Solved

Looking for documentation...

Posted on 2001-08-09
3
194 Views
Last Modified: 2010-04-27
Hi guys... if you can help me these are easy points...

I'm looking for information on "Mother Board evolution and history". Weird Ah? It's for a teacher, and I need to give a class about it. I'm so amazed I haven't found anything about it.

A good link it's enough.... thanks.
0
Comment
Question by:nfernand
3 Comments
 
LVL 2

Accepted Solution

by:
genguy earned 100 total points
ID: 6371127
General info kind of site that goes back to AT designs:
http://www.pcguide.com/ref/mbsys/index.htm
Brief evolution:
http://www.ece.unh.edu/courses/ee707_m4_00/mother.htm
Another:
http://arstechnica.com/guide/mobo/mobo-1.html

If you want to go to the begining:
In 3000 B.C. the the abacus was introduced.....
http://www.hofstra.edu/Academics/HCLAS/CSC/ComputingHistory/CompHist_timeline.cfm
0
 
LVL 7

Expert Comment

by:jlauster
ID: 6371147
0
 
LVL 2

Author Comment

by:nfernand
ID: 6376625
Thank you guys... you ara the angels I've been waiting for :-)

Booth sets of links are excelent but I give the points to the first one.

Thanks again.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question