approach to computing, but it carried us through the As the
dot-com era and helped usher in the internet-connected multithreading
world of PCs we enjoy today.
project raced
Intel certainly wasn’t the only semiconductor maker toward
racing to implement multithreading technology on
consumer PCs, but it had a lot to lose if another completion,
FRPSDQ\ ZHQW WR PDUNHW ZLWK WKH WHFKQRORJ\ ¿UVW 2QH a legal storm
competitor in particular was likely furrowing the brows was brewing
RI ,QWHO¶V & VXLWH WKDW $SULO $0' $OWKRXJK ,QWHO that had just as
enjoyed a commanding share of the PC processor much potential
PDUNHW LQ LW ZDV JLYLQJ XS JURXQG WR WKH 7H[DV
EDVHG ¿UP ZKLFK ZDV ,QWHO¶V RQO\ VHULRXV FRPSHWLWLRQ to impact
%\ WKH HQG RI ,QWHO RZQHG RI WKH 3& Intel’s dominant
SURFHVVRU PDUNHW GRZQ IURP LQ ,W KDG
FHGHG SRLQWV RI VKDUH WR $0' ZKLFK JUHZ IURP position in the
LQ WR LQ silicon industry.
So, in addition to the pressures that Intel engineers
OLNHO\ IHOW WKDW VSULQJ WR GHOLYHU WKH +\SHU 7KUHDGLQJ
project on time, they were undoubtedly aware that
their research could have an impact on Intel’s position
in the semiconductor market for years to come.
TRUST AND ANTITRUST Intel Pentium 4 chip
As the multithreading project raced toward completion,
a legal storm was brewing that had just as much Photo credit: Wikimedia / Konstantin Lanzet
potential to impact Intel’s dominant position in the
VLOLFRQ LQGXVWU\ 2Q $SULO WKH (XURSHDQ &RPPLVLRQ
FRQ¿UPHG WKDW LW KDG RSHQHG DQ DQWLWUXVW LQYHVWLJDWLRQ
of Intel. Europe’s competition regulator had received
FRPSODLQWV IURP $0' D \HDU HDUOLHU VXJJHVWLQJ WKDW
Intel was unfairly abusing its dominance on two levels.
7KH ¿UVW ZDV D PLQRU WHFKQLFDO LVVXH UHODWHG WR ,QWHO¶V
V\VWHP EXV ZKLFK FRQQHFWV WKH &38 WR WKH
PRWKHUERDUG DQG ZRXOG VRRQ EH GLVPLVVHG %XW WKH
second was potentially more serious: It posited that
Intel’s agreements with PC makers and retailers—in
which the company would pay rebates based on the Top: Andy Grove,
percentage of PCs shipped with Intel processors— Robert Noyce and
violated antitrust rules. Gordon Moore (1978)
3XEOLFO\ ,QWHO VKUXJJHG R̆ WKH QHZV $ FRPSDQ\ Bottom: Andy Grove
VSRNHVSHUVRQ FODLPHG WKDW WKH SUDFWLFH ZDV ³IDLU DQG
ODZIXO ´ 7KH (XURSHDQ &RPPLVVLRQ DFNQRZOHGJHG
that the rebate issue wasn’t itself a problem but was
rather tied to Intel’s success in the market. ‘’Loyalty
VFKHPHV DUH ¿QH ZKHQ WKH FRPSDQ\ XVLQJ WKHP LV
not dominant,’’ a Commission spokesperson said.
%XW WKH FRPSODLQWV PXVW KDYH UHYHUEHUDWHG
throughout the company at a time when another tech
JLDQW²0LFURVRIW²ZDV QHDULQJ WKH HQG RI LWV RZQ HSLF
DQWLWUXVW ODZVXLW 7KH 86 FDVH DJDLQVW 0LFURVRIW
ZRXOG EH VHWWOHG WKDW DXWXPQ 3DUWO\ DV D UHVXOW RI
0LFURVRIW¶V WURXEOHV ,QWHO SURFODLPHG WKH LQWULFDFLHV
of its antitrust compliance program to anyone who
ZRXOG OLVWHQ )RXQGHU DQG IRUPHU &(2 $QG\ *URYH
who had overseen the transformation of Intel into the
world’s largest semiconductor company, spoke
FDQGLGO\ DERXW DQWLWUXVW FKDOOHQJHV ³:H SD\
marketing, business development, and sales people to
EH DJJUHVVLYH ´ KH WROG WKH +DUYDUG %XVLQHVV 5HYLHZ
WKDW VSULQJ ³+RZ GR \RX LPSRVH WKLV QHZ JXDUG EDQG
[margin of safety] behavior on a group of people for
ZKRP DQWLWUXVW LV DQWLWKHWLFDO"´
Intel’s answer was to simulate antitrust investigations
at regular intervals, according to Grove. The
company’s legal department would seize the records
of a random management employee and even stage
a mock deposition, as though the manager were
under a real investigation. Surely this would be
enough to discourage any kind of illegal
anticompetitive behavior.
INTEL PULLS AHEAD
)RU D WLPH LW VHHPHG VR $ IHZ PRQWKV ODWHU
the events of September 11 diverted the
world’s attention from the troubles of
6LOLFRQ 9DOOH\ 7KH (XURSHDQ &RPPLVVLRQ
GURSSHG SDUW RI LWV LQYHVWLJDWLRQ D UHSULHYH
WKDW ZRXOG SURYH WR EH VKRUW OLYHG $QG
Intel’s silicon was winning plenty of praise.
7KH ODXQFK RI +\SHU 7KUHDGLQJ RQ ;HRQ
processors in early 2002 was a success.
8VLQJ D 'HOO 3RZHU(GJH VHUYHU RQH RI
WKH ¿UVW FRPSXWHUV WR HPSOR\ WKH QHZ
technology, PC Magazine in July 2002
recorded performance gains approaching
LQ WKH QXPEHU RI UHTXHVWV SHU VHFRQG
the server could handle, as well as total
WKURXJKSXW ³7KDW¶V QRW EDG FRQVLGHULQJ
that the technology is free: Intel did not
UDLVH ;HRQ SULFHV ZKHQ LW DGGHG +\SHU
7KUHDGLQJ ´ &RQWULEXWLQJ (GLWRU -RKQ 5
'HODQH\ ZURWH DW WKH WLPH
7KH +\SHU 7KUHDGLQJ UROORXW SURFHHGHG VORZO\ EXW VXUHO\ DSSHDULQJ RQ WKH
¿UVW FRQVXPHU IRFXVHG 3HQWLXP 3&V WKH IROORZLQJ \HDU ,Q 2FWREHU PC
Magazine’V WHVWV RI YLGHR HGLWLQJ VRIWZDUH RQ D *+] 3HQWLXP V\VWHP ZLWK
*% RI PHPRU\ UXQQLQJ :LQGRZV ;3 IRXQG WKDW +\SHU 7KUHDGLQJ DOZD\V
\LHOGHG IDVWHU VFRUHV WKDQ 3&V HTXLSSHG ZLWK QRQ +\SHU 7KUHDGLQJ SURFHVVRUV
)RU \HDUV FRQVXPHUV KDG FRPSDULVRQ VKRSSHG 3&V EDVHG RQ WKHLU FORFN
speeds, but now the number of cores and threads was shaping up to be just
as important.
0HDQZKLOH $0'¶V PDUNHW VKDUH UHPDLQHG SHJJHG WRZDUG WKH ERWWRP RI WKH
VFDOH 7R VRPH LQGXVWU\ ZDWFKHUV DQG SHUKDSV WR ,QWHO¶V GHOLJKW WKH FRPSDQ\
VHHPHG PLUHG LQ D WHFKQRORJLFDO IXQN $0' UHOHDVHG LWV VHFRQG JHQHUDWLRQ
,WDQLXP ELW SURFHVVRU DURXQG WKH VDPH WLPH DV ,QWHO ODXQFKHG LWV +\SHU
7KUHDGLQJ ;HRQ EXW DGRSWLRQ RI WKH $0' FKLS ZDV OXNHZDUP DW EHVW %RWK
FRPSDQLHV ZHUH KRSLQJ IRU ZKDW ZH ZRXOG UHIHU WR WRGD\ DV D ³NLOOHU DSS´²WKH
SODQQHG ELW YHUVLRQ RI :LQGRZV ;3
$0' IRFXVHG SDUW RI LWV DWWHQWLRQ RQ RWKHU W\SHV RI AMD’s salvos Photo credit: legitreviews.com
processors that didn’t compete directly with Intel. In seemed to have
2006, the company made a momentous acquisition: the
graphics-processing company ATI, a major player in the little effect.
