Feeds

Tom in Mobo Madness

Colour piece

  • alert
  • submit to reddit

HWRoundup So what do you do when you're building and flogging mobos along with the world+dog. Change the colour of the board, throw in some gimmicks. Get yourself noticed. And if you've got enough bells and whistles, get yourself onto Tom's Hardware Guide, which surveys the landscape of pumped up mobos using the Intel 815 chipset.



There's a very pleasing editorial strand in HardOCP - pictures of stressed out and murdered computer. Today the Texan rangers maintain this noble tradition with pics of Maxed out graphics cards here.



Wanna buy a graphics board? Check out the Inno3D MX card review at ExHardware If you're looking fore something more high-end graphics card then check out the Visiontek Geforce3 Card review at nV News.

If you are more in the mood for a Kyro 2 or you would like to know about the performance? Who would win the $400 card or the $120 card... Well check out Ace's Hardware for a shootout between the two here.



OcWorkbench has a look at the KD266 from IWill, shame he hasn’t done long term tests on the board (short testing). But it gives you a little indication in to performance over here



The Inquirer notes that next hi-breed in the DDR setup PC2700 is hitting people now in samples, will this stuff rock?


Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.