Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
After Hours

Cracking open the Alienware Area-51 7500

By Mark W. Kaelin May 7, 2007, 4:52 AM PDT

Image
1
of 9

Cracking open the Alienware Area-51 7500

By Mark W. Kaelin

By Mark W. Kaelin

ntThe good folks at Alienware recently sent TechRepublic one of their Area-51 7500 gaming desktops for review. The configuration of this system includes the overclocked Intel Core 2 Extreme QX6700 quad CPU and the 768MB NVIDIA GeForce 8800 Ultra video card. Both the CPU and the GPU are liquid cooled — believe us when we say, this is not your office PC. We take a look inside this super-performing premium gaming system and drool over the components.
nt
ntThis system was supposed to be overclocked, that is what I asked for, but I’m not certain that it is. I’ll investigate.

ntnn

Cracking open the Alienware Area-51 7500

Unpacking

Unpacking

While the Alienware laptop PC we reviewed earlier this year shipped in an ordinary FedEx box, the desktop system came in a box with the familiar company logo.

Cracking open the Alienware Area-51 7500

Unpacking

Unpacking

Even the box inside the box has the logo.

Cracking open the Alienware Area-51 7500

Unpacking

Unpacking

The peripherals box contains the T-shirt, owner’s manual, mouse, keyboard, and various video connection cables.

Cracking open the Alienware Area-51 7500

Unpacking

Unpacking

One thing I noticed right away is that machine was wrapped in soft cloth instead of Styrofoam paper like so many other manufacturers use.

Cracking open the Alienware Area-51 7500

Angles

Angles

There are other colors available, but I prefer the black.

Cracking open the Alienware Area-51 7500

Cracking

Cracking

Two DVI outputs as well as S-video.

Cracking open the Alienware Area-51 7500

Start it up

Start it up

The LEDs are even functional — you can see where to load your Half-Life 2 disk even if it is otherwise pitch black.

Cracking open the Alienware Area-51 7500

With the LEDs, connecting your headphones to play a midnight match of Call of Duty without disturbing your spouse is a trivial task.

  • After Hours
  • Account Information

    Share with Your Friends

    Cracking open the Alienware Area-51 7500

    Your email has been sent

Share: Cracking open the Alienware Area-51 7500
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, gadgets, finance, accounting, and tech-life for more than 25 years. Most recently, he has been a regular contributor to BreakingModern.com, aNewDomain.net,
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    Download Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice