
Shelby
#0060 Moore's Law
April 11, 2025
This blog post was enhanced
with AI on 4/11/25.
Understanding Moore’s Law: The Driving Force Behind Technological
Growth
Moore’s Law is one of the most influential observations in the world of computing and
technology. It has shaped the development of modern electronics, guided technological
progress, and set the pace for advancements in hardware capabilities. But what exactly
is Moore’s Law, and why does it matter?
What Is Moore’s Law?
Moore’s Law is named after Gordon Moore, co-founder of Intel, who made a striking
observation in 1965. He noted that the number of transistors on a microchip was doubling
approximately every two years, leading to exponential increases in computing power while
simultaneously reducing costs. Over time, this observation became a guiding principle
for the semiconductor industry.
Although not a physical law, Moore’s Law has been remarkably accurate for decades,
serving as a benchmark for chip manufacturers and influencing expectations around the
performance of new computing hardware.
Why Is Moore’s Law Important?
The implications of Moore’s Law extend far beyond transistor count. This steady increase
in processing power has enabled:
• Smaller, More Powerful Devices: From bulky mainframes to sleek
smartphones, advances
in microchip technology have allowed for increasingly compact yet powerful devices.
• Lower Costs: As transistors become more efficient, production costs
per unit decrease,
making technology more accessible to a wider audience.
• Innovations Across Industries: Everything from artificial
intelligence and machine
learning to medical devices and autonomous vehicles has benefited from the exponential
growth in computing power.
• Economic Growth: Entire industries, such as software development,
data analytics, and
cloud computing, have flourished due to the ever-expanding capabilities of
microprocessors.
The Challenges of Keeping Up With Moore’s Law
While Moore’s Law has held true for decades, maintaining this pace has become
increasingly difficult. Some key challenges include:
• Physical Limitations: As transistors shrink to nearly atomic scales,
quantum effects
begin to interfere with their reliability and efficiency.
• Rising Costs: Developing smaller and more efficient transistors
requires highly
sophisticated manufacturing processes, leading to escalating research and production
costs.
• Heat and Power Consumption: Smaller transistors packed into denser
chips generate more
heat, requiring advanced cooling solutions and power-efficient designs.
The Future Beyond Moore’s Law
Many experts believe that Moore’s Law is slowing down as we approach the physical limits
of silicon-based chips. However, alternative technologies may sustain progress in
computing performance, including:
• Quantum Computing: Leveraging quantum mechanics, quantum computers
have the potential
to solve problems far beyond the capabilities of classical computers.
• Neuromorphic Computing: Inspired by the human brain, neuromorphic
chips aim to process
information more efficiently than traditional architectures.
• 3D Chip Stacking: Instead of just shrinking transistors, stacking
chips in three
dimensions can improve performance without requiring smaller components.
• New Materials: Advances in graphene, carbon nanotubes, and other
novel materials may
extend the trend of increasing computing power beyond silicon’s limitations.
Conclusion
Moore’s Law has been a defining factor in the rapid evolution of computing, driving
technological advancements that shape our modern world. While we may be reaching the
limits of traditional semiconductor scaling, new innovations continue to push the
boundaries of what is possible. Whether through quantum computing, novel chip designs,
or breakthroughs in materials science, the spirit of Moore’s Law—continuous progress in
computing power—will likely persist for years to come.

Shelby
#0059 Bitlocker: Feature or Nightmare?
April 05, 2025
This blog post was enhanced
with AI on 4/05/25.
The Data Lockbox You Didn’t Know You Had
BitLocker is Microsoft’s full-drive encryption feature built into Windows. Think of it
like the digital version of a bank vault for your files. Once it’s enabled, your entire
hard drive is encrypted, and without the correct decryption key, that data is locked
tight—completely unreadable.
This is similar to the encryption Apple uses on iPhones and iPads. If someone gets hold
of your phone and doesn’t know your passcode, they can’t get into your data. BitLocker
works the same way for your computer. If your PC is lost or stolen, your sensitive
files—photos, financial documents, business data—are safe from prying eyes.
Sounds great, right? It is—until something goes wrong.
The Catch: It’s Hard to Recover Without the Key
In recent versions of Windows, especially Windows 11, Microsoft has started enabling
BitLocker by default—sometimes without users even realizing it. If you
bought a new laptop recently, chances are BitLocker is quietly protecting your drive
right now.
The problem is, most people don’t know what BitLocker is, much less that they need to
save a recovery key somewhere safe. So when their computer suddenly
asks for that key—maybe after a crash, motherboard replacement, or OS
reinstallation—they’re blindsided. Without that key, the data is as good as
gone.
And this isn’t your average password you can guess. The BitLocker recovery key is a
long, 48-digit number. If you don’t have it written down or saved to your Microsoft
account, even a professional technician won’t be able to unlock your files. It’s not a
matter of skill—it’s the whole point of encryption. There are no backdoors. It’s
designed to be unbreakable.
What Happens When the Key is Lost?
Unfortunately, this is where things get ugly. If the recovery key is lost or
inaccessible, the only option is to wipe the drive and reinstall
Windows. That means saying goodbye to your family photos, school projects,
business documents, and yes—your tax returns. Forever.
It’s like putting your valuables in a high-tech safe, locking it, and then tossing the
key into the ocean.
BitLocker: Good for the CIA, Not Always for the Average User
In some situations—like enterprise environments or high-security scenarios—BitLocker is
an amazing tool. It keeps sensitive data out of the wrong hands. But for everyday users
who just want to protect their memories and work, BitLocker can feel like more of a trap
than a feature.
The real problem isn’t the technology—it’s the lack of awareness. Most
users don’t know they need to save the key, so when disaster strikes, they’re caught off
guard.
What You Can Do
• Check if BitLocker is enabled on your system. You can do this by
going to Settings >
Privacy & Security > Device Encryption.
Optionally, you can disable
Bitlocker.
• Find and save your recovery key. Visit
https://account.microsoft.com/devices/recoverykey to see if your key is stored there (it
often is, if you signed into your PC with a Microsoft account).
• Back up your files regularly to an external drive or cloud storage,
just in case.
BitLocker is a powerful tool—but only if you know how to manage it. For most users, a
little awareness and preparation can save a lot of heartache.

