Solved

Upgrade

Posted on 1998-05-04
4
157 Views
Last Modified: 2010-04-12
I have a expert motherboard model 8049 Ver. 1.1 A, with a Ciryx 486 DX2-66Mhz processor. I`d like to know the jumpers position to connect a processor Intel 486 DX4-100Mhz and a AMD 586-133Mhz(P75).I[d like to know the jumpers clock and voltagem position.
0
Comment
Question by:garbos
4 Comments
 
LVL 3

Expert Comment

by:mitrakis
Comment Utility
garbos,

this is your second post of this question...
please delete one of them and save your points.

(Unfortunately, I don't know anything about this board...perhaps other experts can support you on this)

Regards
-Stavi-
0
 
LVL 4

Expert Comment

by:Shep
Comment Utility
0
 
LVL 6

Expert Comment

by:Stuart_Johnson
Comment Utility
Most 486 motherboards will support a 486DX4 CPU.  And there should only be a few jumpers which need changing for you to upgrade the Cyrix chip to the Intel as they both operate at the same speed (33Mhz).  You only need to set the voltage and type jumpers.

The 586 however required a BIOS which supported that chip.  Although they are glorified 486s, they will not work in every 486 motherboard.

I had a quick look through the URL sent by Shep and couldnt find any refrence to your motherboard in the list (mind you, I did look quickly).

My suggestion would be to email the guys at Expert and see if they can help.

Stu.
0
 
LVL 2

Accepted Solution

by:
graber earned 20 total points
Comment Utility
This may not be possible processors of the 486-66 arena where 5v chips.  Amdal upgraded it's processors 486-80 and up to be 3v chips.  I do not know whether or not your mother board has the copper clad for the 3v conversion, but unless you have experience with a soldering iron.  It is a good bet that if it currently has a Cyrix 486 DX2-66 it doesn't. So the jumper setting won't do you any good without the voltage converter first.  Several of my motherboard are now slatted for dedicated processing (robots and the like) because of this.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now