姜玉阳
-
The State of PC Gaming in 2015
Unlike the other gaming platforms we've been evaluating here at the end of the year, the PC's been a...
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...
-
How CPU Cores & Cache Impact Gaming Performance
At some point you may have heard someone say that for gaming you need X amount of cores. Typical exa...
-
What is a Checksum, and What Can You Do With It?
You're about to click on a download button and notice a weird looking code next to it. It doesn't se...
-
How to Use the Amazon Echo Spot and Echo Show as a Security Camera
Amazon Echo devices offer a multitude of functions, but those with built-in camera and screens have...
-
Halo Infinite PC Graphics Benchmark
Today we're taking a look at Halo Infinite's graphics performance by testing over 30 Nvidia and AMD...
-
What is Crypto Mining?
On January 3, 2009, the first Bitcoin mining operation went underway, and a 50 BTC reward was sent t...
-
How to Run Android Apps in Google Chrome
Did you know that you can run Android apps in Google Chrome? Back in 2015, Google launched a tool ca...
-
Not Intel, Not AMD: Alternative CPU Architectures from Around the World
It's easy to think of the desktop CPU space as a duopoly: on the one hand you have Intel finally tra...
-
Internet for All
Since its birth in the labs of ARPANET half a century back, Internet has risen to create a truly glo...
-
Parental Controls: How to Lock Down Your Kids' iOS Devices
I'm the father of a very curious 9-year-old daughter. As such, it's a headache trying to make sure s...
-
Hot PC Games for the 2013 Holiday Season
Although the remainder of 2013's PC gaming lineup isn't as strong as it could have been with Thief,...