Shelby
#0058 What is the Silicon Lottery?
March 30, 2025
This blog post was enhanced
with AI on 3/30/25.
The Silicon Lottery: Why Not All Processors Are Created Equal
If you've ever built a PC or overclocked a CPU or GPU, you may have heard the term
"silicon lottery." But what does it mean, and why does it matter to tech enthusiasts?
Let's dive into the fascinating world of semiconductor manufacturing and how tiny
variations can impact performance.
What Is the Silicon Lottery?
The silicon lottery refers to the inherent variability in semiconductor manufacturing
that causes some processors or graphics cards to perform better than others, even if
they are the same model. This happens due to microscopic differences in the silicon
wafers used to create these chips.
While manufacturers strive for consistency, no fabrication process is perfect. Some
chips come out of the production line able to achieve higher clock speeds at lower
voltages, while others require more power or generate more heat. This means that some
users get a “golden sample” with better performance, while others receive a chip that
meets the baseline specifications but doesn’t overclock as well.
Why Does the Silicon Lottery Happen?
The process of making CPUs and GPUs is highly complex and involves multiple
steps:
• Wafer Fabrication – Semiconductor manufacturers create large
silicon wafers, each containing multiple chips.
• Die Cutting – The wafers are sliced into individual chips.
• Bin Sorting – Manufacturers test chips to see how well they
perform. Chips that meet higher performance standards are often sold as premium models
(e.g., a higher-clocked variant of the same CPU series).
Since silicon production is influenced by numerous variables—like material purity,
microscopic defects, and even slight inconsistencies in the etching process—each chip
has unique characteristics. Some have better power efficiency and thermal properties,
while others are less optimal but still functional.
How the Silicon Lottery Affects Consumers
For most people, the silicon lottery doesn’t have a noticeable impact. If you're running
your processor at stock settings, you likely won’t see major performance differences.
However, for enthusiasts who want to overclock their hardware for extra performance,
winning (or losing) the silicon lottery can make a big difference.
For example, two users with the same Intel or AMD processor may find that one chip can
reach 5.2 GHz on a low voltage, while another struggles to hit 5.0 GHz even with
increased power. The same concept applies to GPUs, where some cards can be pushed
further while staying cool and efficient.
Can You Improve Your Chances of Winning?
Unfortunately, there’s no guaranteed way to get a golden chip. However, some strategies
can slightly increase your odds:
• Pre-Binned Chips – Some retailers sell processors that
have been tested and guaranteed to perform at higher speeds.
• Choose a Higher-Tier Variant – Sometimes, higher-end versions of
a chip are selected from the best-performing silicon.
• Testing and Undervolting – Even if you don’t get a golden sample,
adjusting power settings can sometimes improve efficiency and thermal
performance.
Conclusion
The silicon lottery is an unavoidable reality of modern semiconductor manufacturing.
While it may be frustrating for overclockers who want the best performance, it’s also
what allows manufacturers to maximize chip yields and keep costs reasonable. Whether you
win or lose, remember that even an average chip today delivers impressive computing
power!

Shelby
#0057 The End of DSL
March 26, 2025
This blog post was enhanced
with AI on 3/26/25.
The Federal Communications Commission (FCC) has been actively promoting the transition
from traditional copper-based networks, such as Digital Subscriber Line (DSL), to more
advanced technologies like fiber-optic systems. This initiative aims to provide
Americans with faster and more reliable internet services.
The Shift from DSL to Fiber
DSL technology, which transmits data over copper telephone lines, has been a staple of
internet connectivity for decades. However, it has inherent limitations in speed and
reliability compared to modern alternatives. Fiber-optic technology, on the other hand,
uses light to transmit data through glass fibers, offering significantly higher speeds
and greater reliability. The FCC recognizes these advantages and has been encouraging
service providers to upgrade their infrastructure accordingly.
FCC's Role in Technology Transitions
The FCC has implemented policies to facilitate the retirement of outdated copper
networks and promote the deployment of fiber-optic systems. According to the FCC, these
"tech transitions" involve switching network infrastructure from copper wire to optical
fiber and other advanced technologies, aiming to deliver faster and more reliable
internet services to consumers.
Impact on Consumers
For consumers, this transition means access to higher-speed internet services that can
better support modern applications such as streaming, online gaming, and telecommuting.
However, the shift also raises concerns about service availability and affordability,
especially in rural and underserved areas. The FCC has been working to address these
issues by implementing policies to ensure that consumers are informed and protected
during the transition.
Challenges and Considerations
While the move to fiber is beneficial, it presents challenges, particularly in rural
areas where deploying new infrastructure can be costly and logistically complex. Some
service providers have been reluctant to invest in fiber deployment in these regions,
leaving certain communities without improved services. For instance, AT&T has phased out
DSL services without offering fiber replacements in some areas, highlighting the digital
divide that can result from such transitions.
Additionally, there are concerns about the pace of this transition and the potential for
some consumers to be left behind. The FCC has been working to balance the need for
modernizing infrastructure with the necessity of ensuring that all Americans have access
to reliable communication services.
Looking Ahead
The FCC's push to replace DSL with fiber aligns with broader goals of enhancing the
nation's broadband infrastructure. While the transition presents certain challenges, the
long-term benefits of improved internet speeds and reliability are expected to outweigh
the initial hurdles. Consumers are encouraged to stay informed about changes in their
service options and to communicate with their providers to understand how these
transitions may affect them.
As the landscape of internet connectivity evolves, the FCC continues to play a crucial
role in facilitating these technological advancements while striving to ensure that no
community is left without access to essential communication services.
Sources: Federal Communications Commission, Cord Cutters News

Shelby
#0056 Understanding Bad Sectors on a Hard Drive
March 25, 2025
This blog post was enhanced
with AI on 3/25/25.
A hard drive is an essential component of any computer, responsible for storing
operating systems, applications, and personal files. However, over time, hard drives can
develop what are known as "bad sectors." These problematic areas can cause data loss,
system crashes, and overall instability in computer performance.
What is a Bad Sector?
A bad sector is a small portion of a hard drive that has become physically or logically
damaged, making it unreadable or unusable by the operating system. When a sector goes
bad, any data stored in that part of the drive may become corrupted or inaccessible. Bad
sectors can develop due to a variety of reasons, including physical wear and tear,
manufacturing defects, or software-related issues.
Types of Bad Sectors
There are two main types of bad sectors:
1. Physical (Hard) Bad Sectors: These occur due to physical damage to the drive, such as
mechanical wear, dust, or impact damage. These bad sectors are permanent and cannot be
repaired.
2. Logical (Soft) Bad Sectors: These result from software errors, power failures, or
corrupted files. In many cases, soft bad sectors can be repaired using built-in
disk-checking utilities.
Causes of Bad Sectors
Several factors can contribute to the formation of bad sectors, including:
• Aging and Wear: Over time, the mechanical components of a hard drive degrade, leading
to bad sectors.
• Power Failures: Unexpected shutdowns or power surges can interrupt disk writing
processes, creating logical bad sectors.
• Manufacturing Defects: Some drives come with defective sectors right out of the
factory.
• Physical Damage: Dropping or jarring a hard drive can cause physical damage to the
platters.
• Malware or Viruses: Some malicious software can corrupt file structures, leading to
bad sectors.
Preventing Bad Sectors
While bad sectors are sometimes inevitable, you can take measures to reduce their
occurrence:
• Use a Surge Protector to prevent power fluctuations from damaging the hard drive.
• Handle Drives with Care to avoid physical damage.
• Perform Regular Backups to protect against data loss.
• Run Disk Maintenance Tools periodically to detect and fix issues early.
Conclusion
Bad sectors can compromise the health of a hard drive, leading to potential data loss
and system instability. Understanding their causes and taking preventive measures can
help extend the lifespan of your storage device. Regular backups and monitoring tools
can ensure your data remains safe and accessible, even in the event of hard drive
failure.

