Tag: hardware

Ask a question

Join Now or Sign In to ask a question.
dthomas
19 hours ago

How do I setup multiple monitors using Windows 8.1?

ttopp
3 days ago

I got a refurbished Lenovo laptop recently, and one of the keys on the keyboard isn’t working. I blew it out with canned air, and there...

Tags: key, keyboard, laptop |
3 Answers |
zeeman
3 days ago

I’m sure this is sounds silly to Mac users, but I grew up with C64s and DOS before moving onto Windows and I don’t have a lot of experience with Macs....

2 Answers |
cuetip
3 days ago

My monitor is nice a large and clear, but one corner has a problem with backlight bleed. Whenever the image on the screen is dark, it has a light corner...

ernard
3 days ago

If there are no moving parts in a CPU, thus removing friction from the equation, what is happening that causes it to get hot when it is under a heavy load...

Tags: cpu, heat |
2 Answers |
mandril
3 days ago

In the CPU “arms race” one thing that hasn’t seemed to be increase much over the past few years is CPU speed. In fact, some older PCs have CPUs with faster...

2 Answers |
blackdog
3 days ago

Are the terms pretty much interchangeable, or is there an actual hardware difference between the two?

Tags: PC, workstation |
2 Answers |
bcastle
3 days ago

I just spilled a can of Coke on my PC's keyboard. I’ve unplugged it and have it upside down on paper towels. What else can I do to clean it so that I don’t...

tganley
4 days ago

You know those large McDonald's coffees, the really big ones? I knocked one of those over on my keyboard this morning. On the upside, I...

Tags: keyboard, repair, spill |
6 Answers |
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money's coming from. They know how to get there from here, but it won't be a quick trip.
Oracle is the latest in a string of firms getting a custom fit instead of off the shelf.
IT leaders need to learn how to manage the evolving legal, privacy and compliance issues of SMAC contracts.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Nearly 90 percent of IT executives expect tech spending to either increase or hold steady. And only 12 percent report budget decreases.
Look to Vista for how Redmond will treat Windows 8 as it moves on to the next bright, shiny OS.
Dennis Technology Labs says it tested it because of marketing claims for it; Malwarebytes says free version of product is just a clean-up tool.
A bill that allows consumers to unlock their cellphones for use on other carriers passed its last hurdle in Congress on Friday, opening the way for it to become law once it is signed by President Barack Obama.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.