Feeds

HW Roundup The GeForce MX's impact on budget machines

And more of the Asus A7V

  • alert
  • submit to reddit

Anandtech has posted his monthly guide to value systems. Always worth checking out if you are thinking of putting a new system together. This one shows the
impact of the GeForce MX on the affordable end of computing. Point and click.



Sharky's page goes in search of the perfect supporting platform fot the T-Bird Athlon. Today they take a look at Gigabyte's 7ZX board, the company's fully developed version of the 7ZM micro ATX board. Click

here

for the full review.




And it wouldn't be a hardware roundup this week if we didn't mention the Asus A7V board. Insane Hardware has posted a review to complete its coverage of the board.


Go

here

for the rest of the story.




If, like us you yearn for a break from all the reviews from time to time, join us as we tip our hat to Kyle over at HardOCP for posting

this link

to an array of shiny case mods. He was particularly enamoured of the mirrored one.




Finally for today, Planet Hardware has put up its weekly CPU price roundup. Did you know you could get a 1GHz processor for less than $500? Neither did we. Click on through for

more

. ®



If you need an extra helping of hardware roundups this link will take you where you want to go.

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.