Skip to main content

Week 3 blog

 Buying a CPU can be a tough task if you do not know how to go about it or have a tech experience. The video explains in detail how to purchase a video. I learn that it is always good to have a budget and to make a right depending on the performance per dollar spend but buying a CPU, you must consider the hardware that will carry the CPU. That is price of the CPU, and the hardware should be considered to know the value of the CPU. Buy the CPU and its accompanying hardware brand new without looking at the used market due to the availability and pricing and the CPU cost should not be more than 50% of the budget for the system.

Purchasing a CPU should depend on the purpose of the system that is gaming, workstation and allrounder. Since I am not a gamer, I will focus on a $1000 workstation, because of availability and performance, the Core i7 8700k and Ryzen 7 2700x will fit well for my budget since GPU, memory, motherboard, storage and cooler should be considered in the budget.

Core i3, Corei5 or Core i7

Product naming is important for processors. Core i3 has two processing cores and hyperthreading for multitasking, will consume less power and a smaller cache.

Core i5 has improved onboard graphics and turbo boost for temporary performance enhancements whenever the system needs more power.

Core i7 can have from 2-8 cores, can support up to 2 -8 memory sticks and hyperthreading for heavy workload. It can have TDP from 10W-130W, more cache, faster turbo boost, better onboard graphics than Core i3 and Core i5.

Comments

Popular posts from this blog

System Hardening Week 9

  Assume Breach and Be Proactive: Traditional cybersecurity is reactive, responding to known attack methods. However, sophisticated adversaries continuously evolve their tactics to bypass security solutions. Threat hunting operates under an “assume breach” mindset. It seeks to uncover indications of attack (IOA) that haven’t been detected yet. The goal is to outthink the attacker by identifying and mitigating threats before they access sensitive data.

Week 7 Cloud Computing.

  Cloud Computing vs. Internet of Things (IoT) Cloud Computing Cloud computing refers to the delivery of computing services (such as servers, storage, databases, networking, software, and analytics) over the internet ("the cloud"). Key characteristics include: ·          On-Demand Resources : Users can access resources as needed without physical hardware. ·          Scalability : Easily scale resources up or down based on demand. ·          Cost-Effectiveness : Pay-as-you-go pricing models reduce the need for significant upfront investments in hardware. ·          Accessibility : Access services from anywhere with an internet connection. Internet of Things (IoT) The Internet of Things (IoT) is a network of interconnected devices that collect and exchange data. These devices can include anything from smart home appliances t...

week 10 Cloud Computing.

  File Storage Description: Structure: Hierarchical, using directories and subdirectories. Data Organization: Files are stored with metadata like filename, timestamps, and permissions. Advantages: Familiarity: Easy for users to understand and manage, akin to traditional file systems. Ideal Use Cases: Great for storing and managing documents, media files, and shared drives. Block Storage Description: Structure: Data is divided into fixed-sized blocks. Data Organization: Each block has a unique identifier, but no metadata is attached directly. Advantages: Performance: High performance and low latency. Flexibility: The operating system can be formatted and used as required. Ideal Use Cases: Databases: Suitable for database applications. Virtual Machines: Commonly used for VM storage and high-performance applications.