facebook linkedin twitter

Computerware Blog

Our Comprehensive Guide to Purchasing a New Computer, Part II

Our Comprehensive Guide to Purchasing a New Computer, Part II

In part two of our desktop buying guide, we’ll focus on RAM, or random access memory. Some users have difficulty understanding this, so we’ll do our best to make sure it’s easy to grasp and apply to your own purchasing habits. You’ll learn how to make the best decisions regarding how much RAM your device will need.

The amount of RAM in your device, or random access memory, is not the same as the amount of data that a computer can store. RAM is used to temporarily store data so it can be recalled without pulling it from the computer’s storage. Think of it like short-term memory pulled from a human’s brain. You’ll have options for both high-end and low-end RAM, so it’s important that you find the best solution for your needs. Your need for RAM will be based on how much needs to happen at once. The CPU handles instructions and processes the data that the RAM holds, meaning that the more RAM is available, the larger the amount of data that the CPU can store, and the faster the CPU can process it. The two work together to make your computing experience as smooth as possible.

How Much RAM Does Your Computer Need?

Computers these days have limited options for RAM. There are many brands to choose from, but the important thing to remember is that manufacturers will take care of this aspect for you. It’s only truly important if you are building your own computer. Despite this, it can be complicated. This guide might simplify things a bit, but it will at least help you determine the speed and amount of RAM needed by your device.

  • Skimping the budget: The smallest acceptable amount of RAM in a Windows 10 machine is 4 GB. You might be able to get Windows to run on less, but we don’t recommend it, as this is the bare minimum for light document editing and Internet browsing.
  • Low-end: Most reasonable budget PCs will start at around 8 GB of RAM, which is more than enough to handle the operating system, editing documents, photo browsing, surfing the Internet, and many other tasks.
  • Mid-range: 16 GB is quite achievable for many businesses, even on a budget. The price difference isn’t terribly noticeable, but the investment will be well worth it. 16 GB of RAM is a nice entry point for gaming systems, and while 16 GB isn’t necessarily the catch-all goal, it will give you the most power for your money.
  • High-end: The ceiling for RAM is quite high, but the cost goes along with it. For example, the new Mac Pro can go up to 1.5 TB of RAM, which is about 1500 GB of RAM, but the price is estimated at about $20,000. A gaming rig, video editing system, or server might need more than 16 GB of RAM, but at that point, we recommend working with a professional to determine the best path forward.

Wrapping Up

Your device might be able to update at a later date, but for the initial implementation, we recommend aiming for no less than 8 GB. Realistically, you should try to find options at around 16 GB, but we realize that it’s not always possible.

Does your business need help implementing or acquiring new hardware? Give us a call at (703) 821-8200.

Our Comprehensive Guide to Purchasing a New Comput...
Our Comprehensive Guide to Purchasing a New Comput...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 18, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Managed Service Provider Productivity Network Security Business Hosted Solutions Email Malware Saving Money IT Services Efficiency Computer IT Support Google User Tips Innovation Productivity Small Business Smartphones Mobile Devices Quick Tips Microsoft Office Business Continuity Gadgets VoIP Social Media Network Android Collaboration Data Backup Disaster Recovery Data Recovery IT Support Upgrade Mobile Office Server Virtualization Communication communications Mobile Device Management Smartphone Miscellaneous Phishing Ransomware Windows 10 Windows Tech Term Cybersecurity Facebook Operating System Unified Threat Management Vendor Management Holiday Remote Monitoring Passwords Apps Automation BYOD Users Remote Computing Managed IT services Mobile Computing Analytics WiFi BDR Mobile Device Outsourced IT Internet of Things Artificial Intelligence Managed IT Services Apple Data Management The Internet of Things Marketing History Browser Save Money Firewall Alert App Cloud Computing Encryption Big data IT Consultant Spam Office 365 Help Desk Two-factor Authentication Gmail Bandwidth Business Technology Office Maintenance Printer Content Filtering Windows 10 Health Going Green Bring Your Own Device Antivirus VPN Search Government Managed IT Virus Employer-Employee Relationship Cybercrime Tech Support Lithium-ion Battery Best Practice Information Technology Cost Management Hiring/Firing Training Hard Drives Budget Wireless Technology Outlook Windows 8 Saving Time Computers It Management Travel Managed Service Blockchain Education Recovery Update Networking Hacking Phone System Information IBM Money Document Management Healthcare Access Control Customer Service Law Enforcement Applications Hard Drive Twitter Intranet Humor Compliance Mobility Website Data Loss Data storage Avoiding Downtime iPhone Risk Management Value Password Legal Save Time Downtime Regulations Current Events Augmented Reality PowerPoint Proactive IT SaaS Running Cable File Sharing Administration Securty Windows 7 Wireless Data Security Google Maps DDoS Storage Patch Management Solid State Drive Social Engineering Flexibility Scam Black Market Word Retail Cryptocurrency Data Breach Laptop Business Intelligence Private Cloud Cortana Business Growth Excel Digital Digital Payment Project Management Telephony Hacker Websites Router Management Customer Relationship Management Machine Learning Telephone Systems Comparison Tablet Paperless Office Vulnerabilities Sports Company Culture User Computing Computer Repair Disaster End of Support Social Networking Hosted Solution Fax Server Robot Social IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Politics Virtual Reality Emails Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Google Docs Net Neutrality Pain Points Memory Monitoring How To eWaste Chrome Download Evernote Experience Monitors Virtual Assistant Cleaning Office Tips Computer Accessories Microchip Taxes Processors Start Menu Tech Terms Distributed Denial of Service USB Mobile Technology User Error YouTube Co-managed IT Trending Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings Mouse Public Cloud Vendor Uninterrupted Power Supply Virtual Desktop Webcam Processor Specifications Safety Text Messaging Vulnerability Lifestyle Statistics Bitcoin Programming Identity Theft Gamification Notifications CCTV Digital Signature Security Cameras Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Piracy Upload Business Metrics Computer Malfunction Navigation Thin CLient cache Television Best Practives switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Smart Phones Data Analysis Employees WannaCry Upgrades HTML Professional Services Fiber-Optic Database In Internet of Things Microserver Recycling Mobile Security GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Software License Trends Motion Sickness Best Available Keyboard Tech Leadership Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Integration Pirating Information Fileless Malware Hybrid Cloud Google Calendar Get More Done Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics VoIP Turn Key UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Printer Server Visible Light Communication Proxy Server Azure IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation Trojan IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Organize Content Management email scam Addiction Wi-Fi Free Resource Audit CIO Multi-factor Authentication Supercomputer HIPAA Upselling SSID Fake News Advertising Flash Environment Dark Web online Currency Migration Connected Devices Competition Processing Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet Managed IT Service Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel Webinar G Suite Drones Desktop Finance Hacks Physical Security Application Harddrive Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Employer/Employee Relationships Debate Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Business Cards External Harddrive Browsers Electricity Printing Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Virtual Machine Managing Stress Printers Hypervisor CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial

toner1