312-253-4321    Get SUPPORT

Alchetec Blog

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Are you looking to purchase a new desktop for your business (or for home)? We’ve put together this handy guide to help demystify the computer-buying process. This is the first part of five in our series, selecting the right CPU.

First, Determine the Computer’s Role

You can narrow down your search a whole lot just by deciding exactly what you want the desktop for. There are many major differences between a computer suitable for someone in your billing department and for someone who needs to edit video.

For the sake of this article, we’re going to focus a little more on the lower-to-medium end, because as you get into audio/video production or gaming, the roof can be raised to almost no limit.

Remember, You Can Usually Upgrade Down the Road, But...

A desktop computer that is designed for basic office work can usually be upgraded, but don’t expect to take a low-end desktop and upgrade it to a high-end gaming system. Laptops are a whole different story. Some can be upgraded a little, others can’t, but as a rule of thumb, assume you won’t be turning a low-end laptop into a high-performance rig.

Making Sense of the Specifications

When shopping around, you’ll typically see a few components listed on the desktop’s spec sheet. Let’s talk about one of the big specifications to pay attention to, the CPU.

CPU/Processor

The CPU determines, in essence, how much your computer can do at once and how quickly it does it. There are two brands you’ll run into; Intel and AMD.

Intel has tried to simplify this otherwise complicated specification by tiering out their CPUs, the Core i3, Core i5, Core i7, and Core i9. The higher the number, the more powerful the CPU is. AMD is starting to follow a similar path to simplify their naming convention, but both brands make both low-end and high-end CPUs. Let’s look at some of the most common you see today:

Intel Core i3 - This tier is okay for real low-end work. We’re talking editing documents, checking email, and surfing the web. The latest generation of Core i3 processors are strong enough to handle streaming video services like YouTube and Netflix without too much trouble.

Intel Core i5 - The i5 will do what the i3 can do a little faster, and you’ll have no problem streaming a little video, doing some light photo editing, and maybe playing a game or two if it isn’t too taxing on your system. This is a pretty solid choice for the typical office workstation.

Intel Core i7 - This is where the price starts to climb. Core i7 CPUs are geared towards high-end systems for video editing and gaming.

Intel Core i9 - The i9 tier is fairly new, and at this point is pretty overkill for what most people need out of their desktop. If you are building out a computer for 3D animation, rendering, gaming while streaming, scientific calculations, etc., then this might be the way to go, but the price tag for this CPU alone can be several thousands of dollars.

AMD Ryzen 3 - AMD’s low end model is, to simplify things, on par with the Intel Core i3. You’ll be able to edit documents and surf the web, but not a whole lot else without straining the system.

AMD Ryzen 5 - Conveniently enough, the Ryzen 5 is in about the same tier as the Intel Core i5. You’ll pay a little more than the Ryzen 3, and get some more performance out of your desktop. Expect to handle typical office work, stream video, and light photo editing and gaming.

AMD Ryzen 7 - Seeing a pattern? The Ryzen 7 is AMD’s answer to the Intel Core i7. Just like the i7, the cost of the CPU starts to climb pretty significantly compared to the lower-end models.

AMD Threadripper - Here’s where we get into overkill territory for most use. The Threadripper is designed for heavy loads like 3D animation, gaming while broadcasting your stream, and other intense computing that a typical workstation doesn’t tend to experience.

When Does the GHz Matter?
The nice thing about Intel and AMD arranging their CPUs into tiers is that you can almost always ignore the clock speed. When helping non-technical friends and family pick out a computer, I always tell them that the CPU speed, which is measured in gigahertz, is for nerds to care about. The higher the number, the faster the CPU, and the more it costs. Until you get to the point where you are building a server or high-end gaming PC, you can definitely just worry about the tiers instead of the GHz.

Does the Number of Cores Matter?
Cores are the number of processors built within the main processor. Typically, shoot for at least four cores unless you are on a serious budget. For gaming and video editing and higher-end tasks, more cores can start to matter, but even then, most of the time it caps off at eight. There are processors out there with dozens of cores, but typically these are designed for servers or specific situations.

One more tip: Usually, getting last generation’s CPU doesn’t save you much money, and as long as you get something recent you should be good. You don’t need to get bleeding edge or wait for the next line of CPUs to come out either, unless you are really trying to hit the very peak of high-end performance and are willing to spend top dollar to make it happen.

Next time, we’ll demystify other pain points of the desktop buying process! Keep in mind, if you need help purchasing computers for your business, don’t hesitate to reach out to Alchetec. You can call and talk to one of our experienced IT professionals at 312-253-4321.

