杨芳仪
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...
-
How CPUs are Designed, Part 3: Building the Chip
This is the third installment in our CPU design series. In Part 1, we covered computer architecture...
-
The Future of Tech: The Desktop PC
If you're over a certain age, you'll probably know that people have been foretelling the death of th...
-
Buying an MP3 Player in 2018
While most people who enjoy music on the go these days are listening from their phones, there are st...
-
How CPUs are Designed, Part 3: Building the Chip
This is the third installment in our CPU design series. In Part 1, we covered computer architecture...
-
Rundown of Must
Check out our latest list: The Best Portable Apps for Your Software ToolboxPortable apps are lightwe...
-
The Best Skyrim Mods
Skyrim was released over three years ago! In video game terms it's a senior citizen, and by all righ...
-
Estimating CPU Performance Using Amdahl's Law
If you are in the market for a new computer, or thinking of upgrading your current system, choosing...
-
Ryzen 5 3600 vs. 3600X: Which should you buy?
We were among the first publications to review the Ryzen 5 3600 and at $200 we found the 6-core, 12-...
-
The History of the Microprocessor and the Personal Computer
The personal computing business as we know it owes itself to an environment of enthusiasts, entrepre...
-
The State of PC Gaming in 2019
Sometimes, as borders erode, new fissures form in their wake. In 2019, more games flowed between PC...
-
Explainer: What is Arduino?
When it comes to computing devices, the headlines nearly always go to biggest and fastest – more GHz...