Feeds

Intel P55-based motherboards

The best boards for 'Lynnfield' Core i5s and i7s

Security for virtualized datacentres

Intel DP55KG

Intel DP55KG

The Intel DP55KG ‘Kingsberg’ motherboard marks the latest step in a long, slow journey as Intel attempts to convince the buying public that it can build interesting motherboards. Provided that you expect an Intel motherboard will offer stability and precious little else then the DP55KG manages to offer a certain amount of wow factor.

There are two graphics slots with CrossFireX and SLI support; a decent array of PCI and PCI Express expansion slots; eight laid-down Sata connectors; eight USB 2.0 ports; one Firewire port; and digital connections for the integrated audio.

You don’t get a legacy ATA-133 connector as Intel has deemed that the world has moved to Sata, and you can forget about a PS/2 connector for your mouse. But these are small crosses to bear.

Intel has cleared the headers and connectors away from the usual location in the bottom corner of the motherboard. The On/Off micro button is located at the top of the board next to the main power connector, and the front-panel headers and the connectors for case-mounted USB and Firewire ports live outboard of the four DDR 3 memory slots.

Intel DP55KG

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.