Solved

upgrade AMD turion 1.6 in laptop

Posted on 2009-04-15
6
271 Views
Last Modified: 2013-12-10
Foxconn S1 , AMD turion 64 x2 Mobile technology TL-52 1.6GHz
Specifications
 (http://www.cpu-world.com/CPUs/K8/AMD-Turion%2064%20X2%20Mobile%20technology%20TL-52%20-%20TMDTL52HAX5CT%20(TMDTL52CTWOF).html )
Im locking to upgrade that processor   I would love 2GHZ x2 is that possible
Is a asus laptop F3Tc
Any idea guys ?
0
Comment
Question by:drogi
  • 4
  • 2
6 Comments
 
LVL 10

Accepted Solution

by:
sublifer earned 350 total points
ID: 24149547
You're looking at an iffy situation there.  If they offered a model of that laptop with the TL-60 or something higher then its a fairly safe bet that your laptop will support it.  If not it would be hard to say wether the board could support it or even boot from it.  You may also want to look into doing a BIOS update on it before you go to upgrade the processor.
0
 
LVL 10

Expert Comment

by:sublifer
ID: 24149589
That TL-52 is on the 90nm process.  The TL-60 was done on both the 90nm and 65nm process.  You would probably be safe with the 90nm version but after BIOS update (you'll want to check with the manufacturer) it may even support the 65nm chips
0
 
LVL 1

Author Comment

by:drogi
ID: 24149622
TL-52 have 31wat and I notice TL-64 have 35wat
is that will be problem ??
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 10

Expert Comment

by:sublifer
ID: 24149678
It will mean your laptop may operate for a shorter time on battery but it will still work fine.  4 watts is not a huge deal.
0
 
LVL 10

Expert Comment

by:sublifer
ID: 24149691
If you get one, be sure to get the 90nm version   TMDTL64HAX5CT
0
 
LVL 1

Author Closing Comment

by:drogi
ID: 31570523
thx
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

System overheating may become a serious problem if not taken care of at the proper time. I am writing this article because I faced a similar problem. Intro All electronic devices produce heat, but computers are a special case - the processors bo…
Lithium-ion batteries area cornerstone of today's portable electronic devices, and even though they are relied upon heavily, their chemistry and origin are not of common knowledge. This article is about a device on which every smartphone, laptop, an…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now