丁小芹
-
Not Intel, Not AMD: Alternative CPU Architectures from Around the World
It's easy to think of the desktop CPU space as a duopoly: on the one hand you have Intel finally tra...
-
Top 10 Hacks for Microsoft Excel
Millions of people around the world use Microsoft Excel to handle all kinds of office and productivi...
-
GPU Availability and Pricing Update: August 2021
It's time for our monthly update into graphics card pricing and availability, a series that we've be...
-
Secure Email and Cloud Alternatives to Gmail and Dropbox
Back in June last year, confidential documents leaked by Edward Snowden indicated that major email a...
-
Intel's 100
The Z170 chipset has been available for some time now, but due to Intel's staggered launch of Skylak...
-
50 Years Later: The Revolutionary 8008 Microprocessor
Guest author Ken Shirriff is a Silicon Valley-based computer enthusiast who enjoys reverse-engineeri...
-
How to Save PDF Pages as JPG Images in Windows and macOS
If you want to neatly share PDF pages on social media without relying on ugly screenshots, you shoul...
-
Three Apps to Combine All Your Messaging Clients Into One
Instant messaging is an increasingly competitive market and despite your best efforts to keep it sim...
-
Are Gray Market Game Key Sites Legit?
So you're going to buy a game from one of those no-good-gray-market key sites like G2A, are you? Wel...
-
Five Free VPN Services You Should Check Out
Virtual private networks were conceived to connect computers in different geographic locations as if...
-
What is a Checksum, and What Can You Do With It?
You're about to click on a download button and notice a weird looking code next to it. It doesn't se...
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...