Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Our Comprehensive Guide to Purchasing a New Computer, Part II

Our Comprehensive Guide to Purchasing a New Computer, Part II

In part two of our desktop buying guide, we’ll focus on RAM, or random access memory. Some users have difficulty understanding this, so we’ll do our best to make sure it’s easy to grasp and apply to your own purchasing habits. You’ll learn how to make the best decisions regarding how much RAM your device will need.

The amount of RAM in your device, or random access memory, is not the same as the amount of data that a computer can store. RAM is used to temporarily store data so it can be recalled without pulling it from the computer’s storage. Think of it like short-term memory pulled from a human’s brain. You’ll have options for both high-end and low-end RAM, so it’s important that you find the best solution for your needs. Your need for RAM will be based on how much needs to happen at once. The CPU handles instructions and processes the data that the RAM holds, meaning that the more RAM is available, the larger the amount of data that the CPU can store, and the faster the CPU can process it. The two work together to make your computing experience as smooth as possible.

How Much RAM Does Your Computer Need?

Computers these days have limited options for RAM. There are many brands to choose from, but the important thing to remember is that manufacturers will take care of this aspect for you. It’s only truly important if you are building your own computer. Despite this, it can be complicated. This guide might simplify things a bit, but it will at least help you determine the speed and amount of RAM needed by your device.

  • Skimping the budget: The smallest acceptable amount of RAM in a Windows 10 machine is 4 GB. You might be able to get Windows to run on less, but we don’t recommend it, as this is the bare minimum for light document editing and Internet browsing.
  • Low-end: Most reasonable budget PCs will start at around 8 GB of RAM, which is more than enough to handle the operating system, editing documents, photo browsing, surfing the Internet, and many other tasks.
  • Mid-range: 16 GB is quite achievable for many businesses, even on a budget. The price difference isn’t terribly noticeable, but the investment will be well worth it. 16 GB of RAM is a nice entry point for gaming systems, and while 16 GB isn’t necessarily the catch-all goal, it will give you the most power for your money.
  • High-end: The ceiling for RAM is quite high, but the cost goes along with it. For example, the new Mac Pro can go up to 1.5 TB of RAM, which is about 1500 GB of RAM, but the price is estimated at about $20,000. A gaming rig, video editing system, or server might need more than 16 GB of RAM, but at that point, we recommend working with a professional to determine the best path forward.

Wrapping Up

Your device might be able to update at a later date, but for the initial implementation, we recommend aiming for no less than 8 GB. Realistically, you should try to find options at around 16 GB, but we realize that it’s not always possible.

Does your business need help implementing or acquiring new hardware? Give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Workplace Tips Google Privacy Email Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Ransomware Users AI Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Automation Artificial Intelligence Holiday Facebook Gadgets Compliance Cloud Computing Covid-19 Training IT Support Outsourced IT Server Managed Service Provider Remote Work Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Vendor Wi-Fi Windows 10 Managed Services Apps Data Security Mobile Office Two-factor Authentication Tip of the week Chrome Employer-Employee Relationship Budget Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Gmail WiFi Office 365 Conferencing Password Hacker Managed IT Services How To Avoiding Downtime BDR Marketing HIPAA Computing Physical Security Applications Information Technology Access Control Help Desk Big Data Office Tips Analytics Augmented Reality Retail Storage Healthcare Bring Your Own Device Computers Website Operating System 2FA Router Virtual Private Network Risk Management Health Monitoring Social Document Management Remote Workers Managed IT Service Telephone Customer Service Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Windows 11 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Firewall Excel Display Printer Paperless Office The Internet of Things Infrastructure Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Data Privacy Money Saving Time Virtual Machines Professional Services Humor Customer Relationship Management Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Hacking Presentation Entertainment Administration Vulnerabilities Wireless Technology Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Word Printing Wireless Content Filtering Supply Chain IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Safety Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Windows 8 Laptop Websites Mirgation Hypervisor Scams Hybrid Work Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Application SharePoint Human Resources Addiction Management PCI DSS Halloween Chatbots Navigation Cables Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service IBM Virtual Reality Computing Infrastructure Teamwork Google Apps Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote IT Maintenance Business Intelligence Superfish Bookmark Identity Theft Smart Tech Memes Fun Twitter Alerts SQL Server Shortcuts Deep Learning Download Net Neutrality Financial Data Error History Competition Ransmoware Vendors Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Remote Computing Azure Be Proactive Upload Procurement Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Workforce Threats User CES Tablet IoT Communitications Search Dark Web Alert Workplace Strategies Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Meta IP Address Amazon Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Outsource IT Environment Recovery Techology Fileless Malware Digital Security Cameras Media Google Maps Smart Devices Cortana Wearable Technology Memory Hard Drives Alt Codes Content Remote Working Small Businesses Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Domains Displays Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Wasting Time Refrigeration Typing Outsourcing Trend Micro Network Congestion Specifications Security Cameras Public Speaking Lithium-ion battery Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Managing Costs Workplace Entrepreneur Username Hiring/Firing Point of Sale eCommerce 5G Black Friday SSID Google Docs Paperless Unified Communications Database Surveillance Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine Undo Co-managed IT Bitcoin Network Management Technology Care Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Business Communications Tactics Development Hotspot Transportation

Blog Archive