Feeds

Hardware hacker's surgery heals slow Acer Aspire One SSD

Nip here, tuck there

Internet Security Threat Report 2014

Acer's Aspire One is coming under fire from early buyers for the sluggishness of its solid-state drive, so one intrepid hardware hacker has figured out how to replace it. It's not an easy job.

A poster over at JKKMobile reports that the One's 8GB SSD is tucker under the motherboard - reaching it involves completely disassembling the Small, Cheap Computer and hacking off bits of the plastic casing.

Hacking the Acer Aspire

First identify the original SSD...
Photo courtesy JKKMobile

Further cutting's required when it comes to the CompactFlash adaptor circuit board the fellow's used in place of the storage supplied by Acer.

Hacking the Acer Aspire

Now trim your adaptor card thusly
Photo courtesy JKKMobile

Make the trimmings and the adaptor board fits neatly next to the motherboard, connecting into the latter's zero insertion force (ZIF) slot.

The hacker used a Transcend 300x 8GB CF card, but he doesn't report how much faster it makes the One.

There are more pictures over at JKKMobile.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Chipmaker FTDI bricking counterfeit kit
USB-serial imitators whacked by driver update
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
DOUBLE BONK: Testy fanbois catch Apple Pay picking pockets
Users wail as tapcash transactions are duplicated
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.