Shelby
#0055 How do passwords work?
March 21, 2025
This blog post was enhanced
with AI on 3/19/25.
How Do Passwords Really Work?
Passwords are the keys to our digital lives, granting access to everything from social
media and banking to work emails and online shopping. But have you ever wondered what
happens when you enter your password? How does the system verify it’s really you? Let’s
break down how passwords actually work and why strong passwords matter.
The Basics of Password Authentication
When you create an account, the website or application stores your password—but not in
plain text. Instead, it undergoes a process called hashing. Hashing converts your
password into a unique string of characters using a cryptographic algorithm. The key
aspect of hashing is that it’s a one-way function: once a password is hashed, it cannot
be reversed back into its original form.
For example, if you set your password as "MySecurePass123," a hashing algorithm might
convert it into something like this:
5f4dcc3b5aa765d61d8327deb882cf99
When you log in, the system hashes the password you enter and checks if it matches the
stored hash. If they match, access is granted; if not, access is denied.
Why Hashing Matters
If websites stored passwords in plain text, a data breach would expose every user's
credentials. Hashing protects against this by ensuring that even if the database is
compromised, attackers can’t immediately read passwords.
However, not all hashing algorithms are equally secure. Older algorithms like MD5 and
SHA-1 are vulnerable to attacks. Secure systems use stronger algorithms like bcrypt,
Argon2, or PBKDF2, which add extra layers of protection, making it harder for hackers to
crack passwords using brute-force attacks.
The Role of Salting
To further enhance security, modern systems use salting—adding a unique, random value to
each password before hashing it. This prevents attackers from using precomputed tables
(rainbow tables) to reverse-engineer passwords.
For example, if two users have the same password, salting ensures their stored hashes
are different. Without salting, identical passwords would result in identical hashes,
making attacks easier.
How Hackers Try to Crack Passwords
Hackers have several methods to break passwords, including:
1. Brute Force Attacks – Trying every possible password combination
until they find the right one.
2. Dictionary Attacks – Using lists of commonly used passwords (like
"123456" or "password") to guess users’ credentials.
3. Credential Stuffing – Using leaked passwords from previous breaches
to access other accounts, assuming people reuse passwords.
4. Phishing – Tricking users into revealing their passwords through
fake websites or emails.
How to Protect Your Passwords
1. Use a Strong Password – A mix of uppercase, lowercase, numbers, and
special characters makes passwords harder to guess.
2. Enable Multi-Factor Authentication (MFA) – Adds an extra layer of
security beyond just the password.
3. Use a Password Manager – Helps generate and store complex passwords
securely.
4. Avoid Reusing Passwords – If one account is compromised, unique
passwords prevent hackers from accessing others.
5. Regularly Update Passwords – Especially after a security breach or
if you suspect a compromise.
The Future of Password Security
While passwords remain the standard for authentication, new technologies are emerging,
such as biometric authentication (fingerprints, facial recognition), passkeys, and
hardware security keys. These methods offer increased security and convenience by
reducing reliance on traditional passwords.
In the meantime, understanding how passwords work and practicing good security habits
can go a long way in protecting your digital identity.

Shelby
#0054 Microsoft OneDrive
March 19, 2025
This blog post was enhanced
with AI on 3/19/25.
Microsoft OneDrive: A Convenient Cloud Backup or a Nusiance?
In today’s digital world, backing up important files is crucial, and Microsoft OneDrive
offers a simple solution. As a cloud backup system, OneDrive automatically syncs your
documents, photos, music, and even your desktop to the cloud, ensuring that your data is
safe from accidental loss or hardware failure.
How OneDrive Works
OneDrive runs periodically in the background, especially when you turn on your computer.
It encrypts your files before sending them to Microsoft’s cloud servers, providing a
layer of security for your personal or work-related data. This automated backup process
helps users avoid the hassle of manually saving their files to external storage
devices.
OneDrive Pricing Tiers
Microsoft offers several pricing plans for OneDrive, catering to different user
needs:
• Free Plan: 5GB of storage at no cost.
• OneDrive Standalone (100GB): $1.99 per month.
• Microsoft 365 Personal: $6.99 per month, includes 1TB of storage and access to Office
apps.
• Microsoft 365 Family: $9.99 per month, includes 6TB (1TB per user, up to 6 users) and
Office apps.
• Business Plans: Various options starting at $5 per user per month, offering additional
storage and business-centric features.
Reasons to Like OneDrive
OneDrive has gained a loyal following due to its ease of use and affordability. Here’s
why many users appreciate it:
• Simple and User-Friendly: OneDrive seamlessly integrates with Windows, making it easy
for users to back up and access their files across multiple devices.
• Cost-Effective: Compared to other cloud storage options, OneDrive offers competitive
pricing, and many users get it bundled with Microsoft 365 subscriptions, making it an
excellent value.
Reasons to Dislike OneDrive
Despite its advantages, OneDrive isn’t without its critics. Some users find it
frustrating due to the following reasons:
• Can Slow Down Older Computers: Since OneDrive runs in the background, it can consume
system resources, causing performance issues on aging devices.
• Limited Features: While OneDrive covers basic cloud storage needs, it lacks the
advanced features that some power users desire.
• Trust Issues with Microsoft: Privacy-conscious users worry about storing sensitive
information on Microsoft’s servers, fearing potential data access by the company or
unauthorized parties.
Final Thoughts
Microsoft OneDrive is a great option for those looking for an easy and affordable way to
back up their files. However, users with older computers, advanced storage needs, or
privacy concerns may want to explore other cloud storage alternatives. Whether you love
it or hate it, OneDrive remains a significant player in the cloud storage market,
helping millions of users safeguard their digital lives.

