Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

All You Need to Know Before Buying a Computer, Part I

If you are looking to purchase a new desktop for your office or your home, you need to ask yourself several difficult questions to get the most bang for your buck. This is a five-part blog that will help you determine the right computer for the job. In this article, you’ll learn how to select the right CPU, or central processing unit.

Determine the Computer’s Role

You can make this process much easier by knowing what the purpose for your desktop is. After all, a computer that is used for browsing the web will be drastically different from one that is used for video editing. We’re going to focus more on the lower to middle end of the spectrum here, as computers that are used for audio/video production or gaming will have an incredibly high ceiling that isn’t necessary for most organizations.

A desktop computer for typical office work can always be upgraded, but it’s important to remember that a low-end desktop will not necessarily translate well to a high-end gaming system. Laptops are in an entirely different category; while some can be upgraded, others are more limited in scope.

Understanding Specifications

When looking for computers, you are sure to see specifications for components utilized by the machine. In this blog, we’re focusing on the central processing unit. It’s a fancy name for the part of the computer that determines how much it can do, and how fast. Two of the biggest brands out there are Intel and AMD.

Intel has a tiering system in place that helps consumers understand how powerful their CPUs are: Core i3, i5, i7, and i9. The higher the number, the more powerful the CPU is. AMD utilizes a similar method. Both brands produce low and high-end CPUs, so no matter your choice, you’ll have several options to work with. Here are some of the most common:

  • Intel Core i3: Ideal for low-end work, like editing documents, checking email, and surfing the Internet. The latest generation of Core i3 should also suffice to stream video on YouTube and Netflix.
  • Intel Core i5: The i5 processor is a little more powerful than your average i3, as it can handle some light photo editing and gaming. It’s a decent choice for your average office workstation.
  • Intel Core i7: i7 processors are more high-end for video editing and gaming.
  • Intel Core i9: i9 is a tier that has only just recently surfaced. For the average business’ needs, it’s overkill, but it’s perfect for 3D animation, rendering, gaming while streaming, scientific calculations, and so on. The price tag is just as high as you would think.
  • AMD Ryzen 3: To put it simply, this is AMD’s version of the Intel Core i3 processor, capable of editing documents, surfing the web, and… not much else.
  • AMD Ryzen 5: The Ryzen 5 is about on par with the Intel Core i5, and while you might pay a little bit more for it, the performance of your desktop will improve substantially.
  • AMD Ryzen 7: The Ryzen 7 is similar to Intel’s Core i7; this is where you’ll start to see costs increasing quite a bit.
  • AMD Threadripper: This is where the overkill starts for AMD processors. The Threadripper is capable of handling heavy loads like 3D animation, gaming while streaming, and other intense computing that your average desktop doesn’t need to do.

How Much Does the GHz Matter?

This tiering system for Intel and AMD CPUs means that you don’t have to pay too much attention to the clock speed. Simply put, the CPU speed is something that the average user doesn’t need to know much about. If you must know, though, the higher the number, the faster the CPU will be, but this also makes the price skyrocket. It’s not worth thinking about unless you’re planning on building a server or a high-end gaming PC.

Does the Number of Cores Matter?

Cores are the number of processors built within the main processor. You should aim for at least four cores, or “quad-core,” unless you are on a serious budget. Gaming and video editing will require higher-end processors, but most of the time it’s best to place a cap on eight. There are even processors out there with dozens of cores, but these are for servers or specific scenarios.

One of the biggest things to keep in mind is that using last generation’s CPU isn’t going to save you much money, but as long as you get something that has come out relatively recently, you shouldn’t have too much trouble. You don’t need to use bleeding-edge technology unless that’s what you’re trying to achieve.

We hope you found this guide to CPUs helpful. Stay tuned for more information in the next part of this series, and be sure to contact the professionals at Direct Technology Group for more information on technology acquisition.

