Solved

what's feature for SUN system via pentium III?

Posted on 2001-07-30
3
202 Views
Last Modified: 2010-04-27
what's feature for SUN system via pentium III?
0
Comment
Question by:javadp
  • 2
3 Comments
 
LVL 11

Expert Comment

by:RoadWarrior
ID: 6336795
I think we will be having a problem understanding your question correctly unless you expand on it a little.

Do you mean?
What are the features of Sun computer systems based on Pentium III CPUs?
0
 
LVL 11

Accepted Solution

by:
RoadWarrior earned 50 total points
ID: 6336816
Heh, wasn't quite thinking when I wrote that, maybe you mean,
What are the features of Sun computer systems compared to Pentium III based computer systems?

Well, that would be a bit like comparing a deleivery truck to a family car, so some idea of the range of uses you want to compare features for would be helpful.

I could say, A pentium III system beats a Sun System hands down for gaming, and be right in the sense that virtually no-one releases games for Sun, so gamers would be better off with a P III. And I could say, Sun Systems are far superior to P III systems for 3D graphics, and be correct, yet leave the impression that this would mean they are better for 3D gaming, when there are no games around for them.  So if you would like to expand a little on the area of use you would like to compare these machines in, then I think we'll be able to help much better.

regards,

Road Warrior
0
 

Expert Comment

by:ComTech
ID: 6703818
Abandoned question accepted by

ComTech
Community Support
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question