ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Our Comprehensive Guide to Purchasing a New Computer, Part II

Our Comprehensive Guide to Purchasing a New Computer, Part II

In part two of our desktop buying guide, we’ll focus on RAM, or random access memory. Some users have difficulty understanding this, so we’ll do our best to make sure it’s easy to grasp and apply to your own purchasing habits. You’ll learn how to make the best decisions regarding how much RAM your device will need.

The amount of RAM in your device, or random access memory, is not the same as the amount of data that a computer can store. RAM is used to temporarily store data so it can be recalled without pulling it from the computer’s storage. Think of it like short-term memory pulled from a human’s brain. You’ll have options for both high-end and low-end RAM, so it’s important that you find the best solution for your needs. Your need for RAM will be based on how much needs to happen at once. The CPU handles instructions and processes the data that the RAM holds, meaning that the more RAM is available, the larger the amount of data that the CPU can store, and the faster the CPU can process it. The two work together to make your computing experience as smooth as possible.

How Much RAM Does Your Computer Need?

Computers these days have limited options for RAM. There are many brands to choose from, but the important thing to remember is that manufacturers will take care of this aspect for you. It’s only truly important if you are building your own computer. Despite this, it can be complicated. This guide might simplify things a bit, but it will at least help you determine the speed and amount of RAM needed by your device.

  • Skimping the budget: The smallest acceptable amount of RAM in a Windows 10 machine is 4 GB. You might be able to get Windows to run on less, but we don’t recommend it, as this is the bare minimum for light document editing and Internet browsing.
  • Low-end: Most reasonable budget PCs will start at around 8 GB of RAM, which is more than enough to handle the operating system, editing documents, photo browsing, surfing the Internet, and many other tasks.
  • Mid-range: 16 GB is quite achievable for many businesses, even on a budget. The price difference isn’t terribly noticeable, but the investment will be well worth it. 16 GB of RAM is a nice entry point for gaming systems, and while 16 GB isn’t necessarily the catch-all goal, it will give you the most power for your money.
  • High-end: The ceiling for RAM is quite high, but the cost goes along with it. For example, the new Mac Pro can go up to 1.5 TB of RAM, which is about 1500 GB of RAM, but the price is estimated at about $20,000. A gaming rig, video editing system, or server might need more than 16 GB of RAM, but at that point, we recommend working with a professional to determine the best path forward.

Wrapping Up

Your device might be able to update at a later date, but for the initial implementation, we recommend aiming for no less than 8 GB. Realistically, you should try to find options at around 16 GB, but we realize that it’s not always possible.

Does your business need help implementing or acquiring new hardware? Give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 11 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Data Recovery Managed IT Services Communication Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Managed Service Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Workplace Strategy Managed IT services Gadgets Networking Windows App Virtualization Server Spam WiFi Information Remote Bandwidth Encryption Business Technology Mobile Device Management Blockchain Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget History Gmail Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Help Desk Hacking Cost Management Remote Computing Document Management Patch Management Hacker Vendor Save Money Remote Monitoring Compliance Voice over Internet Protocol Employer-Employee Relationship IT Management Training Data loss Hiring/Firing Outlook Password Legal Data storage Money Applications Customer Service Unified Threat Management Firewall Project Management Vulnerabilities Augmented Reality Search... Word Best Practice BYOD Mobile Office IBM Website Computing Retail Managed Services Alert Vendor Management Hard Drive How To The Internet of Things User YouTube Twitter VPN Law Enforcement Update Laptop End of Support Printer Chrome Data Breach Paperless Office Antivirus Maintenance Social Mobile Computing Sports Travel SaaS DDoS Virtual Reality Windows 11 Social Engineering Cryptocurrency Marketing Black Market Monitoring Running Cable Healthcare iPhone Cleaning Education Cortana Websites Robot Remote Workers Content Filtering Mobility Storage Meetings Windows 7 Free Resource Router Google Maps Scam Chromebook Drones HIPAA Excel Solutions Automobile Integration Tech Terms Images 101 Display How To Wireless Technology Microchip Managed IT eWaste Digital Virtual Assistant Flexibility Employees Taxes Avoiding Downtime Downtime Safety Identity Theft Hack Notifications Holidays Processor Unified Communications PowerPoint Virtual Desktop Administration Cooperation Experience Google Docs Bluetooth Video Conferencing Presentation Physical Security Distributed Denial of Service Specifications Virtual Machines Office Tips IT Consultant Memory Computer Repair Private Cloud Multi-factor Authentication Start Menu Customer Relationship Management Professional Services Disaster Downloads Computer Care Co-Managed IT Entertainment Politics Vulnerability Saving Time Settings Lithium-ion battery Machine Learning Software as a Service Managed Services Provider Data Protection Computers Bitcoin Virtual Private Network Solid State Drive Processors Telephone Current Events Social Network FinTech Visible Light Communication Corporate Profile Screen Reader IT Assessment Point of Sale Reading Monitors Knowledge Data Analysis CES Television Security Cameras Windows 8 Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Shortcuts Customer Resource management Organization Cabling Devices Cyber security Advertising Tablet Smart Devices G Suite Tip of the week Relocation Public Speaking Displays Fileless Malware Work/Life Balance Mouse Tech Support VoIP Gamification Remote Working Business Owner Tracking Company Culture Streaming Media Be Proactive Keyboard Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Web Server Transportation Hard Drives Directions Digital Security Cameras SharePoint intranet Content Digital Payment Desktop Wasting Time In Internet of Things Modem Workplace Strategies Wireless Hacks Shortcut Network Congestion Electronic Medical Records Worker Accountants eCommerce Environment Access Database Surveillance Reliable Computing Heating/Cooling Writing Videos Social Networking Time Management Inbound Marketing Public Cloud Managing Costs Windows XP SSID Health IT Equifax Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Scalability Administrator Text Messaging Proactive IT Username File Sharing Virtual Machine Startup Optimization Freedom of Information Smart Technology Bring Your Own Device Redundancy Reviews Electronic Payment Navigation 2FA Cache Addiction email scam Teamwork Music Unified Threat Management Data Storage Workers Mobile Security Hypervisor Legislation Phone System News Medical IT Staffing User Tip Shopping IP Address Printing Evernote Paperless Network Management CCTV SQL Server Botnet Touchscreen PCI DSS Licensing Emails Humor Computer Malfunction Fake News Supply Chain Rental Service Micrsooft Emergency Proxy Server Gig Economy Flash Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Telephone Systems Business Growth Management Regulations Compliance Samsung Device security Managed IT Service Computer Accessories Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Recovery Competition Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards LiFi Banking Entrepreneur Google Wallet Error Financial Data Tablets IT Scams Documents Messenger Application Deep Learning Bookmark Risk Management Google Calendar Term Google Apps Business Intelligence Download Supercomputer Piracy Business Metrics Hosted Solution Virus Telework HTML Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Securty Books Browsers Smartwatch Domains Language Comparison Google Play Society Google Drive Upload Procurement Troubleshooting Software License

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?