谢娜
-
Network Attached Storage: What It is and Why You May Want It
If you have multiple computers, chances are you've wanted to get a file from one system to another a...
-
The Evolution of Ransomware
These days, not a month goes by that we hear about a new major ransomware attack. Initially, the ran...
-
Quality Assured: What It's Really Like To Test Games For A Living
There's an old commercial for Westwood College that's become something of a running joke in the vide...
-
DOOM Eternal Tested on Low
Earlier this week we benchmarked Doom Eternal extensively, but only using modern GPUs. Seeing that t...
-
The Ideal Smartphone for 2017
2016 was another year where, for the most part, it was hard to pick a bad smartphone. Sure, the Gala...
-
Why Do Image Files Need Different Formats?
Most of your digital photos are stored in the JPEG format (a.k.a. JPG), but when you download an ima...
-
Ever Wonder How the Shazam Algorithm Works?
Your phone's ability to identify any song it listens to is pure technological magic. In this article...
-
Explainer: Number Representations in Computer Hardware
As Shakespeare would have it, "that which we call a rose by any other name would smell just as sweet...
-
The Homebrew Litecoin Mining Project
It's hard not to be intrigued by Bitcoin, the peer-to-peer digital currency devised by the mysteriou...
-
Parental Controls: How to Lock Down Your Kids' iOS Devices
I'm the father of a very curious 9-year-old daughter. As such, it's a headache trying to make sure s...
-
How CPUs are Designed, Part 3: Building the Chip
This is the third installment in our CPU design series. In Part 1, we covered computer architecture...