Feeds

Hardware site reports dualie Tyan issues

Van the Man

  • alert
  • submit to reddit

HWRoundup It's been a while since our last recce of the hardware sites. A long while. There hasn't exactly been a huge clamour for its return, but we thought we'd give it another short run, anyhow.

And so to Hardware Analysis and its thread on the stability or lack of for the Dual Tyan Thunder K7. There's a list of solutions for various issues reported by amateur system builders, supplied by Tyan and published also on the estimable Ace's Hardware.



It's the summer Doldrums and the Good Dr. Tom is bemoaning the lack of excitement in Hardware Land. (

Slow Summer Season, Not Even Enough To Rant About?

). Accordingly, he's opening the floor to Tom's Hardware readers.


Email THG

your ideas/suggestions/inside leg measurement etc. - the best ones get published.




Van Smith, the pugnacious (so pugnacious, he could pick an argument with himself) moralist of the chip industry, hammer of Rambus and Intel former columnist at THG, and well-known fan of The Register has set up his own Web site, called, appropriately enough

Van's Hardware

.



Earlier this year, Van quit his most recent job at InQuest, the semiconductor analyst firm, expressing his disgust with the chip industry and the ethical standards of many hardware sites (no names mentioned) in an article published on AMDZone (anyone got a link - I'm unable to retrieve it?). ®

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.