Feeds

More KT133A ass kickin'

Anything new at the party?

  • alert
  • submit to reddit

HWRoundup The explosion of KT133A motherboard reviews has not stopped over the last few days. Anand and friends took a look at another contribution yesterday, the K7T Turbo Socket-A KT133A ATX from MSI. Can they bring something new to the party? As preproduction samples go, this one must have been fairly good scoring 8.5/10, but the tweakability wasn't so hot. Find out why here



The question of whether to buy a P4 system or not seems to be largely a financial one. Do you want to spend $1500, at all. And then if you do, do you want to spend it with Intel? The good doctor himself asks these questions over at

TomsHardware

, and has a go at answering them.




Andy has posted some P4 1.6GHz overclocking results on

BXBoards

. Its on the front page, so check it out fast!




HardOCP is always good for these: they've posted

this

picture of what the very bored or very determined will do when networking just gets too painful.




OCWorkbench

takes a look at the ASUS A7V133 board (see, I told you the explosion was ongoing). They spake thusly: "It is a board which is definitely a good choice for someone who needs a KT133A board for the support of newer Thunderbirds." Measured, perhaps, but praise nonetheless. ®



For your hardware fix, score here.

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.