Feeds
55%
EVGA Nforce 680i LT SLI

EVGA 680i LT SLI nForce-based motherboard

Cut-down 680i - or shoved up 650i?

3 Big data security analytics techniques

Review For some time, Nvidia's 600 family of chipsets has had a gaping chasm between the nForce 650i SLI, which typically sells for £90, and the nForce 680i SLI, which starts at £165. Enter the 680i LT SLI chipset, a budget version of the 680i SLI.

EVGA Nforce 680i LT SLI
EVGA's nForce 680i LT SLI board from the front

As the name suggests, the nForce 650i SLI supports dual Nvidia graphics cards for gaming, but SLI is just about the only significant feature and even then it's the half-hearted sort with 16 PCI Express lanes assigned to the two slots.

The nForce 680i SLI has a whole host of extra features, including SLI with 16 PCIe lanes for each graphics card, plus a third graphics slot with eight PCIe lanes, which will be handy come the day games can use a third graphics card to handle physics.

The 680i increases the number of available SATA hard drive links from four ports to six, and adds support for a 1333MHz frontside bus. The number of USB ports on the I/O panel climbs from four to six and there's a second Gigabit Ethernet connection. On the board you'll likely find power and reset micro buttons along with an LED readout to display POST codes. The final addition is support for SLI memory, which can run up to 1200MHz. Not only is this maximum supported memory speed incredibly fast, but the memory can be automatically overclocked by Nvidia's nTune utility.

That's a long list of features, but it comes at a very high price, so it didn't come as a huge surprise when Nvidia launched the nForce 680i LT SLI as a lower cost alternative.

Unfortunately, we made a couple of slips of the keyboard in our news coverage so it's time to put the record straight with a comparative review using two EVGA motherboards. One is the nForce 680i SLI with revision A2 of the chipset and the other is the nForce 680i LT SLI. These rather unimaginative chipset-labels-as-EVGA-model-names are quite appropriate as these motherboards seem to follow the Nvidia reference design very closely.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.