When backed by a proper warranty and a return policy, a refurbished smartphone can save you a ton of cash over a brand-new model. But even knowing what a great deal a refurb phone can be, we're still a little surprised at just how popular refurbished smartphones have gotten recently. So what's behind this shopping trend?
Before I joined Gearbox Software, I worked at Destructoid as a features editor, highlighting indie games and spewing vitriol at big-budget games I didn't like. I played their games, I found them wanting, and I felt like I had a pretty good idea of where and why things had gone wrong. I may not have ever made a game myself but I basically knew what game development was about, right? Wrong. It turns out there were a shitload of things I didn't know about.
Games are forever changing. If you played a shooter from 1999 and then a shooter from 2015, you'd notice the differences immediately, not just in how they looked but how they played, how smartly they were designed. Homeworld was released in 1999. Play its remastered edition in 2015, though, and you'd be forgiven for thinking it was a brand new video game. Almost everything about it — and I'm not talking about its new visuals — feels fresh.
Game designer Peter Molyneux has long had a reputation for making promises he never quite delivered on. He has again been accused of misleading statements, in relation to Godus, his Kickstarter god game revival. In an attempt to get to the bottom of it all, we spoke both to Molyneux and to three people who have worked with him over the past few years. This is the story of how Godus ended up where it is today.
You may be familiar with Intel naming their processors under the Core i7, i5 and i3 moniker based on the performance and features offered. But beyond that there are also a handful of different product lines within each of those brands identified by a K, X, S or T appended to the model name. In this article, we'll cover the 'S' product line in particular to determine the actual performance, power draw, and thermal differences compared to its standard counterpart.
Intel has been beating AMD on every front but price for a couple of generations now as the Bulldozer microarchitecture and its descendants have had an unpleasant uphill climb. Power consumption, performance per clock, it all takes its toll. However, we took a couple of AMD’s most popular chips for a test drive and found that things aren’t anywhere near as bad as benchmarks might lead you to believe. Quite the opposite, actually.
Older CPUs would simply fail if they started to overheat, but modern CPUs adjust their frequency based on temperature (among other things) to prevent a dramatic failure. Because of this, it stands to reason that once you reach certain temps, you will no longer be getting the maximum performance from your CPU because it will be busy protecting itself. But what is that temperature? And do you really need a high-end liquid-cooled system to get peak performance?
PC gamers have got a pretty great thing going. Interesting, experimental indie games? Yup. The shiniest, most visually impressive versions of big-budget games? Yeah, they get a lot of those, too. Let's say you've recently joined the ranks of the PC elite. What games should you install? Well, you can start out with the games listed on this roundup.
Staying true to tradition, Far Cry 4 takes place in an expansive world that's seductively beautiful. Kyrat is located somewhere in the Himalayas, and this mountainous region adds an incredible amount of density to the game. And depth. So what if it feels a lot like Far Cry 3? That's one of the best shooters I've ever played. But it was also flawed enough to warrant a revision, and more often than not, Far Cry 4 is able to surpass its predecessor.
A SED, or self-encrypting drive, is a type of hard drive that automatically and continuously encrypts the data in it without any user interaction. What may surprise many is that a decent potion of the drives currently in the market are in fact SEDs. The method involves a Data Encryption Key that encrypts and decrypts data whenever data is written to the drive or read from it. But the process is so transparent to user that it is unlikely they would ever realize they have such a feature.