"Think for yourself, decide for yourself ..."
Until now, we have considered solutions that save money when organizing the LAN of a small office due to some compromises with standards. There is another way of organizing the…

Continue reading →

Transistor Evolution and Processor Revolution
The microprocessor manufacturing process is inextricably linked with the evolution and continuous improvement of the transistor. The transistor, invented in 1948 in the laboratories of Bell Corporation, made it possible…

Continue reading →

What is Athlon 64?
First of all, it must be emphasized that in the AMD64 architecture, the main attention was paid to the issue of compatibility with 32-bit applications that are widespread now. The…

Continue reading →

electrons

Warm company

A processor is not the only heat source in a computer. But the most solid of them. Therefore, special attention is paid to him. But modern video cards also have a specialized processor on board. He is also warming. And “overclock” video cards even more often than the central processor.

The first video cards with 3D accelerators caused us a lot of trouble with their “hot temperament”. Some video cards could work normally only the first 10 … 20 minutes after switching on. Continue reading

Cluster configuration
Typical cluster configurations typically include a shared disk subsystem connected to all servers in the cluster. The shared disk subsystem can be connected using high-speed cards, cables, and Fiber Channel…

...

Overview of Graphic Solutions for Laptops
Over the past year, there have been plenty of events in the graphics market. For quite some time, S3 was the undisputed leader in the production of graphic chips and…

...

How can you “burn out at work”
Having dealt with processor cooling issues, we can now easily figure out the question of why Duron processors burn up if they are turned on without a heatsink. Generally speaking,…

...

Personal computer and network security
Recently, quite a lot of attention has been paid to ensuring information security in various automated systems (corporate, inter-corporate, payment, and others). Personnel takes the perimeter of the corporate IT…

...