Feeds

Anand takes a gander at Asus' A7V

A smorgasbord of tasty hardware morsels

  • alert
  • submit to reddit

The Intel Developers Forum is visited by one of the team from Tom's Hardware. Highlights include a first look at a 2GHz processor, the Itanium architecture and many other nuggets. Click here for more.



PC Stats present a review of the Kenwood (yes, I thought "Kettle" too) 72X TrueX CD ROM. They put it through all the benchmarks they could think of and decided that they like it. Check out their full

review

for more detail.




Planet Hardware's Deus Ex

tweak guide

is up for your infotainment. It has been online for a couple of days, but we thought it worth pointing out anyway.




OC Workbench is just giving stuff away. Fancy getting hold of Microsoft's Windows ME? Go

here

to enter




It appears to be something of a trend. More palm-sized-computer reviews than you can shake a stick at, in fact as IT Reviews post their answer to yesterday's Byte.com round up. Click

here

for more comparisons of these pint sized computational fellows.




Anand has got a review of the ASUS A7V Socket A KT133 ATX posted, we think, but we've been having trouble accessing his site. You can try and access it

here

we hope it works better for you. ®



Hardware for after hours fun (?) here.

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.