Shelby
#0053 Choosing a Power Supply
March 18, 2025
This blog post was enhanced
with AI on 3/18/25.
Choosing the Right Power Supply for Your Custom PC
When building a custom PC, selecting the right power supply (PSU) is crucial. While
opinions vary, there are key factors to consider to ensure your build runs smoothly and
efficiently.
1. Wattage – How Much Do You Need?
To determine the right wattage, add up the power consumption of your CPU, GPU, fans,
drives, memory, AIO cooler, and RGB lighting. You can research exact numbers or
estimate.
Once you have a total, add 50–100% more to allow for future upgrades. For example, if
your components require 400W, consider a 600W or even 800W PSU. Choosing a higher
wattage helps future-proof your system.
2. Brand Matters
Stick with well-known and trusted brands, such as:
✅ BeQuiet!
✅ EVGA (getting hard to find)
✅ Cooler Master
✅ Corsair
✅ NZXT
✅ SeaSonic
✅ ThermalTake
Reliable brands ensure safety, durability, and better performance.
3. Check the Connectors
Most ATX power supplies include standard connectors for SATA, NVMe, motherboard, and CPU
power. However, pay close attention to GPU connectors:
• Most GPUs use PCIe 8-pin connectors.
• Newer GPUs (NVIDIA 40 & 50 series) may require a 12VHPWR connector.
Double-check compatibility with your graphics card!
4. Modular vs. Non-Modular Cables
• Modular PSUs allow you to connect only the cables you need, making for a cleaner, more
organized build. They are more expensive but worth it for cable management.
⚠ Warning: Only use the cables that came with your PSU. Mixing cables from different
brands can damage your components.
• Non-modular PSUs are cheaper, but you’ll have extra cables to manage. This can be
challenging if you have a smaller case.
5. Understanding 80+ Efficiency Ratings
Power supplies come with 80+ ratings, such as:
🏆 Platinum
🥇 Gold
🥈 Silver
🥉 Bronze
These ratings indicate efficiency but won’t make a huge difference for a single PC in
terms of electricity savings. If you run multiple PCs (like in an office), the
cumulative effect of using a higher-rated PSU can save on energy costs over
time.
6. What to Avoid
🚫 No-name or cheap Chinese brands – They often have poor quality control.
🚫 Unreliable PSUs – I once bought a case of 12 budget, Chinese PSUs for my business,
and 7 out of 12 failed within a year.
I learned my lesson — stick to trusted
brands!
________________________________________
By considering these factors, you’ll choose a power supply that ensures reliability,
efficiency, and longevity for your custom-built PC.

Shelby
#0052 So long Microsoft 365 Skype and Publisher
March 13, 2025
This information comes directly from a Microsoft email.
[begin quote]
Microsoft is committed to improving your Microsoft 365 subscription. We regularly review
how our subscribers use features within Microsoft products. This email includes details
regarding features going away next year and reminders about current benefits included
with your subscription.
• Beginning March 03, 2026, you will no longer have access to 60 minutes of
monthly Skype calls to mobile phones and landlines.
• Beginning October 01, 2026, Microsoft Publisher will no longer be
supported as part of Microsoft 365. Many common Publisher scenarios are available in
other Microsoft 365 apps, including Microsoft Word, PowerPoint, and Designer.
Action Recommended: Before October 01, 2026, convert your existing
Publisher files to PDF or Word format. After this date, you will no longer be able to
open or edit these files with Microsoft Publisher.
[end quote]
Please contact Microsoft support or see the Microsoft website for additional
information.

Shelby
#0051 Avoiding SCAM emails and other harmful messages
March 12, 2025
This blog post was enhanced
with AI on 3/12/25.
Email is an essential tool for communication, but it also presents opportunities for
cybercriminals to exploit unsuspecting users. Phishing scams, malware-laden
attachments, and fraudulent requests for personal information can have serious
consequences. Here’s how you can protect yourself from scam emails and other harmful
messages.
Recognize Common Signs of Scam Emails
Scam emails often exhibit certain red flags. Be on the lookout for:
- Unfamiliar Senders: If you don’t recognize the sender, proceed with caution.
- Urgent Language: Scammers try to create a sense of urgency to make you act quickly.
- Suspicious Links and Attachments: Hover over links to see where they lead before clicking. Avoid opening unexpected attachments.
- Poor Grammar and Spelling: Many scam emails contain noticeable errors.
- Requests for Personal Information: Legitimate companies do not ask for sensitive data via email.
Use Strong Email Security Measures
-
Take proactive steps to secure your inbox:
- Enable Two-Factor Authentication (2FA): This adds an extra layer of protection.
- Use a Spam Filter: Most email providers automatically filter out suspicious emails, but you can adjust your settings for more control.
- Regularly Update Your Passwords: Avoid using the same password across multiple accounts.
- Check the Email Domain: Scammers often use addresses that look similar to legitimate domains but contain slight misspellings.
Avoid Clicking Suspicious Links
Before clicking any link:
- Hover Over the Link: Verify the URL before clicking.
- Manually Enter Website Addresses: If an email asks you to log in, go directly to the official website instead of clicking the provided link.
- Use Link-Checking Tools: Websites like VirusTotal can help verify if a link is safe.
Be Wary of Unsolicited Attachments
Attachments can contain malware or ransomware. To stay safe:
- Do Not Open Unexpected Attachments: Even if the sender appears legitimate, confirm with them before opening.
- Scan Attachments with Antivirus Software: Many email providers automatically scan attachments, but you can add an extra layer of security.
Verify the Sender’s Identity
If you receive an email requesting sensitive information or urging action:
- Contact the Sender Through Official Channels: Call or visit the official website to verify the request.
- Look for Spoofed Email Addresses: Scammers may use fake email addresses that look similar to real ones.
Report Scam Emails
If you receive a suspicious email:
- Mark It as Spam: This helps improve spam filtering.
- Report It to Your Email Provider: Services like Gmail and Outlook have options to report phishing attempts.
- Notify Relevant Authorities: Some countries have cybersecurity agencies where you can report phishing scams.
Final Thoughts
Staying vigilant against scam emails is crucial in today’s digital world. By
recognizing red flags, securing your email account, and being cautious with links
and attachments, you can significantly reduce the risk of falling victim to email
scams. Always trust your instincts—when in doubt, don’t engage with suspicious
emails.

