Feeds

AMD, Via, Intel chipsets – FIC's future view

FIC's Overclocking BIOS an overclocker's boon

  • alert
  • submit to reddit

High performance access to file storage

A presentation of First International Corporation (FIC) of its motherboard offerings during the year 2000 has cast light on future technology arriving from Intel, Via and AMD. According to the document we have seen, AMD has just started sampling an Irongate 4 chipset, which will start to be produced in volume in June of this year. In the second quarter of this year, Via will go into production of KM133 chipset, and start providing samples of its Apollo FX266M chipset, with Solano production, which supports PC133, IGT and AGP4x, starting in April. Via is also releasing a Pro Media 2 product late in this quarter. In the second half of the year, Camino II (the 820e) will go into production, supporting ATA100 and 2, 4 and 6 channel audio. The Via FX266H production will start in the same time period, and so too will Solano II, which again is ATA100, and supports 2,4, and 6 channel audio. In the last quarter of this year, the Via PM266H will start to sample, and will be in production in the first quarter of next year. FIC will roll out a large number of motherboards during the year, including the FC15, the AM11, the AD11, the AM31, the FX11, the FG31, the FS33, the FR31 and the FT31. The SD11 will support Irongate 4. Many of these mobos willl support FIC's Novus technology, which sends you useful audio messages during setup including: "Caution! No CPU detected. Please check your PC" and "Caution! No VGA detected. Please check your PC". FIC's own Overclock Partner is a feature which allows processors to be overclocked from the BIOS, and is combined with a single jumper and a dipswitch which allows the system to return to default speed if any problems occur at power on. According to FIC, the system hardware is completely protected from any changes that are made at BIOS level. ® See also Intel's chipset roadmaps more like roadworks Intel's Y2K server, desktop, mobile roadmap

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.