Feeds

Click here for Amazing Computer Stories

Also ATI v Nvidia

  • alert
  • submit to reddit

HWRoundup Tech Extreme has posted another batch of "Amazing Computer Stories" here for us to read, laugh at and feel superior at the end of. And why not. Check it out to cure the "It's still so long till the weekend" blues.



Anandtech takes another look at the ATI vs Nvidia situation, this time from the drivers' perspective. Timely, given the launch of the Radeon VE yesterday. Check it out

here

.




Rolotech goes into one a little bit about dual monitor displays in the name of previewing the new Radeon VE from ATI Technologies. Well, why on earth not? You can read it for yourselves

here


XBitLabs did a roundup of hard drives, (which you can find

here

) and in response to a barrage of eager questions, have posted

this

follow up.




A mouse mat made of glass seems to be asking for trouble. Possibly groovy, but after a couple of beers I foresee a terrible shattering would ring through the house leaving me with lots of little mouse mats. Shudder. But it is entirely possible that you are a: tee total or b: just more co-ordinated that me, you might like it. So, check out

this

quick review of the Icemat over at Tweaktown. ®



Still hungry for hardware? Check out our archives

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.