Feeds

Dr Tom fiddles with Intel 815 mobo quintet

And other Hardware scoops

  • alert
  • submit to reddit

Doctor Tom has been busy, investigating five mobos based on the Intel 815 chipset. The successors to the 440BX, are the Solano and Solano 2 worthy of the task? Go have a look!

More "scoopage" from the loonies down under. The guys at Insane Hardware have got hold of Abit's KT7 Mainboard, for AMD Socket A CPUs. Overclocking without the "frilly bits"? Check it out for yourselves.

At Ace's Hardware, Johan reports on the ASUS A7V board. He has posted the company's own benchmarks, so it is a preview rather than a review. Having said that, he is very enthusiastic about the features, particularly with respect to overclocking. Point and click here for more.

Sharky has a fairly dispassionate look at the Jornada 820, a handheld machine from HP. Although with 16MB of RAM and a rather cute 190MHz CPU it would be able to handle the basics; solitaire, word processing etceteras, ultimately it is remarkable for its size. Go here to get all the rest of the details.

And to finish off today's outing, those thoughtful people at Tweaktown have sent news that there is a problem with the FIC AZ11 Motherboard. It would appear that the BIOS is NOT Compatible with the AMD Thunderbird 750/800 CPUs. They says: "We have been advised by FIC that a bios fix will be available for download soon..."

Have a good weekend.®

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.