Feeds

Acer Predator packs powerful specs, lacks skull cleaning capability

Will eat the competition?

Choosing a cloud hosting partner with confidence

Acer wants to take a big bite out of the gaming PC business with its new system, Predator, part of its Aspire line.

Actually, it looks like something out of a sci-fi movie too. But the spec's right down to Earth, with a choice of Intel Core 2 Extreme and Core 2 Quad processors, Nvidia's nForce 780i chipset, up to 8GB of 1066MHz DDR 2 memory and three Nvidia GeForce 9800 GTX graphics cards in Tri-SLI mode.

Acer Aspire Predator

Acer's Predator: Alienware beware?

Had enough of gaming? Then Acer said it'll offer the beast with an optional TV tuner card. And the machine's twin optical drive bays can be kitted out with a Blu-ray Disc player too.

Storage should be no problem: the Predator has four 3.5in drive slots, that can be configured in a variety of RAID hot-swappable set-ups.

Acer Aspire Predator

Flip-up front panel

The entire front panel swings up to reveal said drive bays and the machine's front-facing multi-format memory card reader, 3.5mm audio sockets, and quartet of USB 2.0 ports. There are four more USB ports round the back, along with a six-pin Firewire connector, two Gigabit Ethernet ports, six more audio jacks and a button that allows you to zap the Bios settings should the system's overclocking utility push the processor too far.

Speaking of audio, the Predator incorporates 7.1-channel HD audio with EAX 4.0 support. Want EAX 5.0? Add the optional Creative SoundBlaster X-Fi card.

The whole shebang's driven by a 1kW power supply and prevented from melting by a liquid cooling system, Acer said.

What it didn't reveal was how much this metal monster will cost, or precisely when it'll go on sale.

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.