Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Are you looking to purchase a new desktop for your business (or for home)? We’ve put together this handy guide to help demystify the computer-buying process. This is the first part of five in our series, selecting the right CPU.

First, Determine the Computer’s Role

You can narrow down your search a whole lot just by deciding exactly what you want the desktop for. There are many major differences between a computer suitable for someone in your billing department and for someone who needs to edit video.

For the sake of this article, we’re going to focus a little more on the lower-to-medium end, because as you get into audio/video production or gaming, the roof can be raised to almost no limit.

Remember, You Can Usually Upgrade Down the Road, But...

A desktop computer that is designed for basic office work can usually be upgraded, but don’t expect to take a low-end desktop and upgrade it to a high-end gaming system. Laptops are a whole different story. Some can be upgraded a little, others can’t, but as a rule of thumb, assume you won’t be turning a low-end laptop into a high-performance rig.

Making Sense of the Specifications

When shopping around, you’ll typically see a few components listed on the desktop’s spec sheet. Let’s talk about one of the big specifications to pay attention to, the CPU.

CPU/Processor

The CPU determines, in essence, how much your computer can do at once and how quickly it does it. There are two brands you’ll run into; Intel and AMD.

Intel has tried to simplify this otherwise complicated specification by tiering out their CPUs, the Core i3, Core i5, Core i7, and Core i9. The higher the number, the more powerful the CPU is. AMD is starting to follow a similar path to simplify their naming convention, but both brands make both low-end and high-end CPUs. Let’s look at some of the most common you see today:

Intel Core i3 - This tier is okay for real low-end work. We’re talking editing documents, checking email, and surfing the web. The latest generation of Core i3 processors are strong enough to handle streaming video services like YouTube and Netflix without too much trouble.

Intel Core i5 - The i5 will do what the i3 can do a little faster, and you’ll have no problem streaming a little video, doing some light photo editing, and maybe playing a game or two if it isn’t too taxing on your system. This is a pretty solid choice for the typical office workstation.

Intel Core i7 - This is where the price starts to climb. Core i7 CPUs are geared towards high-end systems for video editing and gaming.

Intel Core i9 - The i9 tier is fairly new, and at this point is pretty overkill for what most people need out of their desktop. If you are building out a computer for 3D animation, rendering, gaming while streaming, scientific calculations, etc., then this might be the way to go, but the price tag for this CPU alone can be several thousands of dollars.

AMD Ryzen 3 - AMD’s low end model is, to simplify things, on par with the Intel Core i3. You’ll be able to edit documents and surf the web, but not a whole lot else without straining the system.

AMD Ryzen 5 - Conveniently enough, the Ryzen 5 is in about the same tier as the Intel Core i5. You’ll pay a little more than the Ryzen 3, and get some more performance out of your desktop. Expect to handle typical office work, stream video, and light photo editing and gaming.

AMD Ryzen 7 - Seeing a pattern? The Ryzen 7 is AMD’s answer to the Intel Core i7. Just like the i7, the cost of the CPU starts to climb pretty significantly compared to the lower-end models.

AMD Threadripper - Here’s where we get into overkill territory for most use. The Threadripper is designed for heavy loads like 3D animation, gaming while broadcasting your stream, and other intense computing that a typical workstation doesn’t tend to experience.

When Does the GHz Matter?
The nice thing about Intel and AMD arranging their CPUs into tiers is that you can almost always ignore the clock speed. When helping non-technical friends and family pick out a computer, I always tell them that the CPU speed, which is measured in gigahertz, is for nerds to care about. The higher the number, the faster the CPU, and the more it costs. Until you get to the point where you are building a server or high-end gaming PC, you can definitely just worry about the tiers instead of the GHz.

Does the Number of Cores Matter?
Cores are the number of processors built within the main processor. Typically, shoot for at least four cores unless you are on a serious budget. For gaming and video editing and higher-end tasks, more cores can start to matter, but even then, most of the time it caps off at eight. There are processors out there with dozens of cores, but typically these are designed for servers or specific situations.