PDUNHW IRU FRQVXPHU *38V $0' XVHG $7,¶V H[SHUWLVH The company’s
WR ODXQFK D QHZ SURGXFW OLQH FDOOHG )XVLRQ &RPELQLQJ
&38 DQG *38 IXQFWLRQV RQWR D VLQJOH GLH )XVLRQ FRXOG market share
be used not only in PCs but also in other types of gained a bit
FRQVXPHU HOHFWURQLFV VXFK DV JDPH FRQVROHV )XVLRQ
chips eventually found their way into the Sony but remained
3OD\6WDWLRQ DQG 0LFURVRIW ;ER[ FRQVROHV dismal, and
$0' DOVR WRXWHG LWV FRQVXPHU IRFXVHG $WKORQ ;3
processors as superior to Intel’s Pentium counterparts. Intel continued
In advertisements, the company tried to use benchmark to occupy a
UHVXOWV WR WXUQ ,QWHO¶V RZQ FODLPV WKDW WKH EHVW
processor is the one that completes the task in the least commanding
DPRXQW RI WLPH DJDLQVW LW $ IXOO SDJH PDJD]LQH DG lead in the
SURFODLPHG ³,QWHO WDONV DERXW SHUIRUPDQFH $0' PC market.
$WKORQ ;3 GHOLYHUV LW ´ $ IHZ EHQFKPDUN SHUIRUPDQFH
JUDSKV EHORZ FODLPHG WR VKRZ WKDW WKH $WKORQ ;3 AMD’s Henri
RXWSHUIRUPHG D *+] 3HQWLXP SURFHVVRU E\ Richard holding
XS WR the industry’s first
“native” quad-core
$0' H[HFXWLYHV ZHQW RQ WKH R̆HQVLYH WRR ³:H x86 server (2006).
started this challenge because Intel has been delivering
inferior technology and scrambling to keep up, but
because of their marketing muscle it’s not always clear
WKH\ DUH VWUXJJOLQJ ´ $0'¶V WKHQ±FKLHI PDUNHWLQJ
ṘFHU +HQUL 5LFKDUG WROG &11 LQ 6HSWHPEHU
³7KH EHVW ZD\ IRU XV WR H[SRVH WKHLU SUHGLFDPHQW LV
to challenge them in the court of public opinion to
VKRZ WKDW WKHLU WHFKQRORJ\ MXVW GRHVQ¶W PDWFK XS
ZLWK RXUV ´
%XW $0'¶V VDOYRV VHHPHG WR KDYH OLWWOH H̆HFW 7KH
company’s market share gained a bit but remained
dismal, and Intel continued to occupy a commanding
OHDG LQ WKH 3& PDUNHW $0'¶V VKDUH RI WKH PDUNHW IRU
GHVNWRS SURFHVVRUV SHDNHG DW LQ DFFRUGLQJ WR GDWD IURP 0HUFXU\
5HVHDUFK ,WV QRWHERRN SURFHVVRU PDUNHW VKDUH SHDN LQ ZDV HYHQ ORZHU DW
%RWK FRPSDQLHV DQQRXQFHG WKHLU ¿UVW GXDO FRUH FRQVXPHU 3&V LQ
6HSWHPEHU SURPLVLQJ DQRWKHU UHYROXWLRQDU\ SHUIRUPDQFH OHDS WR ULYDO
WKDW RI PXOWLWKUHDGLQJ %XW LW ZDV ,QWHO¶V ¿UVW GXDO FRUH HQWUDQW WKH 3HQWLXP
([WUHPH (GLWLRQ ZKLFK DOVR VXSSRUWHG +\SHU 7KUHDGLQJ WKDW FDSWLYDWHG
the media and the public. PC Magazine WHVWHG WKH ¿UVW 3HQWLXP ([WUHPH
(GLWLRQ LQ 0D\ DQG IRXQG WKDW LW KDQGLO\ RXWFODVVHG VLQJOH FRUH FKLSV IURP
ERWK FRPSDQLHV RQ QHDUO\ HYHU\ FRPSXWLQJ WDVN H[FHSW JDPLQJ
,QWHO¶V PDUNHW VKDUH VN\URFNHWHG DJDLQ 0HDVXUHG E\ KRZ PDQ\ 3& RZQHUV
XSORDGHG WKHLU SHUIRUPDQFH EHQFKPDUN UHVXOWV WR WKH 3DVV0DUN GDWDEDVH WKH
QXPEHU RI ,QWHO &38V LQ XVH OHDSW QHDUO\ LQ WKH ¿UVW TXDUWHU RI DORQH
$0' FKLSV VDZ D FRPPHQVXUDWH GHFOLQH $0' ZDV GRLQJ EHWWHU LQ WKH VHUYHU
market, with market share roughly equal to Intel’s, but both companies spent
DQG VWLOO VSHQG D VLJQL¿FDQW SRUWLRQ RI WKHLU PDUNHWLQJ EXGJHW RQ 3&
enthusiasts, who are most likely to upload their benchmark scores. So the
benchmark measurement was a powerful albeit symbolic feather in Intel’s cap.
THE INTEL INVESTIGATION
GOES WORLDWIDE
$V ,QWHO EDWWOHG ZLWK $0' IRU WHFKQRORJLFDO
superiority and market-share wins in the
early 2000s, its legal troubles did not quietly
disappear, as Andy Grove might have hoped.
The European Commission dismissed the
technical complaints from 2001, but it
continued to investigate the rebate payments.
$QG $0' ODXQFKHG QHZ FRPSODLQWV ZLWK
competition authorities around the globe—in
-DSDQ 6RXWK .RUHD DQG WKH 8QLWHG 6WDWHV
7KH -DSDQHVH LQYHVWLJDWLRQ EHJDQ LQ DQG
centered on issues that were much the same as
WKH RQHV WKDW $0' KDG RULJLQDOO\ EURXJKW
before the European competition watchdog.
$IWHU PRQWKV WKH -DSDQ )DLU 7UDGH
&RPPLVVLRQ -)7& UXOHG WKDW ,QWHO¶V -DSDQHVH
VXEVLGLDU\ KDG R̆HUHG UHEDWHV RU RWKHU PDUNHWLQJ LQFHQWLYHV WR WKH FRXQWU\¶V
¿YH ODUJHVW 3& PDNHUV ZLWK WKH FRQGLWLRQ WKDW WKH\ XVH ,QWHO SURFHVVRUV IRU
PRVW PRGHOV VROG ,QWHO R̆HUHG LWV 2(0 FXVWRPHUV WKUHH UHEDWH WLHUV DFFRUGLQJ
WR WKH ¿QGLQJV 8VH ,QWHO FKLSV LQ HYHU\ 3& XVH ,QWHO FKLSV LQ RI 3&V
VROG RU UHVHUYH RQH VHULHV RI 3&V IRU QRQ ,QWHO FKLSV DQG XVH ,QWHO FKLSV LQ
all the others.
7KH UHVXOW DFFRUGLQJ WR WKH -)7& ZDV WKDW WKH HQWLUH UHPDLQGHU RI WKH PDUNHW
WKRVH 3&V ZLWK QRQ ,QWHO FKLSV VROG LQ -DSDQ ZKLFK ZHUH PRVWO\ VXSSOLHG E\
$0' DQG WKH QRZ GHIXQFW 7UDQVPHWD FUDWHUHG GURSSLQJ IURP LQ WR
LQ -DSDQHVH DXWKRULWLHV R̆HUHG ,QWHO D SURSRVDO WKDW VHHPV ODXJKDEO\
OHQLHQW E\ WKH VWDQGDUGV RI MXGJPHQWV \HW WR FRPH $FFHSW WKH ¿QGLQJV DQG HQG
WKH UHEDWH SURJUDP LQ -DSDQ DQG QR FKDUJHV RU ¿QHV ZRXOG EH OHYLHG 7KH
company would not even have to admit to any wrongdoing. Intel took the deal.
