Solved

HELP with Overclocking

Posted on 2003-11-26
3
210 Views
Last Modified: 2010-04-27
I really need some help with this question: http://www.experts-exchange.com/Hardware/Microchips/Q_20809609.html  Post here also if you help me fix it, you will get these points also
0
Comment
Question by:mad_man22
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
AlbertaBeef earned 250 total points
ID: 9829282
Not to be rude, but I told you how to fix it.
0
 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9829288
Was there more information there you needed, or do you think I was missing something?
0
 
LVL 32

Expert Comment

by:_
ID: 9829669
As far as I can tell, they covered it in the other thread.
You can check these and see what others are doing with this chip:
http://www.overclockers.com/
http://www.hardocp.com/
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
4AM EST time need help, laptop will not boot-up 49 108
Oracle Errors 11 89
Restart "sometimes" fails 11 65
Rear View Camera 27 49
The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question