One more tip: Usually, getting last generation’s CPU doesn’t save you much money, and as long as you get something recent you should be good. You don’t need to get bleeding edge or wait for the next line of CPUs to come out either, unless you are really trying to hit the very peak of high-end performance and are willing to spend top dollar to make it happen.

Next time, we’ll demystify other pain points of the desktop buying process! Keep in mind, if you need help purchasing computers for your business, don’t hesitate to reach out to Central Technology Solutions. You can call and talk to one of our experienced IT professionals at 1-844-237-4300.

Using the Private Cloud Adds Security to Your Data...
You Can Benefit from Productivity Consultations
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions IT Services Email Network Security Malware Privacy Internet Data Hackers Software Data Backup Outsourced IT Productivity Managed IT Services Computer Innovation Microsoft Business IT Support Data Recovery IT Support Hardware Ransomware Mobile Devices User Tips Tech Term Efficiency Backup Cloud Computing Small Business Google Internet of Things Business Continuity Upgrade Managed IT Services Collaboration Managed Service Provider Windows 10 Business Management Communication Remote Monitoring Phishing Smartphone Android Paperless Office Disaster Recovery VoIP Smartphones Save Money Artificial Intelligence Social Media Data Management Windows 10 Windows Workplace Tips Encryption Managed IT Server Cybersecurity communications Browser Saving Money Help Desk Risk Management Mobile Device BYOD Managed Service Facebook Office 365 Mobile Device Management Holiday Quick Tips Wi-Fi Document Management Passwords BDR App Automation Laptops Applications Government Firewall Bandwidth Unified Threat Management Healthcare Employer-Employee Relationship Compliance Apps Robot Bring Your Own Device Gmail Going Green Business Technology Training Vendor Management Microsoft Office Network Password Recovery Analytics Virtualization Chrome IT Management Tip of the week Avoiding Downtime Scam Hosted Solution Antivirus Website Project Management Infrastructure Miscellaneous Money Data storage Telephone Systems Content Filtering SaaS Vulnerability Blockchain Information Wireless Big Data Processor File Sharing Files Settings Downtime Customer Service Apple Router Social Two-factor Authentication Politics Work/Life Balance VPN Virtual Reality Customer Relationship Management Computing Data Security Regulations Data loss Office IT Service Access Control Information Technology Operating System Printing Computers Mobility Storage Windows 7 Tablet RMM Unified Communications Remote Computing Users Spam Word WiFi Dark Web Flexibility YouTube Business Growth Redundancy Chromebook Private Cloud Proactive The Internet of Things Mobile Computing Software as a Service Tech Support Administration Hacker Digital Payment Remote Monitoring and Management Upgrades LiFi Maintenance Management Education Smart Technology Legal Networking Twitter Net Neutrality Current Events Patch Management Websites Identity Theft Wireless Technology IT solutions Licensing Remote Workers Virtual Private Network Display Network Management Internet Exlporer End of Support Health Sports IoT HIPAA Budget Assessment Bitcoin Server Management Cooperation How To Monitors Alert Mobile Security Electronic Medical Records Gadgets Machine Learning Consultation Outlook Monitoring Uninterrupted Power Supply Mouse Employees Professional Services Company Culture Google Drive How To Samsung Recycling Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Transportation Mirgation Tracking Development Employer/Employee Relationships Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Migration Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Wasting Time Smart Devices Operations Drones Enterprise Content Management Finance Firefox Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Deep Learning Network Congestion Solid State Drives Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Computer Repair Teamwork Virtual Desktop Technology Tips Chatbots Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Sensors Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes File Management Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Options Permission Processors Active Directory Travel Hard Drive Features Shared resources Comparison Identity Botnet GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Gadget Best Practice Mobile Favorites Mail Merge Update Marketing 5G Test Touchscreen Techology Buisness Windows Server Cache Electronic Health Records VoIP Sponsor OneDrive Specifications Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Legislation IT Technicians GPS High-Speed Internet Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Conferencing Address Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride Payment Cards Cameras Regulation Motion Sickness Administrator CCTV Relocation