)RU $0' WKH -DSDQ FDVH ZDV ³D VWHS LQ WKH ULJKW GLUHFWLRQ ´ EXW WKH FRPSODLQWV
ZHUH IDU IURP RYHU ,Q $0' VXHG ,QWHO LQ WKH 8QLWHG 6WDWHV DQG .RUHD
alleging the same anti- competitive rebate practices. Armed with the Japanese
GHFLVLRQ DQG ,QWHO¶V DFFHSWDQFH RI LW $0' FODLPHG LQ LWV 86 'LVWULFW &RXUW ¿OLQJ
that Intel’s practices were also illegal under American antitrust law. This private
lawsuit was consolidated with several other class-action lawsuits. Naturally,
,QWHO REMHFWHG WR $0'¶V FRPSODLQWV²LW KDG QRW DGPLWWHG WR DQ\ ZURQJGRLQJ LQ
any international cases thus far—and asked the court to dismiss the case. In
,QWHO¶V PRWLRQ WR GLVPLVV ZDV GHQLHG DQG WKH FDVH ZDV VFKHGXOHG IRU WULDO
in 2009.
6RPH RI WKH PRVW HSLF DQG H[SHQVLYH PDQHXYHULQJ LQ PRGHUQ OHJDO KLVWRU\
ensued, ensuring that the battle between the two silicon giants would be
UHPHPEHUHG DV PXFK IRU LWV OHJDO LQQRYDWLRQV DV LWV WHFKQLFDO RQHV %\ RQH
XQṘFLDO PHDVXUH LQ HDUO\ ,QWHO KDG DOUHDG\ VSHQW DW OHDVW PLOOLRQ
RQ OHJDO UHSUHVHQWDWLRQ IRU WKH $0' ODZVXLW LQ WKH 86 $QG WKH (XURSHDQ
LQYHVWLJDWLRQ ZDV VWLOO RQJRLQJ ,Q WZR VHSDUDWH VHWV RI FKDUJHV LQ DQG
WKH (XURSHDQ 8QLRQ FRPSHWLWLRQ DXWKRULW\ FRUURERUDWHG -DSDQ¶V ¿QGLQJV
and added a few of its own. Intel had apparently abused its dominant position
in the market for PC processors, not only through rebates but also by paying
computer makers to delay or cancel product lines and selling server processors
below their actual cost of production.
,Q WKH FRXUVH RI DUJXLQJ LWV SRVLWLRQ LQ (XURSH $0' If you’re a
ZRQ D VLJQL¿FDQW DQFLOODU\ 86 6XSUHPH &RXUW YLFWRU\ LQ fan of legal
ZKLFK WKH FRXUW UXOHG LQ WKDW OLWLJDQWV LQ IRUHLJQ wrangling, it’s
OHJDO SURFHHGLQJV FDQ UHTXHVW HYLGHQFH LQ D 86 IHGHUDO worth scanning
FRXUW 7KLV VR FDOOHG ³6HFWLRQ GLVFRYHU\´ KDV EHHQ the details
used several times since, most notably in recent of Cuomo’s
developments in the decades-long, Kafka-esque complaint with
pollution dispute between Chevron and the indigenous a giant tub of
inhabitants of the Amazon rainforest. popcorn handy.
%XW IRU QRQ ODZ\HUV WKH PRVW PHPRUDEOH SDUW RI WKH
OHJDO EDWWOHV EHWZHHQ $0' DQG ,QWHO E\ IDU DUH WKH
aforementioned emails that Andrew Cuomo presented
WR WKH FRXUW RI SXEOLF RSLQLRQ DV WKH 86 DQG (XURSHDQ
cases came to a preliminary conclusion in 2009. Intel
DJUHHG WR SD\ ELOOLRQ WR VHWWOH DOO RXWVWDQGLQJ
GLVSXWHV ZLWK $0' LQ WKH 86 0HDQZKLOH (XURSHDQ
ṘFLDOV OHYLHG D ¼ ELOOLRQ ELOOLRQ ¿QH ZLWK D
trove of damning emails to lend credibility to the
H\HEURZ UDLVLQJ DPRXQW ,QWHO LV VWLOO DSSHDOLQJ WKDW ¿QH
today, but the messages have been made public—thanks
in part to Cuomo, who included many of them in yet
DQRWKHU DQWLWUXVW VXLW ¿OHG LQ ODWH
If you’re a fan of legal wrangling, it’s worth scanning
the details of Cuomo’s complaint with a giant tub of
SRSFRUQ KDQG\ <RX¶OO GLVFRYHU WKDW H[HFXWLYHV DW +3
DQG 'HOO ZHUH DOOHJHGO\ EHVLGH WKHPVHOYHV ZLWK ZRUU\
EHFDXVH WKH\ EHOLHYHG $0'¶V 2SWHURQ FKLSV ZHUH
technologically superior to Intel’s, but they thought
WKDW ZLWKRXW ,QWHO¶V ¿QDQFLDO VXSSRUW WKH\ FRXOGQ¶W
make money. You’ll read about how Intel was allegedly
³SUHSDUHG IRU MLKDG LI 'HOO MRLQV WKH $0' H[RGXV ´
7KH RULJLQDO (XURSHDQ FRPSODLQW UHSODFHV ³MLKDG´ ZLWK
³DOO RXW ZDU´ EHFDXVH FRPPLVVLRQHUV EHOLHYHG WKDW WKH
RULJLQDO ZRUGLQJ ZDV WRR R̆HQVLYH &XRPR SHUKDSV
FRXUWLQJ FRQWURYHUV\ ZHQW ZLWK WKH RULJLQDO
Intel disputed the relevancy of the emails, claiming in a Damning
statement to The New York Times that the European details, billion-
LQYHVWLJDWLRQ ZDV KHDY\ RQ ³VSHFXODWLRQ IRXQG LQ HPDLOV
from lower-level employees that did not participate in dollar fines,
WKH QHJRWLDWLRQ RI WKH UHOHYDQW DJUHHPHQWV ´ DQG WKDW technical one-
WKH PHVVDJHV ZHUH FLWHG ³LI WKH\ IDYRUHG WKH upmanship, and
FRPPLVVLRQ¶V FDVH ´ $ IHGHUDO FRXUW VDLG &XRPR FRXOG
not seek damages for many of the sensational scandalous
allegations in the suit, and it was settled by his emails aside,
successor, Eric Schneiderman, in 2012 for just the AMD-Intel
PLOOLRQ
battle is far
AMD FINDS ITS ZEN from over.
'DPQLQJ GHWDLOV ELOOLRQ GROODU ¿QHV WHFKQLFDO RQH
XSPDQVKLS DQG VFDQGDORXV HPDLOV DVLGH WKH $0'
,QWHO EDWWOH LV IDU IURP RYHU %XW WZR VXUSULVLQJ WKLQJV
KDSSHQHG LQ WKDW ZLOO OLNHO\ GH¿QH
WKH QH[W SKDVH RI WKH EDWWOH 2QH IDYRUHG ,QWHO 7KH
European Court of Justice agreed with Intel’s
DSSHDO RI WKH ¼ ELOOLRQ ¿QH UHPDQGLQJ LW
back to the competition authority in a retrial
that is still ongoing. The second surprise is
technical: After years of trying to compete
ZLWK ,QWHO XVLQJ 2SWHURQ DQG $WKORQ
SURFHVVRUV $0' ODXQFKHG DQ HQWLUHO\ QHZ
SURFHVVRU DUFKLWHFWXUH FDOOHG ³=HQ ´ WR UDYH
reviews and reassuring market-share gains.
