Feeds

HWRoundup: Yo! Muthabordz!

Election special

  • alert
  • submit to reddit

BX Boards gets up close and personal with the new Socket A mainboard from Soltek. Featuring (fanfare please) multiplier adjust as well as other bits and bobs for you overclockers as well as the new VIA 696B Southbridge. Click here to find out how this one stands up against the Asus A7Pro and Abit KT7. And to contrast and compare reviewing styles, you can check out Hexus' take on the board here.



All the hardware fashionistas will be sporting and Dually CPUs this season, according to the crazy Aussies at

Insane Hardware

. Findings from their overview of Asus boards include a trend towards integrated network cards and six-channel sound.




Meanwhile, GamePC goes to town on what it calls the "Ultimate Pentium III Platform." I think you can tell from the tone that this will be a good review. Click

here

to find out why this lot were

that

happy. Oh, features include Dual FC-PGA Pentium III, Onboard Ultra160 SCSI, Onboard Dual 10/100 Ethernet, up to 2 GB RDRAM, AGP 4x, 64-bit PCI, ATA/100, Redundant ATX...[fades quietly into distance].




Chill out with AMDZone - they've got a review of the Taisol CEK733092 Socket A


heatsink

here

and also with NFS Xtreme who've had a peek at the Vapochill - and now we're talking very chilly - over

here

. ®



Still hungry for hardware? Check out our archives

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.