王啸坤
-
Chrome Tab Management Tips and Extensions
Tabs revolutionized web browsers many years ago and today they're as essential when getting things d...
-
How CPUs are Designed and Built, Part 2: CPU Design Process
Now that we know how processors work at a high level, it's time to dig inside to understand how the...
-
Anatomy of a Monitor
You're looking at one right now. It might be sitting on a desk, stuck on a wall, or cradled in your...
-
The State of Mining: Guide to Ethereum
Although they are often shrouded in mystery and technical details, you've probably heard of cryptocu...
-
Hidden Siri Commands and Unusual Responses
Digital assistants can be useful for performing a variety of tasks hands free, especially while in t...
-
The People Who Only Play One Video Game
Video games are changing. Increasingly, we're seeing a subset of players focus their attention on on...
-
Old School PC Gaming: Classic Games that Have Aged Well
There are some excellent games – some old enough to buy their own alcohol – that are as good today a...
-
How CPUs are Designed, Part 3: Building the Chip
This is the third installment in our CPU design series. In Part 1, we covered computer architecture...
-
Ray Tracing & DLSS with the GeForce RTX 3080
With Nvidia's GeForce RTX 3080 out the door, it's time we take a deep dive into ray tracing and DLSS...
-
The Portable Workstation: Dell XPS 13 + 32 UltraSharp 4K Monitor
The Internet has afforded me the ability to work from home for more than 15 years. What's more, I ca...
-
10 Electronic Devices That Are Nearly Impossible to Repair
It's becoming tradition that with every new high-profile gadget release, we showcase whatever findin...
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...