Feeds

AMD admits K6-III called K6-III

Now Web Stalinists airbrush out the URL...

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Updated AMD has admitted its K6-3 is called the K6-III. Its own Web site had the information up but now the URL is returning a server error! (See AMD to call K6-3 the 'AMD K6-III'). If you went to AMD's FAQs about the K6-III you will have seen that AMD had finally admitted the fact. Many of you will have seen this page but see it no longer... Only a died-in-the-wool cynic would suggest that AMD has used Roman numerals because Intel's Pentium III has its "preview day" later on, today. More red faces at AMD, no doubt. The great advantage of making mistakes like this is that you can wipe them out at a stroke of the HTML writer's QWERTYUIOP. We invite emails from eye witnesses who saw the offending AMD URL... Not that it matters much anyway. A search on K6-III produced this URL about Digital Anvil, which AMD itself released on 11 February. Therein, the K6-3 is called the K6-III... You read it here -- first... ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.