7R GDWH WKHUH KDYH EHHQ ¿YH JHQHUDWLRQV RI TK Photo credit: AMD
=HQ EDVHG SURFHVVRUV VROG XQGHU WZR PDLQ LEDE IN
EUDQGV²5\]HQ IRU FRQVXPHU 3&V DQG
ZRUNVWDWLRQV DQG (S\F IRU VHUYHUV 7KHLU GOES
performance has bested Intel competitors on many
benchmark tests and real-world applications, thanks HERE TK LEDE
ERWK WR WKH ḢFLHQF\ RI WKHLU PXOWLFRUH PXOWLWKUHDGHG MUga Itate sumque
GHVLJQV DQG WKH IDFW WKDW $0' KDV VROG PDQ\ RI WKHP
IRU OHVV WKDQ FRPSHWLQJ ,QWHO &RUH DQG ;HRQ SURGXFWV
go for.
7R XQGHUVWDQG KRZ FRPSOHWHO\ $0' KDV WXUQHG WKH WDEOHV ZLWK =HQ MXVW JODQFH
DW UHYLHZV RI SURFHVVRUV VXFK DV WKH 5\]HQ ; D IDYRULWH RI 3& EXLOGLQJ
enthusiasts searching for the ultimate blend of price and performance for their
QH[W FXVWRP WULFNHG RXW JDPLQJ ULJ RU FRQWHQW FUHDWLRQ ZRUNVWDWLRQ %DVHG RQ
RXU RZQ SHUIRUPDQFH WHVWLQJ ODWH ODVW \HDU 3&0DJ GLGQ¶W VHH DQ\ DUHDV ZKHUH
this chip could be considered objectively worse than Intel’s comparative
R̆HULQJV $QG DV ZH QRWHG LQ WKH UHYLHZ ³2QFH \RX IDFWRU LQ WKH SULFH WR
SHUIRUPDQFH UDWLR ,QWHO ¿QLVKHV IXUWKHU EHKLQG LQ WKH UDFH WKDQ HYHU ´ 7KH =HQ
DUFKLWHFWXUH LV QRZ RQ LWV WKLUG UHYLVLRQ² ; DQG RWKHU 6HULHV GHVNWRS
&38V DUH =HQ EDVHG²DQG =HQ LV LQ WKH ZRUNV
MUga Itate sAuMmDquReynzeonns7e5q8u0i 0coXnseque quas Lenovo Flex 5 14
dit essi dolut accuptat harchillaut reri sanis
%XW $0' KDVQ¶W VXFFHHGHG RQO\ LQ WKH KLJK SHUIRUPDQFH GHVNWRS 3& PDUNHW
Even its laptop processors outclass their Intel competitors in some measures.
2QH RI WKH EHVW LQH[SHQVLYH ODSWRSV RI ZRQ WKH DSSURYDO RI RXU HGLWRUV
EDVHG WR D JUHDW H[WHQW RQ WKH IDFW WKDW LWV $0' 5\]HQ SURFHVVRU R̆HUV EHWWHU
computing performance than competing laptops with Intel processors in some
laptops that cost twice as much.
7KH =HQ DUFKLWHFWXUH WRRN \HDUV WR GHYHORS DQG GXULQJ WKDW WLPH $0'
EHQH¿WWHG IURP PDMRU VWUDWHJLF VKLIWV 7KH ¿UVW LV QHZ H[HFXWLYH OHDGHUVKLS
LQFOXGLQJ WKH DSSRLQWPHQW RI 'U /LVD 6X DV $0'¶V SUHVLGHQW DQG &(2
:LGHO\ DGPLUHG LQVLGH DQG RXWVLGH WKH FRPSDQ\ AMD President Photo credit: AMD
'U 6X¶V EDFNJURXQG LV LQ VHPLFRQGXFWRU UHVHDUFK and CEO Dr. Lisa Su
DQG GHYHORSPHQW %HIRUH MRLQLQJ $0' VKH KDG
VSHQW IRXU \HDUV DW )UHHVFDOH 6HPLFRQGXFWRU
ZKHUH VKH ZDV FKLHI WHFKQRORJ\ ṘFHU IROORZLQJ
WKDW FRPSDQ\¶V VSLQR̆ IURP 0RWRUROD )UHHVFDOH
was perhaps best known for making the PowerPC
SURFHVVRUV IRU 0DF ODSWRSV DQG GHVNWRSV XQWLO
$SSOH¶V WUDQVLWLRQ WR ,QWHO SURFHVVRUV LQ
%HIRUH )UHHVFDOH 'U 6X VSHQW \HDUV DW ,%0
including a stint as technical assistant to then-
&(2 /RXLV *HUVWQHU
'U 6X¶V PRYH WR $0' LQ FDPH DPLG D PXOWL
year management overhaul. In just two years, she
went from senior vice president to chief operating
ṘFHU WR &(2 2QH RI KHU ¿UVW VLJQL¿FDQW VWUDWHJLF
decisions was to double down on the company’s
business for PC processors, instead of abandoning
LW WR IRFXV RQ UH¿QLQJ )XVLRQ IRU FRQVROHV DQG
RWKHU HOHFWURQLFV 7R GR VR 'U 6X KDG WR IUHH $0'
from the setbacks it had faced in developing its
$WKORQ FKLSV LQFOXGLQJ ¿QGLQJ PRUH UHVHDUFK DQG
development capacity. She negotiated a breakup in
ZLWK $0'¶V IRUPHU VXSSOLHU
*OREDO)RXQGULHV ZKLFK FRVW D FRRO PLOOLRQ LQ
termination fees.
7KH DERXW IDFH ZDV ULVN\ ³<RX ZRXOG WKLQN WKDW
the decisions get easier because you have more
resources, but they actually don’t, because you
KDYH D PXFK EURDGHU VHW RI RSSRUWXQLWLHV ´ 'U 6X
told The Wall Street Journal. %URDGHQLQJ $0'¶V
PDQXIDFWXULQJ KRUL]RQV HQGHG XS SD\LQJ R̆ ELJ
WLPH IRU WKH GHYHORSPHQW RI WKH QHZ =HQ
DUFKLWHFWXUH $0' FDQ QRZ UHO\ XSRQ DQ
ecosystem of partners to produce current chips
DQG UH¿QH WKH WHFKQRORJ\ IRU IXWXUH JHQHUDWLRQV
2QH RI WKH FRPSDQ\¶V PRVW FUXFLDO SDUWQHUV LV 7DLZDQ Measured by
6HPLFRQGXFWRU 0DQXIDFWXULQJ &RPSDQ\ 760& sales of new
ZKRVH IDEULFDWLRQ IDFLOLWLHV IDEV DVVHPEOH WKH =HQ products, the
FKLSV 8QOLNH ,QWHO ZKLFK RZQV LWV RZQ IDEV $0' market-share
outsources almost all chip production. Still, once
HYHU\WKLQJ FDPH WRJHWKHU WKH =HQ ODXQFK FRXOGQ¶W KDYH trends are
EHHQ EHWWHU WLPHG WR FRLQFLGH ZLWK WKH FOLPD[ RI slightly less
negative attention that Intel had garnered with its dramatic but
ELOOLRQV RI GROODUV LQ SURSRVHG ¿QHV IRU DOOHJHG DQWL still represent a
competitive concerns. win for AMD.
