Solved

What is a DPS slot?

Posted on 2004-08-09
4
1,824 Views
Last Modified: 2012-06-27
Really, that's all I need to know.

It's a large-ish slot about the size of a PCI slot.

What are they used for?

I haven't heard of them before, and i'm looking at two mobos, one of which has a DPS slot and no other features added above the other, but is $60 more.  Is this mysterious DPS slot going to be up-and-coming new technology that i'll be smacking myself for not dishing out $60 on?

250 points if you can explain it to me, and tell me what they're most frequently used for.  I'll make it 300 if you find me a website with such an explanation and pictures.  I like pictures.
0
Comment
Question by:EvilAardvark
  • 2
4 Comments
 
LVL 10

Assisted Solution

by:dis1931
dis1931 earned 150 total points
ID: 11756414
Here is an excert from: http://www.sharkyextreme.com/hardware/motherboards/article.php/3370721

Dual Power System K8 (DPS K8), which is an external, slot-mounted module that helps provides a more solid and durable power supply. The Gigabyte K8NNXP works fine with or without the DPS K8 module installed, but the extra security is a nice feature to have. The DPS K8 mounts above the CPU socket, and features a fan cooler and LED colored effects.

It is apparently some kind of add-on that will control power in some way....there is not much info out there at least not anywhere I searched.
0
 
LVL 69

Accepted Solution

by:
Callandor earned 150 total points
ID: 11756458
It's a power regulation card that some enthusiasts like, and others don't.
http://www.gamepc.com/labs/view_content.asp?id=gbsis655&page=4
0
 
LVL 10

Expert Comment

by:dis1931
ID: 11756477
0
 
LVL 2

Author Comment

by:EvilAardvark
ID: 11758900
I like both explanations, and i found the answer myself too, so i'll just split points.  150 to each of you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Help with XP 21 37
USB Port Assignments 7 56
PC Build 11 134
How to put the PAC file information on the samsung phone for internet to work.. 2 31
Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
No matter the version of Windows you are using, you may have some problems with Windows Search running too slow or possibly not running at all. Before jumping into how you can solve this issue, just know there are many other viable alternative deskt…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now