Shelby
#0050 Smokers Computers
March 5, 2025
This blog post was enhanced
with AI on 3/5/25.
Why Computers Belonging to Smokers Aren’t Fun to Work On
Let’s be honest, working on a computer that belongs to a smoker is like opening a door
to a world of challenges you didn’t ask for. While we all know smoking isn’t great for
health, it’s easy to forget just how much it can impact your technology too. If you've
ever worked on a smoker’s PC, you know exactly what I mean.
Cigarette Smoke + Dust = A Nightmare for Fans and Vents
If you’re into tech, you know that keeping things cool is the name of the game. Computer
fans are designed to keep your system from overheating, but when smoke mixes with dust,
it creates a sticky residue that clogs the vents. It’s like trying to run a race while
carrying a backpack full of bricks. The fan has to work overtime just to keep things
from heating up, which leads to unnecessary stress on your system.
Overheating Due to Cigarette Smoke
We’ve all had that moment where the fan kicks into high gear because the CPU is running
a little too hot. But for smokers’ computers, it’s an entirely different situation. The
build-up of cigarette smoke residue can trap heat, causing the components to overheat
faster than they should. This isn’t just annoying—it can shorten the lifespan of your
system.
The Smell. Oh, the Smell.
It’s not just about the technical stuff—let’s talk about that unmistakable stench of
stale cigarette smoke. If you’ve ever cracked open a smoker’s computer case, you know
the smell that lingers. It gets into every nook and cranny, and no matter how much you
clean, it’s hard to get rid of. And trust me, that smell isn’t doing any favors for your
equipment. It can stick to parts and affect performance over time.
Premature Equipment Failure
This one's a real kicker. If the dust and smoke are allowed to accumulate over time,
they can lead to premature equipment failure. Whether it’s a fried motherboard or a dead
hard drive, the buildup can cause components to fail much sooner than they should. So
that “old” computer might not be so old after all—it just didn’t stand a chance.
________________________________________
So, What Can You Do About It?
If you’re a smoker, maybe it’s time to think about cleaning your PC more often, or even
considering a dust filter to prevent debris from building up. And if you’re working on
someone else’s system, don’t forget to put on those gloves and maybe hold your
breath—because that stench isn’t going anywhere anytime soon!

Shelby
#0049 CPU Coolers
February 14, 2025
This blog post was enhanced
with AI on 2/14/25.
Choosing the Right type of CPU Cooler for Computer
When you’re building a high-end PC, one of the most crucial components to consider is
cooling. While stock coolers that come with your processor are fine for everyday use,
they’re not up to the task of keeping those high-performance parts cool during intensive
gaming or heavy workloads. So, how do you pick the right cooler to keep things chill?
Let’s break it down.
Why a Stock Cooler Won’t Cut It
If you’ve ever bought a new processor, you might have noticed the stock cooler that
comes in the box. While it’s designed to keep things cool during casual use, it’s not
built to handle the heat generated by higher-end CPUs under stress. Whether you're
gaming, editing videos, or running demanding apps, your CPU will need something more
robust to maintain optimal performance. That’s where third-party coolers come
in.
Processor Wattage vs. Cooler TDP: Why It Matters
When selecting a cooler, the two key numbers to focus on are your processor's wattage
and the cooler’s TDP (Thermal Design Power). Wattage indicates how much power your CPU
consumes, and TDP tells you how much heat your cooler is designed to handle. For
high-performance processors, you want to make sure your cooler’s TDP can handle the heat
output of your CPU. A mismatch here could lead to overheating, throttling, or even
hardware failure.
Choosing Between Air Coolers and AIO Liquid Coolers
Now, let’s get into the two main types of coolers you’ll encounter: air coolers and AIO
(All-in-One) liquid coolers.
Air Coolers: The Budget-Friendly Option
Air coolers are the go-to choice for many because they’re generally cheaper and easier
to maintain. They use a large heatsink and a fan to dissipate heat. While they’re more
than adequate for most systems, they do have their limitations when you push your CPU to
its limits. For high-end systems that require extra cooling, air coolers might not
always be enough, but for mid-range builds, they’re a solid, cost-effective
option.
AIO Liquid Coolers: The High-End Choice
AIO liquid coolers are the premium option for high-performance systems. These coolers
use a closed-loop liquid system to transfer heat away from the CPU, offering superior
cooling performance. However, they do come with a trade-off: limited lifespan. While
they can cool your system more efficiently, they require more maintenance over time and
are prone to pump failure after a few years. It’s worth noting that they also tend to
cost more and are a little trickier to install.
After Installation: Keep an Eye on Temps
Once you’ve installed your cooler, make sure to check your temperatures regularly,
especially during heavy usage. Most modern CPUs have thermal throttling mechanisms in
place, but it’s still a good idea to monitor things closely, just to be safe. If your
temperatures are still too high, you might need to tweak your cooler setup or consider
upgrading to something more powerful.
Watch Out for Dust Accumulation
Another consideration when using any cooler, whether air or liquid, is dust. Over time,
dust can accumulate on fans and heatsinks, reducing the efficiency of your cooler. It’s
important to clean your cooler regularly to ensure your system stays cool and runs
efficiently.
Summary: The Right Cooler for the Job
When choosing a CPU cooler, make sure you’re matching the cooler’s TDP with your
processor’s power needs. Air coolers are a budget-friendly option, while AIO liquid
coolers offer superior performance for high-end systems—but they come with a limited
lifespan. After installation, always check your temps and keep an eye on dust buildup to
ensure your system stays cool and running smoothly.

Shelby
#0048 Windows S Mode
February 11, 2025
This blog post was enhanced
with AI on 2/11/25.
What Is Windows S-Mode?
Windows S-Mode is actually a streamlined version of Windows 10 (and 11) that comes
pre-installed on selected NEW computer models. It's designed to offer enhanced security
and performance. This "locked-down" version of Windows will only allow apps from the
Microsoft Store. While this offers certain benefits, it also comes with some
notable drawbacks. Let’s break it down.
Pros of Windows S-Mode
Enhanced Security
By limiting apps to only those in the Microsoft Store, Windows S-Mode significantly
reduces the risk of downloading malicious software. Since apps from the Microsoft Store
are vetted by Microsoft, the chance of encountering a virus or malware is greatly
minimized.
Improved Performance
S-Mode is designed to use fewer system resources, which can result in faster boot times
and smoother performance for light computing tasks, especially on budget
devices.
Simplified Experience
With fewer options for customizing and installing software, Windows S-Mode offers a more
straightforward user experience. For those who just need to use their computer for basic
tasks (like browsing, streaming, or working in Microsoft Office), it can feel less
overwhelming.
Better Battery Life
On devices like laptops and tablets, the reduced resource usage and restrictions on
background processes can lead to longer battery life.
Cons of Windows S-Mode
Limited App Compatibility
The biggest downside of Windows S-Mode is its app limitation. Popular software like
Chrome, Zoom, and many other programs aren’t available in the Microsoft Store, meaning
you can’t install or use them. If your work or leisure relies on these programs, S-Mode
could feel very restrictive.
Inability to Install Antivirus/Antimalware
While Windows S-Mode provides some built-in protection with Windows Defender, you won’t
be able to install third-party antivirus or antimalware tools. This can be a dealbreaker
for users who prefer additional layers of security.
Limited Customization
Many users enjoy customizing their devices with settings, apps, or even different
browsers. Windows S-Mode restricts a lot of these freedoms, which could be frustrating
for power users who like to tweak their system to fit their needs.
Harder to Switch Out of S-Mode
While you can switch out of S-Mode to get full Windows functionality, it's not always
the smoothest process, and once you make the switch, you can't go back to S-Mode. This
might be a hassle for users who aren’t sure whether they need the restrictions.
Is Windows S-Mode Right for You?
If you're a casual user who only needs the basics (like browsing, Office apps, and
streaming) and values security, then Windows S-Mode might be a great fit. However, if
you rely on specific software that’s not available in the Microsoft Store, or you want
more control over your system, you might want to reconsider using S-Mode.
Ultimately, the decision to use Windows S-Mode comes down to how much flexibility you
need and how much you prioritize security and performance over customization.