Using the Private Cloud Adds Security to Your Data...
You Can Benefit from Productivity Consultations
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Network Security IT Services Malware Hosted Solutions Software Privacy Email Data Backup Hackers Data Outsourced IT Internet Computer Microsoft Data Recovery Business Managed IT Services Productivity Innovation Ransomware IT Support Tech Term Hardware Cloud Computing Business Continuity IT Support Mobile Devices Small Business Collaboration Backup User Tips Business Management Efficiency Google VoIP Paperless Office Managed IT Services Communication Android Remote Monitoring Phishing Windows 10 Upgrade Smartphones Save Money Internet of Things Data Management Smartphone Managed Service Provider Cybersecurity Workplace Tips Disaster Recovery Server Managed IT Encryption Passwords Communications Mobile Device Browser Office 365 Artificial Intelligence Social Media Windows 10 Holiday BYOD Quick Tips Applications Business Technology Wi-Fi Risk Management Facebook Government Employer-Employee Relationship Laptops Compliance Document Management Managed Service Saving Money Windows Telephone Systems Infrastructure Bandwidth File Sharing Tip of the week Automation Password Unified Threat Management Recovery Help Desk BDR Healthcare Antivirus Processor Vulnerability IT Management Scam Microsoft Office Analytics Project Management Virtualization Network Vendor Management SaaS Training Chrome Blockchain Information Data Security Firewall Wireless Data loss Mobile Device Management Tablet Bring Your Own Device Two-factor Authentication Files Office Hosted Solution Robot Money Storage Politics Apps Gmail App Maintenance Router Word Customer Relationship Management Virtual Reality Work/Life Balance VPN IT Service Website Going Green Miscellaneous Data Storage Regulations Mobile Security Digital Payment Computing Flexibility Alert Identity Theft Company Culture Licensing Software as a Service Printing Samsung Assessment Outlook Computers Patch Management Upgrades Unified Communications Uninterrupted Power Supply Mobility How To Chromebook Proactive Consultation Twitter Employees Redundancy Network Management The Internet of Things Management Display Health Smart Technology Net Neutrality Social Windows 7 Gadgets How To Machine Learning Remote Monitoring and Management RMM Remote Computing Server Management HIPAA Settings Big Data Monitors Electronic Medical Records Remote Workers Internet Exlporer Users Operating System Networking Access Control Customer Service IoT Cooperation Virtual Private Network Downtime Cache Network Congestion Taxes Hard Disk Drive Personal Information Bookmarks Social Networking Private Cloud Fleet Tracking Tech Terms Google Drive Star Wars Humor Features Wasting Time Statistics SharePoint Spam Mirgation High-Speed Internet Spyware Update Human Error Firefox Current Events Permissions Monitoring ROI Technology Laws Staff End of Support Gadget Authentication Mail Merge Database Management Break Fix Nanotechnology Cortana Hotspot Recycling Education Virus Favorites Teamwork Shortcut Solid State Drives Black Friday Motherboard Asset Tracking Theft Avoiding Downtime Techology Fraud Utility Computing Office Tips Disaster Electronic Health Records Database Bluetooth Downloads Migration Development MSP Permission Lenovo Projects Black Market Consulting Notes Heating/Cooling Unified Threat Management Operations Managing Stress WiFi VoIP Authorization Address GDPR Dark Web Screen Reader Software Tips Disaster Resistance Augmented Reality Language eWaste Computer Repair Crowdsourcing Conferencing Shared resources Technology Tips Options Cyber Monday Mobile Computing Apple OneNote Financial Time Management Cybercrime Notifications Cyberattacks Voice over Internet Protocol Multi-Factor Security Tech Support Chatbots Cables Botnet Test Superfish Wireless Technology 5G Return on Investment Physical Security Managed Services Provider PowerPoint Servers User Error IBM Wearable Technology Enterprise Content Management GPS YouTube Sports Safety Data Warehousing Smart Tech Unsupported Software Proactive IT Computing Infrastructure Meetings OneDrive Mouse Hacker Wireless Internet 3D Printing Google Maps Business Growth Employee-Employer Relationship Procurement Cost Management Dark Data Travel Read Only Hacking Google Calendar Identity Supercomputer History Point of Sale Professional Services Printer Vulnerabilities Social Engineering Tracking Telephony Wires Zero-Day Threat Microsoft Excel Connectivity Content Filtering Mobile Data Touchscreen IT Consulting Alerts Enterprise Resource Planning Corporate Profile Instant Messaging Manufacturing Comparison Employer/Employee Relationships Distributed Denial of Service Modem Automobile Security Cameras Hard Drive Solid State Drive Transportation Trending Legislation IT Budget Emoji WPA3 G Suite Cabling IT Solutions Processors E-Commerce Virtual Assistant Websites IT Technicians Search Geography Digital Backup and Disaster Recovery Bitcoin Remote Worker Data Breach Mobile Computer Care WannaCry Legal Law Enforcement Finance Hard Disk Drives Specifications Proactive Maintenance Managed IT Service Cookies USB Domains Students Regulation Staffing Sync Public Speaking IT Consultant Error CrashOverride Presentation Lithium-ion battery Mobile Device Managment Hiring/Firing Administrator Public Cloud Fun Information Technology Marketing Hacks Budget Competition Cleaning IP Address Motion Sickness Printers Hard Drives Relocation Emergency Mobile Office