Feeds

Cyrix 370 socket support tips up

And yes, the pix are on a Japanese site

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

One swallow does not make a Spring here in the UK, nor does one picture of a daughterboard make a Cyrix 370 pin CPU. We said this would happen at the beginning of this year. (Stories: Cyrix decides to socket and see and Cyrix to go 370 pin in April) But over at Akiba, we do have a very nice and clear picture of a 370-pin socket on a daughterboard with wording on it which indicates support for both Intel and Cyrix chips. Other pictures at Akiba show that this daughter card, Intel PPGA370 Celeron to Slot One adaptors, show that it can use the Intel/Cyrix 370 pin chips on an existing Slot One motherboard. And a dual 370 configuration? Dunno about that guv. The Taiwanese upgrade daughterboard, marked 370 Socket Inside, will support processors from both firms. Intel and NatSemi, which now owns Cyrix, have cross licensing agreements on this sort of technology. We reported earlier this year that Cyrix would give 370-pin socket support. Other clone x.86 makers, including AMD, seem to be backing away from the idea, possibly because they're moving to Slot technology instead Try our search engine on the number 370 to see our numerous 370-socket stories. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.