All You Need to Know About Buying a Computer, Part...
This Florida City Will Pay 65 Bitcoins to Get File...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 14 July 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Hackers Productivity Network Security Google Malware Microsoft Data Innovation Business Software User Tips Smartphones Hosted Solutions Miscellaneous Backup Hardware Communication Email Workplace Tips communications Computer Internet Mobile Devices Small Business Android IT Support Smartphone VoIP Productivity Business Management Cybersecurity Outsourced IT Ransomware Upgrade Mobile Device Windows Windows 10 Social Media Network Browser Managed IT Services Tech Term Users Passwords Microsoft Office Collaboration Cloud Computing Employer-Employee Relationship IT Services Apps Windows 10 Bandwidth Automation Save Money Business Continuity Holiday Managed IT Services Facebook Office Quick Tips Marketing Data Backup Chrome Internet of Things Gadgets Gmail IT Support Phishing Saving Money Managed Service Data Recovery Wi-Fi Networking Disaster Recovery Wireless Server Router Applications Mobile Device Management Alert Password Apple Information Health Remote Computing Settings Managed Service Provider Computers Retail Access Control VPN Hacking Virtualization Data Breach App Business Intelligence Office Tips Mobility Physical Security Data Management Cybercrime Government Analytics BYOD Law Enforcement Application Office 365 iPhone Remote Monitoring Blockchain Patch Management Website Recovery Operating System Excel BDR Going Green Twitter Laptop Mobile Computing VoIP Google Drive Lithium-ion battery Safety Workers Managed IT Service Spam Entertainment Paperless Office WiFi Telephone Systems Politics Biometrics Big Data History Mouse Compliance Virus Artificial Intelligence Battery Social Engineering Conferencing Bring Your Own Device Voice over Internet Protocol Printer Word Environment Value Humor Maintenance Managing Stress User Error Payment Cards Best Practice HIPAA Virtual Reality Hybrid Cloud Tablet Shortcut Business Technology Vulnerability Windows 7 Cost Management Sports Remote Work Net Neutrality Cortana Mobile Office Telephony Remote Monitoring and Management Information Technology Human Resources Cleaning RAM Meetings Social Network DDoS Scam Robot Hard Drives Tech Support IT solutions Smart Technology Employee-Employer Relationship Processor Customer Relationship Management Healthcare Shadow IT Company Culture Risk Management Files PowerPoint Customer Service Telephone System Data storage Data Security Internet Exlporer G Suite Wireless Charging Dark Web End of Support Streaming Media Fax Server Current Events The Internet of Things Medical IT Search Tip of the week Connectivity Two-factor Authentication Hosted Solution Virtual Assistant Batteries Education Data Protection Printer Server eWaste How To Covid-19 Tech Terms Telecommuting Cabling Email Management Vulnerabilities Backup and Disaster Recovery Amazon Memes Error Hard Drive Botnet Public Cloud OneNote Windows 8 Touchpad Management Help Desk Network Attached Storage A.I. SaaS User Security Legal Millennials Cryptocurrency File Management SSD Plug-In IT Touchscreen Wearable Technology Processors Database Managed IT Social Licensing Windows Server 2008 R2 Gadget Threats Remote Working Certification Server Management Movies People Windows XP Bloatware Relocation Phone System Managed Services Provider Inventory Proactive IT User Hosted Desktop Microsoft Office 365 Running Cable Spyware Tactics Travel PDF Taskbar Scams Training Uninterrupted Power Supply Machine Learning Unified Communications Video Games Entrepreneur Time Management Vendor Mobile Security Firewall Authentication HP Internet Explorer Social Networking Live Streaming National Security Tablets Project Management Black Market PCI DSS Security Cameras Telecommute Sales Voice over IP Webcam Multi-Factor Security Chrome OS e-waste Analysis Updates YouTube Bluetooth Profiles Authorization Document Management Threat WhatsApp Alerts Insurance Regulations Compliance Wearables Data loss Microsoft Teams Worker Knowledge eCommerce Distribution NarrowBand USB Computer Repair Troubleshooting Distributed Denial of Service Digital Printing News Work/Life Balance Memory Copy Downtime Staff Budget Comparison Online Shopping Avoiding Downtime Electronic Health Records Fleet Management Display Wireless Technology IT Service Update Edge Paper Automobile Paste Websites Specifications Reporting Computer Accessories Programming Employees Consultant Multi-Factor Authentication Benchmarks Chromecast Mobile Outlook Ink Monitor E-Commerce Dongle Cables Access Cameras SharePoint Lead Generation Internet exploMicrosoft Solid State Drive Best Available Holidays Recycling Remote Profitability Encryption IT budget Antivirus Remote Support Techology Hiring/Firing Content Filtering Analyitcs Remote Control Reputation Payment Printers Virtual Private Network GDPR disposal Google Maps Advertising Hard Disk Drive Staffing Remote Workers Eliminating Downtime Notifications IT Management Downloads HaaS Hacker User Tip Spotify Spam Blocking Customer instant Messaging WIndows 7 Technology Tips Unified Threat Management Co-Managed IT Storage WannaCry Private Cloud Video Science Bitcoin Wireless Internet Trends Personal Information Windows Media Player File Sharing Flexibility