$GG LQ $0'¶V UHPDUNDEOH WHFKQLFDO DGYDQFHV VR
GL̆HUHQW IURP LWV ÀDJJLQJ $WKORQ DQG ); SURGXFWV RI D
decade earlier, and you get a remarkable result: The
company’s market share is coming back from the brink
DW DQ LPSUHVVLYH FOLS 7XUQLQJ WR WKH 3DVV0DUN
benchmark database once more, it’s clear that the share
RI 3&V ZLWK ,QWHO &38V SHDNHG LQ ODWH DW DQG
WKHQ EHJDQ D ¿WIXO GHFOLQH )ROORZLQJ D SUHFLSLWRXV ULVH
LQ WKH WKLUG TXDUWHU RI ZKLFK PLUURUV ¶V
SUHFLSLWRXV GURS $0'¶V VKDUH RI WKH LQVWDOOHG &38
EDVH QRZ VWDQGV DW WR ,QWHO¶V 7KDW ¿JXUH
LQFOXGHV DOO &38 FDWHJRULHV²ODSWRSV FRQVXPHU
GHVNWRSV DQG VHUYHUV :KHQ \RX OLPLW WKH 3DVV0DUN
GDWD WR MXVW GHVNWRS FKLSV $0'¶V UHYHUVDO RI IRUWXQHV LV
HYHQ PRUH VLJQL¿FDQW $0' VOLJKWO\ VXUSDVVHG ,QWHO LQ
WKLV FDWHJRU\ LQ WKH ¿UVW TXDUWHU RI DQG WKH WZR
FRPSDQLHV DUH QRZ HVVHQWLDOO\ WLHG IRU GHVNWRS &38V
0HDVXUHG E\ VDOHV RI QHZ SURGXFWV WKH PDUNHW VKDUH
trends are slightly less dramatic but still represent a win
IRU $0' 7KH FRPSDQ\¶V VKDUH RI QRWHERRN SURFHVVRUV
UHDFKHG ODVW \HDU XS IURP MXVW LQ
DFFRUGLQJ WR 0HUFXU\ 5HVHDUFK $QG GXULQJ WKH VDPH
¿YH \HDU SHULRG ,QWHO¶V QRWHERRN SURFHVVRU PDUNHW
VKDUH GHFOLQHG IURP WR
COVID-19 RESETS THE BATTLE Photo credit: Top PC vendors, according to IDC
$W WKLV SRLQW DQ\RQH ZKR GHFODUHV $0' DVFHQGDQW YHUVXV D ÀDJJLQJ ,QWHO LV
FUHGLEOH²WKH VFUDSS\ 7H[DV XQGHUGRJ KDV SOHQW\ RI UHDVRQV WR FHOHEUDWH %XW
such a declaration would be premature, not only because the jury is still very
much out on Intel’s alleged anti-competitive practices in Europe. In fact, the
SURFHVVRU VLWXDWLRQ WRGD\ LV MXVW DV FRPSOLFDWHG DV LW ZDV ZKHQ $0' FODLPHG
technical superiority over the far-better-selling Intel chips in its advertisements
PRUH WKDQ \HDUV DJR 7KLV FRPSOH[LW\ KDV PDQ\ FRQWULEXWLQJ IDFWRUV EXW WZR
RI WKH ODUJHVW DUH WKH UHVXOW RI H[RJHQRXV VKRFNV WKDW QHLWKHU $0' QRU ,QWHO
FRXOG KDYH UHDVRQDEO\ SUHGLFWHG LQFOXGLQJ WKH H̆HFWV RI &29,'
Against the odds, the multithreaded desktop processor that originally pitted
$0' DJDLQVW ,QWHO LV VHHLQJ D UHVXUJHQFH RI LQWHUHVW ,QGXVWU\ H[SHUWV DQG
consumers once believed desktop PCs were a dying breed, taking a backseat to
SKRQHV WDEOHWV DQG ZDWFKHV ,Q ZKHQ $0' DQG ,QWHO ZHUH VWLOO LQ WKH
heat of battle, declining PC sales had vendors wringing their hands and trying to
¿QG ZD\V WR PDNH WKH 3& PRUH YLWDO WR D SHUVRQ¶V FRPSXWLQJ H[SHULHQFH
%XW WKH &29,' SDQGHPLF FKDQJHG DOO WKDW 3& VDOHV VN\URFNHWHG HDUO\ LQ WKH
pandemic, as many white-collar workers and parents of school-age kids
worldwide realized that they might be working and learning from home for the
foreseeable future. Last year, PC vendors shipped 302 million units across the
JOREH DQ DQQXDO LQFUHDVH RI DFFRUGLQJ WR WKH UHVHDUFK ¿UP ,'& ³7R SXW
things into perspective, the last time the PC market saw annual growth of this
PDJQLWXGH ZDV ZKHQ WKH PDUNHW JUHZ ´ WKH FRPSDQ\ VDLG LQ D
Photo by SAM YEH/AFP via Getty Images
research note. According to data collected by Canalys, global shipments of
GHVNWRSV QRWHERRNV DQG ZRUNVWDWLRQV LQ WKH ¿UVW TXDUWHU RI LQFUHDVHG E\
DQ HYHQ JUHDWHU \HDU RYHU \HDU 7KH UDZ QXPEHUV² PLOOLRQ XQLWV²DOVR
make it the highest Q1 shipment order since 2012, though some of that is
WHPSHUHG E\ WKH IDFW WKDW PXFK RI WKH ZRUOG ZDV XQGHU ORFNGRZQ LQ WKH ¿UVW
quarter of 2020, which hampered shipments of everything.
5LVLQJ GHPDQG DQG &29,' LQGXFHG VKRUWDJHV LQ PDWHULDOV DQG SURGXFWLRQ
FDSDFLW\ KDYH FRQVSLUHG WR FUHDWH D SHUIHFW VWRUP IRU $0' 760& VLPSO\ KDV QR
IDE FDSDFLW\ WR VSDUH DQG HYHQ LI LW GLG $0' PLJKW QRW QHFHVVDULO\ JHW WR XVH LW
ULJKW DZD\ 760& IDEV DOVR PDNH FKLSV IRU PDQ\ RWKHU FRPSDQLHV LQFOXGLQJ
Apple and Qualcomm. These clients typically book chip orders months or even
\HDUV LQ DGYDQFH DQG 760& &(2 & & :HL VDLG GXULQJ KLV FRPSDQ\¶V ODVW
HDUQLQJV FDOO WKDW LW LV ZLWQHVVLQJ ³VWURQJ GHPDQG´ IRU LWV PDQXIDFWXULQJ
FDSDELOLWLHV ZKLFK ZLOO NHHS FKLS VXSSOLHV WLJKW IRU DW OHDVW WKH QH[W PRQWKV
7KH WULFNOHGRZQ UHVXOW LV WKDW LW FDQ EH GL̇FXOW WR ¿QG 5\]HQ RU (S\F EDVHG
FRPSXWHUV :KLOH WKH 3DVVPDUN GDWD SDLQWV D URV\ SLFWXUH IRU $0' LQ WHUPV RI
WKH &38 SUHIHUHQFHV RI 3& SHUIRUPDQFH HQWKXVLDVWV PDQ\ FRQVXPHUV FDUH
PRUH DERXW ZKHWKHU WKH\ FDQ EX\ D EDVLF QHZ ODSWRS IRU KRPHZRUN RU =RRP
FDOOV ,Q WKLV UHVSHFW $0'¶V SLFWXUH LV QRW VR URV\ $FFRUGLQJ WR 0HUFXU\
5HVHDUFK WKH FRPSDQ\¶V FKLSV ZHUH LQ MXVW RI 3&V VROG LQ WKH VHFRQG
TXDUWHU RI GXULQJ WKH KHLJKW RI WKH SDQGHPLF 7KDW¶V XS VLJQL¿FDQWO\ IURP
RI QHZ 3&V VROG LQ EXW LW VWLOO UHSUHVHQWV D VPDOO VKDUH RI WKH PDUNHW
for new PCs.
Intel has faced production shortages as well, but the In other words,
output of its dedicated fabs has mitigated the situation. it’s too soon
Now, some industry watchers are predicting that the to declare
GL̆HULQJ PDQXIDFWXULQJ FDSDELOLWLHV RI WKH WZR that because
combatants will open new battlefronts in the future. As
Intel doubles down on its manufacturing strategy, everyone wants
LQFOXGLQJ FRPPLWWLQJ ELOOLRQ IRU WZR QHZ IDEV LQ PCs and AMD
$UL]RQD LW FRXOG DFWXDOO\ EH SOD\LQJ ULJKW LQWR $0'¶V can’t produce
hands. Loath to cede manufacturing prowess to Intel, chips fast
760& FRXOG DZDUG $0' PRUH PDQXIDFWXULQJ FDSDFLW\ enough, Intel
³FHPHQWLQJ WKH FRPSDQ\¶V [ SURFHVV WHFKQRORJ\ will benefit
OHDGHUVKLS IRU WKH IRUHVHHDEOH IXWXUH ´ DFFRUGLQJ WR
one analyst.
