Ten Tips for Getting the Most Out of Your Laptop - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Tips for Getting the Most Out of Your Laptop-10 Next

Virtual memory allows users to use their hard-disk drives (HDD) to run more concurrent applications than they would otherwise have the random access memory (RAM) for. The downside, though, is that the access speed of your typical HDD is magnitudes slower than that of RAM. With newer laptops appearing on the market sporting 4GB or more of RAM, light users may want to disable their virtual memory altogether. Paul is a mid-tier user, and the 6GB of RAM on his laptop is adequate for him to disable virtual memory with no negative repercussion — he’s not run out of RAM so far.

With an increasing number of users using laptops on an exclusive basis, Paul Mah thought it may be time to revisit the topic of getting the best experience from your laptop. He’s put together a number of quick tips and configurations highlighted in this slideshow.

 

More Slideshows:


Eight FREE BlackBerry Productivity Apps Top-rated free apps from the BlackBerry App World.

Top 10 Computer Malware Programs Old security holes are becoming increasingly popular among online criminals.


The Data Deduplication Revolution Data deduplication has evolved into an efficient, high performance technology.

 

Related Topics : Application Security, IT Process Management, Six Sigma

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.