Shelby
#0047 Missing Google Reviews
February 10, 2025
If your business has a website, I encourage you to start checking the number of your
Google reviews daily. It's a good idea to take screenshots so you can check to see if
anything is missing!
Google's algorithm has been removing LEGITIMATE reviews at random. I lost one Sunday and
3 more on Monday. These were all from good, local clients and none are spam. I looked
into it and apparently its a widespread problem for many businesses. Some online
commenters have said they have lost anywhere from a handful to hundreds of reviews
overnight!
The loss of reviews is a considerable loss to any business, but it hurts the small
business even more. The number of reviews is a big factor that Google uses to rank
listings. Your business needs to be in the top 3 on Google or at least on Page 1.
Otherwise, your not being seen. Nobody looks at page 2 of Google search results.
Remember that positive reviews can account for a significant part of your business. If a
business has a small number of reviews or bad reviews, the potential customer will click
on your competitions listing if they appear to be the better choice.
OPTIONS
UPDATE! 2/11/25 - IT MAY ONLY BE A SHORT TERM TECHNICAL
GLITCH
Sometimes the review count will go down. However, if you manually count your reviews,
you will find that all of your reviews are in fact still there. All you can do is wait
until Google fixes the review count.
Reference:
>> ARTICLE FROM SEARCH ENGINE LAND
GOOGLE DISPUTE PROCESS
This can be used to argue your case. This can be found by logging into the Google Search
Console for your website. However, they want you to provide information on the missing
reviews. Few of us keep copies of the reviews showing the username and what was said in
each review. We shouldn't need to! This is where the aforementioned screenshots are
beneficial! The process may or may not work and it takes considerable time.
DETERMINE WHAT REVIEWS ARE MISSING
Kindly ask the client to post a new review.
GET NEW BUSINESS
New clients will lead to new reviews. Depending on your line of business, this may be
easier said than done.
DO NOT BUY PAID REVIEWS
Google sees these as a violation of terms, and they will likely remove them anyway. This
is cheating and just a waste of money. It could push your site down in the
listings.
PLEASE HELP REPLACE OUR MISSING REVIEWS!
Please click the link below to help us out by leaving us a 5-Star review:
>> REVIEW MEYER COMPUTER ON GOOGLE


Shelby
#0046 My Thoughts on Antivirus Software
February 7, 2025
This blog post was enhanced
with AI on 2/7/25.
There are some antivirus programs I usually don’t recommend. Let me be clear—these
programs will provide solid protection. However, many of the well-known antivirus brands
have become overly bloated. They're trying to offer additional (more expensive) versions
of their software, with extra features that you don’t actually need. These extra
features have the negative side effect of slowing down your computer because they
consume extra system resources. On the other hand, if you go for the cheapest option,
you’ll be bombarded with pop-ups nagging you to buy even more of these unnecessary
features. If you have an older computer, these antivirus programs can make it even
slower.
These anti-virus programs aren't bad but I would not recommend them for performance
reasons.
- Norton
- McAfee
- AVG (both the free and paid versions)
- Avast! (both the free and paid versions)
NOTE: Avast was sued by US Government for user privacy violations
All you really need is basic antivirus or antimalware protection.
You (probably) don’t need:
- System optimization tools There are better, free programs that do the same thing.
- Driver updaters Check out Blog Post #40 for a detailed explanation.
- Defragmenters SSDs don’t need defragmenting. If you have a regular hard drive, you can use the built-in tool in Windows.
- VPNs This is a personal choice. In my opinion, most people don’t need a VPN.
- Special web browsers Browser programs like the one Norton offers don’t really add anything useful.
- Junk file cleanup tools You can clean up junk files using built-in Windows tools.
- Malwarebytes This works well for older computers. It’s a leaner program that still provides great protection.
- Bitdefender This is a good option for newer computers. It offers better protection, but it uses more system resources.
- Windows Defender Surprisingly, this is actually a good choice now. It’s become much better over the years.
Whatever antivirus program you choose, do not use multiple antivirus programs at once.
Check out Blog Post #11 for a detailed explanation.

Shelby
#0045 Can't Reach A Specific Website?
February 4, 2025
If your internet is working and you can't get to a single website, you could try the
following things. Any one of these could be the issue. Use process of
elimination.
- Temporarily turn off your security software & test.
- Temporarily turn off your firewall & test.
This could be the rules within your Windows firewall or a hardware firewall. - Temporarily turn off your VPN if your using one & test.
- Try a different DNS provider & test.
Your current provider could be filtering out websites.
DNS is a very common source of problems.
Reference Blog Post #39 for a list of alternate DNS servers. - Use the TRACERT command to see if you have a path to the website.
- Try turning off IPv6 on your router and computers
Most software doesn’t support IP6. It was created several years ago but few people actually use it. It can be disabled. - Clear your web browser cache & test
- Reset your web browser & test
- Try your website from a different computer.
- The website your trying to reach could be down or having a problem.

