - from lock to cable. It is made of steel with a strong looking keyed lock function, although PC ...
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats