In October 2010, Asus and Garmin announced that they would be ending their smartphone partnership as a result of Garmin deciding to exit the product category. These "new members will either deploy compatible Android devices, contribute significant code to the Android Open-Source Project, or support the ecosystem through products and services that will accelerate the availability of Android-based devices." On 9 December 2008, the Open Handset Alliance announced that Asus had become one of 14 new members of the organization. The company paid out all contributions previously made by employees.
ASUS Vivobook 14 (X1407QA); Copilot+ PC
On 9 September 2007, Asus indicated support for Blu-ray, announcing the release of a BD-ROM/DVD writer PC drive, BC-1205PT. On 5 June 2007, Asus announced the launch of the Eee PC netbook computer line at the Computex trade fair. On 8 August 2006, Asus announced a joint venture with Gigabyte Technology. Asus solved Intel's problem and it turned out that Asus's motherboard worked correctly without the need for further modification.
Asus ROG has winolympia casino no deposit bonus been an active advocate for esports, having established some of their very own professional gaming teams. The Q-Connector is marked with bigger text than the front panel connectors on the motherboard, as well as protruding from the motherboard, limiting obstruction from heatsinks and other connectors. Asus motherboards sometimes include a Q-Connector which sits in between the motherboard front panel connectors and the front panel cables. According to Asus, it is the "world's slimmest and lightest USB monitor".
ROG Strix G16 ( G615LW-S5006W
Following the Russian invasion of Ukraine in 2022, Asus initially refused to join a widespread withdrawal of businesses from the Russian market. As a result, it was also deemed that Asus had misled consumers over the security and protection that its routers provided. Before making the vulnerability public, the researcher was told by Asus that the behavior was "not an issue", but the vulnerability was reportedly patched shortly before the breach. It was demonstrated that an unattended installation of Windows Vista could accidentally copy material from a flash drive with a parameter in the "unattend.xml" file on the personal flash drive being used to script the installation.