Shelby
#0044 Computer Security Terms
February 3, 2025
There is a lot of terminology when it comes to computer security that you many not be
familiar. These terms are often used incorrectly. Some people simply refer to most
everything as a virus which is incorrect. The definitions provided here should help to
clarify the differences and provide some examples.
Computer Virus
A piece of code that is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data. Once created, a virus spreads
by itself through various methods and will continue to spread until stopped by some type
of security software.
Example: The early viruses were harmless pranks. The virus would do things like turn
your screen upside down, or a video effect to make the screen appear to melt.
Example: A virus that deletes your files or entire drive.
Example: A virus that changes Windows to make it vulnerable to more viruses.
Example: Years ago there was a Microsoft Word virus that messed with the spell
checker. It would randomly transpose letters in your documents making you look like
a bad speller. It would do things like replace every letter M with the letter
Q.
Spyware
Software that enables a bad actor to covertly obtain information found on another
persons's computer by secretly transmitting data from a victims computer. This is often
used in conjunction with a virus that spreads the spyware.
Keylogger
A type of malware or hardware that records a user's keystrokes and sends them to a
hacker or scammer.
Example: A keylogger may record the keystrokes used when you type your password or
credit card or even a sensitive email. It records and/or sends that information back
to the person who placed it there.
Ransomware
A type of malicious software designed to block access to a computer system until a sum
of money is paid. This is one of the worst things you may encounter.
Example: Ransomware has been used to attack hospitals by encrypting all medical and
billing records, effectively shutting down the facility until the ransom is
paid.
Adware
Software that automatically displays or downloads advertising material (usually
unwanted) when a user is online.
These are often displayed as popups that come up repeatedly. They try to get you
to buy something or will have you call a number that leads to a social engineering
attack. Adaware can also lead to spam email.
Malware
Software that is specifically designed to disrupt, damage, or gain unauthorized access
to a computer system. These are often FAKE software programs that the user installs
thinking its something useful. The software then reports back to the person that created
it with whatever the Malware was designed to do.
Example: A fake browser tool bar that looks for low prices & discounts on shopping
websites.
Example: A fake antivirus program that looks convincing but its actually harming
your computer.
Example: A computer game that is actually a game but it does unwanted things in the
background.
Cloning
This typically happens on social media. A scammer will create a new account on Facebook
or other social media using the same name and profile picture as someone else. The
person being cloned is NOT the victim. Then the scammer will befriend the same set of
friends by sending friend requests. At some point they will begin a chat (pretending to
be the person they cloned) saying that they received a great deal purchasing some
product or service. They claim they can get you the same deal if you give them money.
Some people fall for it because it's coming from a account with a friends name on
it.
Hacked, Hacking
In cybersecurity, hacking is the act of identifying and exploiting weaknesses in a
computer system or network to gain unauthorized access to data. This is what you often
see on TV or in the movies.
Comment: This is probably the least likely and the most difficult way of getting into
your computer.
Social Engineering
A psychological attack that uses manipulation to trick victims into giving away
sensitive information or performing actions that compromise security.
(It's basically a con game over the phone or by email. Someone will attempt to talk you
out of a password, Account information, into sending them bitcoin, gift cards, or even
plane tickets using some type of scam.)
Comment: This is one of the most common ways to get into your computer as its MUCH
easier than hacking.

Shelby
#0043 What is Overclocking?
February 2, 2025
This blog post was enhanced
with AI on 2/2/25.
Understanding CPU Overclocking: A Closer Look at Pushing Your Processor’s
Limits
In the world of PC enthusiasts and gamers, CPU overclocking is often a topic that sparks
intrigue and excitement. The practice of overclocking is not limited to the world of
professional builders and hobbyists, as it can have a significant impact on performance.
But what exactly is CPU overclocking? In this article, we'll break down the concept,
explore the benefits and drawbacks, and provide an analogy to help explain this
practice.
What is CPU Overclocking?
CPU overclocking refers to the process of increasing a processor’s clock speed beyond
the manufacturer’s recommended specifications in order to boost its performance. The
clock speed, measured in gigahertz (GHz), determines how many cycles a CPU can perform
per second. By overclocking, users push the CPU to operate at a higher frequency, which
can result in faster processing times and an overall performance increase in certain
tasks.
However, this increase in performance comes with potential risks, including heat
generation, instability, and voiding warranties, all of which must be carefully
managed.
The Car Analogy: Overclocking a CPU is Like Tuning a Car Engine
To understand the concept of overclocking, imagine your CPU as a car engine. When a car
is designed and built, it’s tuned to operate optimally at a certain speed. Let’s say
that the engine is designed to go 100 miles per hour, but with some modifications, you
can make the engine run faster—perhaps reaching speeds of 120 miles per hour.
However, just like in the world of car engines, pushing your CPU beyond its designed
limits requires a few important adjustments. In the car analogy, you might need to
upgrade the exhaust system to deal with extra heat or install a turbocharger to handle
the increased power. Similarly, when overclocking a CPU, additional cooling solutions
(like better fans or liquid cooling) may be necessary to avoid overheating, and
stability must be ensured through careful tweaking.
Ultimately, while overclocking your CPU can result in faster performance, just like
tuning a car to go faster, there are trade-offs in terms of heat, longevity, and
risk.
All AMD Ryzen CPUs Can Be Overclocked
One of the standout features of AMD’s Ryzen processors is their overclocking potential.
Almost all Ryzen CPUs are unlocked, meaning that users can freely adjust the clock
speeds for improved performance. This flexibility makes AMD Ryzen a popular choice for
enthusiasts who want to extract every bit of power from their processors.
Whether you’re using a Ryzen 5, Ryzen 7, or Ryzen 9, you can safely overclock most
models to gain a performance boost, assuming you have the right cooling solutions in
place. The ability to overclock can lead to better performance in gaming, rendering, or
other CPU-intensive tasks.
What Intel Processors Can Be Overclocked?
While AMD has a more straightforward approach to overclocking with its unlocked
processors, Intel has been a bit more selective. To overclock Intel processors, you need
to make sure that the CPU is part of Intel’s “K” or “KF” series. For example, the Intel
Core i9-13900K or the Core i7-13700KF are unlocked processors that can be
overclocked.
Processors like the Intel Core i5-12600K or i7-10700K also offer overclocking
capabilities. However, Intel’s non-K models, such as the standard i5 or i7, typically
come with locked multipliers and cannot be overclocked.
If you're planning on overclocking an Intel processor, be sure to select one of these
specific models, as others will not have overclocking potential.
Benefits of Overclocking a Processor
Improved Performance: The most obvious benefit of overclocking is
the performance increase. When you raise the clock speed of your CPU, it can execute
more tasks per second, making your computer faster overall. This can be especially
noticeable in gaming, video editing, and tasks that require heavy computational
power.
Cost Efficiency: Overclocking can be a way to get more performance
without having to purchase a more expensive, higher-end CPU. By overclocking a mid-tier
processor, you may be able to achieve near-high-end performance, which could save you
money in the long run.
Customization and Control: Overclocking allows you to tailor your
PC’s performance to suit your specific needs. Whether you want more power for gaming or
for content creation, overclocking offers users more control over how their system
behaves.
Drawbacks of Overclocking a Processor
Increased Heat Generation: As you push your CPU to run faster, it
generates more heat. Without proper cooling solutions—like high-performance air coolers
or liquid cooling systems—your CPU could overheat, leading to potential thermal
throttling, crashes, or even permanent damage.
Reduced CPU Lifespan: Running a CPU at higher speeds than its
original design intended can result in increased wear and tear. Over time, the
additional stress can reduce the processor’s overall lifespan, making it less reliable
in the long run.
System Instability: Overclocking can sometimes cause instability,
leading to crashes, freezes, or blue screens. Achieving a stable overclock requires
extensive testing and fine-tuning, and even then, there’s no guarantee that your system
will remain completely stable in all situations.
Void Warranties: Many manufacturers have strict policies when it
comes to overclocking, and in most cases, overclocking a CPU will void its warranty.
This means that if something goes wrong and the processor is damaged, you’ll likely have
to pay for repairs or replacements out of pocket.
Power Consumption: Overclocking often increases the amount of power
that your CPU requires. This could lead to higher electricity costs and may also place
extra strain on your power supply unit (PSU), potentially leading to instability if the
PSU isn’t sufficient.
Conclusion
CPU overclocking is an exciting and rewarding way to squeeze more performance out of
your processor. By increasing clock speeds, you can enjoy faster computing, whether for
gaming, multitasking, or resource-heavy tasks. However, overclocking comes with risks
like overheating, system instability, and potential hardware damage. It’s essential to
weigh the benefits against the drawbacks, and always ensure that you’re using the proper
cooling solutions and settings to keep your system running smoothly.
Remember, overclocking is not for everyone, and it requires a good understanding of how
your hardware operates. But for those who love pushing their systems to the limit, it
can be an enjoyable and worthwhile experience.

