Skip to main content

标 题: TS140不错

发信人: GGYY (唧唧歪歪), 信区: Hardware
标  题: TS140不错
发信站: BBS 未名空间站 (Sat Oct  4 04:01:35 2014, 美东)

今天到货了。TS140又小,又轻。体积,重量,跟TS440肯定不是一个量级的。

装上SSD就跑起来了。SSD之前在TS440上装的Windows 8.1 Pro。TS440跟TS140基本兼容
。虽然CPU从E3变到了i3,windows 8没有Complain。做HTPC的话。这台不错。就是没有
很NB的声卡。不过我现在没精力折腾音箱。

自带4G ECC,PC-12000E。翻箱倒柜,找出4个1G的ECC,PC-8500E。插了两个进去,似
乎能用。但这样搞是不是太业余了?

很安静。1-2米以外基本听不到啥声音了。硬盘架不错,不需要工具。可惜只有两个。
电源比较怪异。电源插主板。主板上再引出两条线做硬盘电源。倒也算是modular了。

图便宜买的i3的。现在有点小后悔。是不是应该买E3的。做HTPC的话。i3+4G绰绰有余
了。E3的那台是E3-1225,没有HT,也有点鸡肋。E3-1245的似乎没有deal呀。错过了E3
-1245的TS440,现在还是有点耿耿于怀呀。不过我收到的那台E3-1225的TS440确实很吵
,不知道为什么。是不是机箱哪里没弄好,共振了?

如果不搞server。TS140还是不错了。跟TS440比,最主要区别是硬盘个数少,没有RAID
card。电源是280W的。打游戏没太多升级空间。

如果E3版也有sale要不要再买一个,用来干活(虽然目前的问题是没活可干)。毕竟E3
+主板就得300块?还是自己以后等E3的deal,买个升级?自己乱换CPU会不会影响机箱
降噪系统?
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...