Feeds

HWRoundup Ch-ch-ch-Chaintech's i815e ATX mobo

Clock modifications for K6-2+ and K6-III+

  • alert
  • submit to reddit

Socket A has just posted a review of the Iwill KV200. With onboard 3D audio chipset that supports A3D and Direct sound 3D as well as options for RAID and SPDIF, how can it fail to please? Go here to find out more.



Mr Sharky takes a peek at the Palm Vx over at his extreme hangout today. A snip at $399, this is definitely more tree friendly than a filofax or similar paper based organiser, and much groovier. But what else can be said about the latest instalment in the PDA saga? Click

here

to find out.




AMD Zone has the following news to report: "We have posted a new utility (TSC.exe) that allows for clock multiplier modification for the K6-2+ and K6-III+. It uses PowerNow features to allow multiplier changes." If that sounds useful to you, then don't hang about,

go get it

.




Anand and his friends have reviewed the Chaintech CT-6OJV2 Socket-370 i815E ATX board. To find out what it did to warrant a rather sad looking 5.5/10 rating, click

here

.



Any more that that, and you'll have to nip over the archives.

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.