Shelby
#0042 Choosing A Processor
January 28, 2025
I am often asked by clients that are looking to purchase a new computer to explain the
different processors. This is intended to be a straight forward explanation intended for
the average consumer and won't go into a bunch of technical details.
Intel and AMD are the 2 major manufacturers of processors. Both of them have a numbering
scheme. You will see things like Ryzen 3, Ryzen 5 Ryzen 7 and Ryzen 9. or Intel Core I3,
I5, I7 and I9. This denotes the processing power as well as the price level. The higher
the number, the faster the processor and the more expensive it becomes.
I have found that using car analogy's work well for explaining certain computer topics.
In this case, the processors can be likened to car engines.
Core i3 or Ryzen 3 - GOOD
Comparable to a 4 cylinder car - Used for basic tasks.
Note: Ryzen 3 has been discontinued.
Core i5 or Ryzen 5 - BETTER
Comparable to a 6 cylinder car - This is the most common (mainstream/mid-range)
processor.
Note: This is the group most of my clients pick.
Core i7 or Ryzen 7 - GREAT
Comparable to a 8 cylinder car - Used for higher end tasks and gaming.
Note: This is the group I pick from for my personal use.
Core i9 or Ryzen 9 - THE BEST
Comparable to a 10 cylinder car - Intended for power users, engineering, graphic design
and hard core gaming.
Within each of these 4 levels, there will typically be over a dozen choices, each with
an additional number. Normally, the higher the number, the faster the processor.
MOST COMPUTERS WE SELL ARE IN THE 5 OR 7 SERIES.
Lower end processors do exist. I would NEVER recommend anything like an Atom processor
or a Pentium processor which are found in may Chromebooks. They are simply too
underpowered to provide a good user experience.
High end processors also exist. These are typically used in very expensive workstations
and servers. These would include the Intel Xeon line and AMD Threadripper and Epyc
lines. These are beyond the scope of this article.

Shelby
#0041 Spinning Rust vs SSD
January 25, 2025
Computers over a certain age will have a mechanical harddrive. It involves one or more
spinning platters and a read/write head on the end of an arm. If you open one, it looks
like an old record player on the inside. The drive motor will spin the platter into
position and the head will read a single block of data. As it continues spinning,
each rotation allows it to read another block. It does this over and over as
needed. A file can be a single block or thousands of blocks. This is a slow process and
it isn't fast enough to keep up with today's modern processors. The drives have motors
and consume more power. They are sensitive to movement such as drops and sudden
impacts. It's possible for large magnets can scramble the data. The drives are
hermetically sealed (air tight). If air gets inside, they can rust from the humidity.
Hence the term 'spinning rust'. Any defects on the platters will cause retries,
which are perceived as a slow drive or will cause data errors. Common drive capacities
within the last 5-7 years are are 500G and 1TB.
Inside of a mechanical harddrive
A Solid State Drive (SSD) is new technolgy with many advantages. An SSD is comprised
entirely of computer chips. It has no moving parts. It's physically smaller and uses
less power. Less power consumption means that laptops batteries will last longer. There
is nothing magnetic to get scrambled. All computers manufactured today use an SSD as the
drive for the main operating system. Common drive capacities within the last 5-7 years
are are 500G, 1TB and 2TB. An SSD is still more expensive than a spinning harddrive, but
the speed benefits far outweight the cost. This represents a huge improvement over
spinning drives.
SSD's come mainly in 2 forms for home computers. A SATA SSD is intended to be used when
upgrading an older desktop or laptop computer that originally had a mechanical /
spinning drive. They are the exact same size as a 2.5 inch laptop harddrive. It can
connect to the same connector and uses the same SATA interface. It's the intermediate
option to upgrade a computer that lacks an NVME port. Using one in a desktop will
normally require a proper mounting bracket.
SATA
SSD
A NVME drive is a different type of SSD. It used the same general technology but uses a
different connection found directly on the motherboard. This connection ties directly
into the PCIE bus It's capable of even greater speeds than the SSD.
NVME
SSD
There is still a use case for mechanical drives. New high capacity drives are still
being developed. They are being used to provide MASS storage at a very economical price.
At the time of this article, there are spinning drives that will hold as much as 30TB.
This is great option for files that are less frequently used.
DISCLAIMER
• Ideas from articles typically come from personal experience and customer questions.
• Meyer Computer has not accepted payment from any company in exchange for a review or a blog
post.
• All products were purchased with private funds and without the knowledge of any
manufacturer.
• All opinions are based on personal experience with a product, service or company.
• We do our best to be factual. However, mistakes can and do occur. We reserve the right to
make corrections to any article at any time.
• Any complaints about an article will be given consideration and the article may be changed
accordingly.
• There are 4 types of articles on this website:
1. Human authored, then spell and grammar checked by MS Word.
2. Human authored, then AI enhanced with ChatGPT.
3. Human outlined, then written with ChatGPT.
4. Completely written with ChatGPT.