Felix Miata said the following on 02/04/2013 10:38 PM:
SiS is a weakly supported gfxchip due to it uncommon appearance generally, and particularly among Linux users when the time is most important, during distro development testing. Only a month ago right here there was a very long thread where SiS seemed to be the root of the user's problem. You might want to give it a read and see if there's any help to be found in it: http://lists.opensuse.org/opensuse/2013-01/msg00073.html
Upon investigation of this I found differences in the iterations and capabilities of the SIS video chips installed on a number of motherboard that were notionally the same in that they were the same revision and had the same revision BIOS. I don't know about "uncommon" - it seems to be in a lot of the low-cost hardware that many organization buy in bulk for the basic simple desktop for the <strike>drones</strike> employees. At least that is my observation. Just enough to run XP and Office - its not as if these <strike>drones</strike> employees are meant to be net-warriors, or even _have_ Internet access! But I've got them to work on a one-by-one basis. Some perform better than others. That thread to which Felix refers ... one chip would do no better than 1024x768; another will do 1360x768 but not 1280x1024. Go figure. My choice, when I have it, is to use a proper, supported chip. But sometimes at work you're just another <strike>drone</strike> employee and you use what you're given. I imagine academia is like that as well. The bottom line: Avoid sis, go with Intel, ATI/AMD or Nvidia. Individual cards may be bleeding edge or certain features may not be available but that are not the PITA that sis chips are. So why do some vendors supply mobos with sis chips? Cos they're CHEAP! And that's why some companies buy them by the pallet-load. -- Security engineering is about building systems to remain dependable in the face of malice, error, or mischance. As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing systems as their environment evolves. Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security through hardware tamper-resistance and formal methods to a knowledge of economics, applied psychology, organizations and the law. System engineering skills, from business process analysis through software engineering to evaluation and testing, are also important; but they are not sufficient, as they deal only with error and mischance rather than malice. -- Ross Anderson "Security Engineering", 2nd Edition, Introduction http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c01.pdf -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org