In other words, it’s too soon to declare that because
HYHU\RQH ZDQWV 3&V DQG $0' FDQ¶W SURGXFH FKLSV IDVW
HQRXJK ,QWHO ZLOO EHQH¿W ,QGHHG $0' DQQRXQFHG D
QHZ ³ '´ FKLS VWDFNLQJ WHFKQRORJ\ DW &RPSXWH[ LQ
-XQH WKDW WDNHV DGYDQWDJH RI 760&¶V ODWHVW
PDQXIDFWXULQJ FDSDELOLWLHV %\ DGGLQJ D VHFRQG OD\HU RI
FDFKH PHPRU\ RQ WRS RI WKH VWDQGDUG SURFHVVRU $0'
FDQ H̆HFWLYHO\ WULSOH WKH DPRXQW RI FDFKH WKH &38 FDQ
access, potentially reducing latency and speeding up
many applications. Intel is working on chip stacking
WRR EXW 760& VD\V LW LV WKHRUHWLFDOO\ FDSDEOH RI
SURGXFLQJ XS WR FKLS OD\HUV VR $0' KDV D ORW RI
headroom for future technical innovations.
The second unforeseen aspect that adds to the
FRPSOH[LW\ RI WKH $0' ,QWHO ULYDOU\ LV WKDW ,QWHO
corporate leadership, once a stable succession of
HQJLQHHUV WXUQHG H[HFXWLYHV KDV H[SHULHQFHG
XQSUHFHGHQWHG WXUQRYHU LQ UHFHQW \HDUV )ROORZLQJ WKH
UHWLUHPHQW RI &(2 3DXO 2WHOOLQL ZKRVH HPDLOV
OLWWHUHG &XRPR¶V WURYH WKH FRPSDQ\ KDV JRQH WKURXJK
WKUHH RWKHU WRS ERVVHV LQ HLJKW \HDUV %RE 6ZDQ ZKR
occupied the job for little more than a year before he
VWHSSHG GRZQ LQ )HEUXDU\ LQKHULWHG PDVVLYH
production problems and many suspicious employees, Intel CEO
QRW WR PHQWLRQ WKH FRPSHWLWLYH WKUHDW IURP $0' 6ZDQ Pat Gelsinger
attempted to improve internal communication and
FDPDUDGHULH XQYHLOLQJ D ³2QH ,QWHO´ VORJDQ DQG
H[WROOLQJ HPSOR\HHV WR KRQRU WUXWK DQG WUDQVSDUHQF\ LQ
WKHLU GHDOLQJV ZLWK FXVWRPHUV +H PDGH LW KLV PLVVLRQ WR
transform the company culture, pivoting it away from
$QG\ *URYH¶V ³RQO\ WKH SDUDQRLG VXUYLYH´ DSSURDFK
&XUUHQW &(2 3DW *HOVLQJHU KDV VR IDU HFKRHG
Grove in taking a more combative approach. Like
'U /LVD 6X *HOVLQJHU LV DQ HQJLQHHU ZLWK GHHS
URRWV LQ WKH VHPLFRQGXFWRU LQGXVWU\ +H VSHQW
decades working at Grove’s Intel, helping to
GHVLJQ JURXQGEUHDNLQJ SURFHVVRUV LQ WKH V
EHIRUH GHFDPSLQJ IRU (0& LQ %XW XQOLNH
'U 6X DQG KHU VKDNHXS DW $0' KH KDV JLYHQ QR
indication that Intel will undertake a major shift
away from its traditional research, development,
and manufacturing methods. Instead, Gelsinger
is doubling down on in-house fabs as a means of
FDWFKLQJ XS ZLWK $0' DQG 760& *HOVLQJHU DOVR
reportedly told employees in January that Intel
PXVW ³GHOLYHU EHWWHU SURGXFWV WR WKH 3& HFRV\VWHP
than any possible thing [made by] a lifestyle
FRPSDQ\ LQ &XSHUWLQR ´ D UHIHUHQFH WR $SSOH¶V
2020 decision to begin ditching Intel processors
LQ LWV 0DF GHVNWRSV DQG ODSWRSV LQ IDYRU RI
SURSULHWDU\ VLOLFRQ OLNH WKH 0 FKLS
COULD THIS FIERCE RIVALRY FIZZLE?
Indeed, it is Gelisinger’s swipe at Apple that represents
perhaps the biggest change to the terms of the Intel-
$0' ULYDOU\ RYHU WKH QH[W GHFDGH RU VR $V LPSUHVVLYH
DV $SSOH¶V 0 FKLS LV LW¶V WULYLDO LQ D ELJJHU PDUNHW
SLFWXUH VHQVH DW WKH PRPHQW²0DFV DUH D GURS LQ WKH
EXFNHW RI RYHUDOO 3& VDOHV ,QVWHDG LW¶V ZKDW WKH 0
represents that could have a lasting impact on the way
,QWHO DQG $0' GR EXVLQHVV /RQJWLPH ,QWHO DQG $0' Amazon,
clients may no longer rely on the two semiconductor Facebook,
veterans for all of their chip needs. and Google
are spending
The Apple shift away from Intel is just beginning, and small fortunes
VR DUH RWKHU H̆RUWV VXFK DV 4XDOFRPP¶V 6QDSGUDJRQ
FKLSV IRU 3&V %XW RQ WKH VHUYHU VLGH RI WKH LQGXVWU\ WKH to design
transformation has been underway for years. Amazon, their own
)DFHERRN DQG *RRJOH DUH VSHQGLQJ VPDOO IRUWXQHV WR server chips
design their own server chips that can power everything that can power
from simple data cold storage to machine-learning everything from
algorithms. Their performance capabilities aren’t simple data
DQ\WKLQJ WR ZULWH KRPH DERXW²$PD]RQ :HE 6HUYLFHV¶ cold storage
¿UVW FXVWRP FRUH SURFHVVRU ODXQFKHG LQ LV to machine-
UHSRUWHGO\ OHVV FDSDEOH WKDQ HYHQ ¿YH FRUHV RI ,QWHO¶V
;HRQ ( Y &38 IURP learning
algorithms.
%XW LI $0' DQG ,QWHO DUH WHPSWHG WR JORDW LW ZRXOG EH
to their own detriment. This is no longer purely a game
RI ;HRQ YHUVXV (S\F DQG 2SHUWRQ LQ WKH VHUYHU PDUNHW
(YHQ LI WKH $:6 FKLS FDQ¶W PDWFK D ;HRQ¶V SRZHU LW
requires no sales agreement and no middlemen. And
plenty of servers don’t require powerful silicon at all,
LQVWHDG UXQQLQJ RQO\ VSHFLDOL]HG DUWL¿FLDO LQWHOOLJHQFH
ERRVWHG DSSOLFDWLRQV *RRJOH¶V 7HQVRU)ORZ VHUYHU FKLSV DUH ³DQ RUGHU RI Photo credit: Google
PDJQLWXGH KLJKHU SHUIRUPDQFH SHU ZDWW WKDQ FRPPHUFLDO )3*$V DQG *38V ´
&(2 6XQGDU 3LFKDL FODLPHG LQ UHIHUULQJ WR WKH ¿HOG SURJUDPPDEOH JDWH
DUUD\V DQG JUDSKLFV SURFHVVRUV WKDW ,QWHO $0' DQG RWKHU VLOLFRQ YHWHUDQV R̆HU
to server customers.
