邓志浩
-
How Screwed is Intel without Hyper
As we've come to learn recently, there are four new hardware vulnerabilities that affect Intel proce...
-
A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes
As awareness of global surveillance grows, more people are looking for information about the Five Ey...
-
Google Drive Alternatives: Improving Privacy and Security
In an age of eroding online privacy and increasing corporate surveillance, many are looking for a go...
-
The Future of Tech: The Desktop PC
If you're over a certain age, you'll probably know that people have been foretelling the death of th...
-
Solder vs. Paste on the Core i9
Just recently we reviewed Intel's latest Core i9-9900K and Core i7-9700K processors. In summary, the...
-
Rundown of Must
Check out our latest list: The Best Portable Apps for Your Software ToolboxPortable apps are lightwe...
-
Patched Laptops: Testing Meltdown & Spectre Patches on Ultraportable
You've probably seen our coverage and tests over the past few weeks on the Meltdown and Spectre vuln...
-
I have a confession to make: I've spent several hundred dollars on Steam Controllers
No, I'm not crazy, and I'm not a collector of failed tech, either. Over the past five years, the Ste...
-
Rundown of Must
Check out our latest list: The Best Portable Apps for Your Software ToolboxPortable apps are lightwe...
-
AMD Smart Access Memory Tested, Benchmarked
Today we're taking a detailed look at how AMD's Smart Access Memory (SAM) technology influences perf...
-
How JPEG Image Compression Works
In today's world of AI and machine intelligence, it sometimes skips the mind that the primary end-us...
-
Apple M1: Why It Matters
Ever since Apple launched its M1 processor and showed it running fast and cool on new MacBooks, the...