Feeds

Festive CPU socket protection

HWRoundup Lots of lab fun

  • alert
  • submit to reddit

Right, it is the last working day for The Register's resident hardware herder before Christmas.

So, to kick off we have an award ceremony over at Sharky's Games where the lucky recipients of a Sharky's Extreme Game Awards are listed. This year ten games got one, so check it out.



The guys over at Tweaktown are feeling equally festive. They've got their mitts on a bunch of kit that they are trying to give away - to you! Check that out

here

.




Having ironed out the problems they were having this morning, the Insane Hardware crew are back with their look at the VP6 from Abit. They've tested the board with 1GB of Ram but they also have a "CPU Socket Protection" guide, so they tell us, that means you won't kill the VP6 before you even get going.They obviously like it, cos it got a stamp of approval. Check it out

here


XBit Labs has put together a review of the graphics card offerings from SUMA, based on Nvidia's GeForec2 GTS. They liked em, and if you wanna have a look at how they made their minds up, go

here

.




Overclockers action at the good

Dr Tom's

today. The test results on the new Asetek "super cooling solution", Vapochill. Worth a look to compare manufacturers claims with in-the-lab findings. ®



A very Happy Christmas to everyone out there, and a many splendoured New Year. To keep you in hardware reviews over the chrimbo period, check the archives. They are stuffed fuller than Santa's sack.

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.