Google tensor
processing unit
The fact that Amazon, Apple, Google, and other tech giants can now design
WKHLU RZQ SURFHVVRUV LI ,QWHO DQG $0' GRQ¶W R̆HU VXLWDEOH VROXWLRQV FRXOG
profoundly alter the semiconductor industry at a time when its veterans are
facing protracted silicon supply problems. If that happens, a rebate scheme that
runs afoul of anti-monopoly rules would be a quaint anachronism rather than a
ELOOLRQ GROODU EOXQGHU 7KHUH ZRXOG EH QR SRVLWLRQ WR PRQRSROL]H 5DWKHU WKDQ
ORFNLQJ KRUQV $0' DQG ,QWHO FRXOG TXLFNO\ ¿QG WKHPVHOYHV FLUFOLQJ WKH ZDJRQV
WR ZDUG R̆ FRPSHWLWLRQ IURP GR]HQV RI SULYDWH ODEHO SURFHVVRUV
It’s a bittersweet vision from the perspective of PC enthusiasts and old-school
,7 H[HFV 7R PDQ\ WKH GHFDGHV ORQJ $0' ,QWHO ULYDOU\ LV VRPHWKLQJ RI D
SDVWLPH 7R ODZ\HUV DQG 2(0V LW ZDV RFFDVLRQDOO\ D YHU\ SUR¿WDEOH RQH %XW LI
budding silicon from the likes of Apple and Amazon already rival that of
FRPSDQLHV ZLWK GHFDGHV RI H[SHULHQFH LQ VHPLFRQGXFWRU HQJLQHHULQJ WKHUH
PLJKW QRW EH DQ RSSRUWXQLW\ OHIW IRU HLWKHU $0' RU ,QWHO WR GRQ D FURZQ LQ WKH
decade to come.
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
TIPS & HOW TOS
VPNS
How To Install a VPN
on Your Router
BY DANIEL BRAME
T hese days, you need as much internet security as you can get. From
telecommuting to simply watching your favorite show on a smart TV,
the average consumer’s attack surface is three to four times the size as
it was when most of us had only one PC. That’s not only a worry—it’s also a
chore, since you need to install protective software on all those devices. But
while you can’t get around installing separate antivirus software on every
device, you can at least make your virtual private network (VPN) concerns less
aggravating by skipping the per-device procedure and simply installing a
blanket VPN on your router.
WHY GET A VPN? You’ve got a
VPNs are internet security must-haves for a number of scenario where
reasons. First, they make your computer appear as if it’s
in a geographic location other than where you actually your location
are. That’s because you’re logging into a server operated is hidden and
by the VPN provider and then running your web sessions your encrypted
from there. So when cookies or Big Bad Government traffic stream
Agencies try to locate you from your web activities, is ridiculously
WKH\¶OO ¿QG WKH 931 SURYLGHU¶V VHUYHU QRW \RX (YHQ
better, hundreds or thousands of people will be doing difficult to
the same thing using the same server. pick out.
But VPNs do more than anonymize your session—they
DOVR HQFU\SW \RXU WUḊF 931V FDQ XVH D YDULHW\ RI
GL̆HUHQW HQFU\SWLRQ PHWKRGV EXW WKH PRVW SRSXODU LV
WKH $(6 ELW RU ELW VWDQGDUG &RPELQH WKDW ZLWK
anonymization, and you’ve got a scenario where your
ORFDWLRQ LV KLGGHQ DQG \RXU LQGLYLGXDO HQFU\SWHG WUḊF
VWUHDP LV ULGLFXORXVO\ GL̇FXOW WR SLFN RXW EHFDXVH \RXU
stream of encrypted gobbledygook is one of hundreds or
thousands of other streams of encrypted gobbledygook
pouring into and out of that same server farm.
7KDW¶V WKH GUDZ RI D 931 <RX JHW DOO WKRVH EHQH¿WV MXVW
by installing a simple web client on your device and
making sure it’s active before starting any other web or
cloud session.
But if your home has multiple devices, especially if you
think some of them might be running connected
software that starts before you’ve even had a chance to
activate your VPN, something more constant might be
required. That’s when you opt for installing a VPN client
on your wireless router; anyone using your local network
to browse the web or access a cloud service will
automatically be using the VPN, because they can’t
JHW RXW WR WKH LQWHUQHW ZLWKRXW MXPSLQJ WKURXJK WKDW
always-on hoop.
MANY KINDS OF VPN ROUTERS
Today, while some routers support connecting to VPN services via OpenVPN or
WKH 3RLQW WR 3RLQW 7XQQHOLQJ 3URWRFRO 3373 \RX SUREDEO\ ZRQ¶W ¿QG WKLV
feature on most consumer-oriented routers. It’s also not a lightweight chore to
FRQ¿JXUH 6RPH RI WKH PRUH H[SHQVLYH URXWHUV ZLOO VXSSRUW 931V XVLQJ WKRVH
features, especially if the manufacturer is looking to sell them into small
businesses as well as homes.
Also, a few (growing) number of VPN providers have taken on the task of
PDNLQJ VXUH \RX FDQ LQVWDOO WKHLU 931 FOLHQW RQ D URXWHU¶V ¿UPZDUH²PRUH RQ
that below. But those clients usually aren’t universal, so you’ll need a router
from the VPN provider’s compatibility list. While that’s great, you’re probably
happy with your current router, and dropping the bucks for a whole new router
MXVW WR JHW D 931 FOLHQW PLJKW QRW EH DQ DWWUDFWLYH RSWLRQ
7KLV OHDYHV \RX WR KXQW IRU DOWHUQDWLYH ¿UPZDUH WKDW¶OO VXSSRUW HLWKHU 2SHQ931
or your chosen VPN provider’s client. The most popular of these is DD-WRT,
though another option is Tomato, for those who have a Broadcom-based router.
DD-WRT is the more mature of the two and works on many routers, both old
and new.
$OWHUQDWLYHO\ \RX FDQ WXUQ DQ ROG [ 3& LQWR D URXWHU E\ DGGLQJ DQ H[WUD
QHWZRUN SRUW YLD DQ H[SDQVLRQ FDUG DQG WKHQ LQVWDOOLQJ '' :57 RQ WKDW 7KLV
does take a bit of additional work, but if you’ve got the chops, it’s a great way of
building yourself a highly customizable and very capable router without much
added cost.
Most folks, however, will stick to installing DD-WRT on their compatible
router, which is not only what it’s intended to do but is also a great way to
XSGDWH DQG H[SDQG \RXU QHWZRUNLQJ FDSDELOLWLHV 7KH RQO\ GRZQVLGH RI XVLQJ
your router this way is that you can void your warranty, or worse, render the
router completely inoperable if things go very wrong. The best way to avoid this
is to make sure you’re installing DD-WRT on a router that’s not only supported
but has been supported for a good, long while.
7KH ORQJHU \RXU URXWHU¶V EHHQ VXSSRUWHG WKH VPRRWKHU WKH ¿UPZDUH LQVWDOO ZLOO
go, since the development team will have had lots of time to smooth out any
NLQNV <RX VKRXOG DOVR ¿QG D VXSSRUW IRUXP ZLWK XVHUV IDPLOLDU ZLWK ERWK \RXU
router and DD-WRT. Some router manufacturers have such forums connected
WR WKHLU VXSSRUW SDJHV EXW PRUH RIWHQ \RX¶OO ¿QG WKHP LQ LQGHSHQGHQW ZHE
locations, such as the main DD-WRT website or Reddit.
