Feeds

Tyan Trinity mobo not for overclocking

Soltek SL75KV is short of a PCI slot

  • alert
  • submit to reddit

SocketA.com has got its mitts on the Tyan Trinity KT Socket A Athlon/Duron mobo. The verdict is 'solid performer' which 'will interest buyers who do not care about overclocking'. Read more about this fat free mobo here.



GadgetSquad has put up a review of the Ericsson T28 World phone. Apparently it has already benchtested on the TV show 'Survivor'. It weighs 2.9 ounces including battery. The article can be found

here

. The reviewer likes it but would prefer 'a larger screen, longer battery life, and removing the stubby antenna to make the phone even smaller.'




Over at Jsi Hardware they have posted a review of the Soltek SL75KV socket A based motherboard. The

review

talks serious slots. There are 5PCI slots but apparently six would be better, and there's no AMR slot but who uses that anyway?




Has your mouth ever watered at the site of a case? OCWorkbench has been drooling at the

Chilli Professional

1/4" case which has 'elegant and sophisticated looks.' Nice looking but pricey is the verdict.




If you've got an AMD Athlon T'bird and you haven't overclocked it yet then shame on you. But if you want to do it you can check out Tweak 3D's

guide

to find out how. ®



For a further fix of hot hardware action visit our Hardware Round-up.

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.