吴倩莲
-
A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes
As awareness of global surveillance grows, more people are looking for information about the Five Ey...
-
What is a Checksum, and What Can You Do With It?
You're about to click on a download button and notice a weird looking code next to it. It doesn't se...
-
The Best Gaming Concept Art of 2016
Here, after much deliberation, is a collection of the best concept art from video games released in...
-
The 10 Most Anticipated PC Games of 2016
It's impossible to deny that 2015 was an amazing year for the PC. Not only did we get three of the b...
-
What Ever Happened to Adobe Flash?
For many years, Adobe Flash was synonymous with animation on the web, browser games, and interactive...
-
How JPEG Image Compression Works
In today's world of AI and machine intelligence, it sometimes skips the mind that the primary end-us...
-
21 Years of Hitman: How Stealth Action Got Perfected Over the Last 2 Decades
Coming off the highly anticipated release of Hitman 3, this latest installment has been very well re...
-
How USB Works: From 'Plug and Pray' to Being Everywhere
For a quarter of a century, the USB port has been a faithful old friend. Connecting and powering our...
-
50 Years Later: The Revolutionary 8008 Microprocessor
Guest author Ken Shirriff is a Silicon Valley-based computer enthusiast who enjoys reverse-engineeri...
-
The Best CPU & GPU Purchases of 2017
A few weeks ago we put together a list of what we felt were the worst CPU and GPU purchases of 2017,...
-
Testing Reliability: Puget Systems' List of Tried and True PC Hardware
We've all been there. You want to buy a new graphics card, you read the reviews, and settle on the b...