To write this article, I upgraded three routers. Two of them carried the Linksys
EUDQG²QDPHO\ WKH /$3$& $& 'XDO %DQG $FFHVV 3RLQW DQG WKH
:57 $& Y :KLOH WKH XSJUDGH RQ WKH /$3$& IDLOHG SUREDEO\
EHFDXVH LW¶V QRW D IXOO ÀHGJHG URXWHU WKH SURFHVV ZRUNHG ¿QH RQ WKH
:57 $& )RU JULQV , GHFLGHG WR GR DQRWKHU LQVWDOODWLRQ RQ DQ ROG JHQHULF
:LQGRZV 3& WKDW , RXW¿WWHG ZLWK WZR JLJDELW QHWZRUN LQWHUIDFH FDUGV 1,&V
7KDW SURFHVV DOVR ZHQW ¿QH DQG ZKLOH LW¶V FHUWDLQO\ EXONLHU WKDQ WKH
:57 $& LW¶V VWLOO WKH IDVWHU RI WKH WZR
GETTING TO YOUR ROUTER CONFIGURATION
(YHU\ URXWHU LV D OLWWOH ELW GL̆HUHQW EXW PRVW /LQNV\V URXWHUV IROORZ D VLPLODU
SDWWHUQ ZKHQ LW FRPHV WR ORJLQ DQG PDNLQJ FKDQJHV WR WKH FRQ¿JXUDWLRQ 7KDW
SURFHVV LV DOVR VLPLODU WR ZKDW \RX¶OO ¿QG RQ PRVW RWKHU URXWHU EUDQGV WRR VR
LW¶V D JRRG H[DPSOH IRU WKLV DUWLFOH 7KH ¿UVW WKLQJ WR GR LV ¿JXUH RXW ZKDW \RXU
URXWHU¶V LQWHUQHW 3URWRFRO ,3 DGGUHVV LV 7R GR WKLV RQ 0LFURVRIW :LQGRZV
FOLFN WKH 6WDUW PHQX W\SH LQ &RPPDQG 3URPSW DQG FOLFN (QWHU 7KHQ W\SH LQ
LSFRQ¿J DQG FOLFN (QWHU DJDLQ <RX VKRXOG VHH WKH VDPH WKLQJ DV LQ WKH
VFUHHQVKRW EHORZ WKRXJK ZLWK GL̆HUHQW DGGUHVV QXPEHUV <RXU URXWHU¶V ,3
DGGUHVV ZLOO EH OLVWHG DV WKH 'HIDXOW *DWHZD\ +HUH WKDW¶V
1H[W RSHQ \RXU EURZVHU DQG W\SH LQ \RXU URXWHU¶V ,3 DGGUHVV DV WKH 85/
KWWS ?? 7KDW¶OO JHW \RX WR D ORJLQ SURPSW IRU \RXU URXWHU¶V
administration console. If you’ve never changed the username and password
You’ll encounter
this screen when
searching for your
router’s IP address
on a Windows 10 PC.
for your router, then looking up your router model on Head to your
the Linksys website should lead you to a support page router maker’s
where the default credentials are listed. If it’s not
/LQNV\V WKHQ MXVW ¿QG \RXU RULJLQDO LQVWDOODWLRQ website and
LQVWUXFWLRQV IURP ZKHQ \RX ¿UVW LQVWDOOHG WKH URXWHU find the
and the default credentials will be there. If that
document is long gone, then head over to your router instructions
PDNHU¶V ZHEVLWH DQG ¿QG WKH LQVWUXFWLRQV IRU VHWWLQJ for setting
your router back to factory defaults. The default your router
credentials should be there, too. If that doesn’t work,
you’ll need to call your router’s support line and ask. back to factory
defaults.
Once you get access to the router’s administrator
IXQFWLRQV \RX¶OO ZDQW WR ¿QG WKH FRQVROH WKDW DOORZV D
¿UPZDUH XSGDWH *HQHUDOO\ WKLV ZLOO EH IRXQG XQGHU
WKH $GPLQLVWUDWLRQ WDE )RU VSHFL¿F LQVWUXFWLRQV IRU
Linksys routers, check the company’s website. Other
router vendors will have similar instructions available
on their support pages.
Linksys provides
intructions on
how to upgrade
its routers’
firmware.
DOWNLOADING AND INSTALLING DD-WRT
This step is arguably the most important, since you can
potentially “brick” (that is, render inoperable) your
router if anything goes wrong. This could happen
EHFDXVH RI LQFRPSDWLELOLW\ RQ WKH VRIWZDUH VLGH RU EHFDXVH \RX VX̆HU D SRZHU
RXWDJH DW D FULWLFDO VWHS RI WKH XSGDWH SURFHVV ,¶P QRW WU\LQJ WR VFDUH \RX R̆²
WKH YDVW PDMRULW\ RI '' :57 LQVWDOOV UXQ MXVW ¿QH²EXW WKH UHDOLW\ LV WKDW
VRPHWKLQJ EDG FRXOG KDSSHQ WR WKH URXWHU VR SOHDVH H[HUFLVH FDXWLRQ
Navigate to this page (https://dd-wrt.com/support/router-database/) and enter
your router’s model name. You’ll get a list of potential candidates. Pick the one
that matches your router’s brand and model number, and then download the
ELQ ¿OH
From the
Linksys
website
1RZ IURP WKH )LUPZDUH 8SGDWH VFUHHQ XSORDG WKH ELQ ¿OH DQG ZDLW ,I
HYHU\WKLQJ ZRUNHG DV LW VKRXOG WKHQ \RXU URXWHU ZLOO EH UXQQLQJ '' :57 DQG
is therefore compatible with OpenVPN. If things go south, and your router
decides that you aren’t on speaking terms anymore, don’t panic. That happened
WR PH ZKHQ , WULHG XSJUDGLQJ WKH /LQNV\V /$3$& $FFHVV 3RLQW -XVW GR
ZKDW , GLG *R WR WKLV SDJH KWWSV ZLNL GG ZUW FRP ZLNL LQGH[ SKS 5HFRYHUB
IURPBDB%DGB)ODVK DQG IROORZ WKH LQVWUXFWLRQV H[DFWO\ :LWK DQ\ OXFN \RX¶OO
get back to a good starting place to try again.
Once everything lights up the way it’s supposed to, the default IP address of a
QHZ '' :57 LQVWDOO LV KWWS $JDLQ HQWHU WKDW DGGUHVV LQWR \RXU
3&¶V ZHE EURZVHU DV D 85/ DQG \RX¶OO VHH D VFUHHQ WKDW SURPSWV \RX WR UHVHW
the default username and password. After that step, you can move on to the
EDVLFV RI \RXU QHZ URXWHU¶V FRQ¿JXUDWLRQ SURFHVV )RU EXVLQHVV XVHUV DQG WKRVH
ZLWK PRUH DGYDQFHG QHWZRUN UHTXLUHPHQWV '' :57 R̆HUV D ORW RI DGYDQFHG
possibilities, so running through everything is beyond the scope of this article.
DD-WRT offers
a lot of
advanced
possibilities.
But for most home and small business implementations, you’ll need to set the
connection type for your wide area network (WAN), which really means your
internet provider. Generally speaking, this will usually be found under the
'\QDPLF +RVW &RQ¿JXUDWLRQ 3URWRFRO '+&3 VR LI \RX DUHQ¶W VXUH WKDW¶V D
good place to start.
SETTING UP THE VPN CLIENT
First, get your router talking to the internet on one side and your local area
network on the other. Then set up any more advanced network settings you
need, such as Quality of Service (QoS) or access controls. Only when the router
is fully humming should you consider installing your VPN client.
To do that, you will need to navigate to the VPN tab under Services. From there,
FKHFN WKH (QDEOH %XEEOH QH[W WR ³6WDUW 2SHQ 931 &OLHQW ´ $W WKLV SRLQW WKHUH LV
QR VLQJOH VHW RI LQVWUXFWLRQV WR PDNH WKLV ZRUN -XVW IROORZ WKH LQVWUXFWLRQV IRU
your VPN brand, and you’ll be right on track.
CHECK YOUR HANDIWORK
DD-WRT has a nice Status tab with a VPN section that shows whether you’re
FRQQHFWHG DQG HYHU\WKLQJ ZRUNHG DV DQWLFLSDWHG ,I \RX ZDQW WR JR WKH H[WUD
mile, then you can check your IP by typing “What is my IP?” into Google. You
VKRXOG JHW VRPHWKLQJ EDFN WKDW¶V GL̆HUHQW WKDQ ZKDW \RX VWDUWHG ZLWK VLQFH
\RX¶OO EH VXU¿QJ WR *RRJOH IURP \RXU 931 YHQGRU¶V VHUYHU UDWKHU WKDQ \RXU 3& LI
\RXU 931 LV ZRUNLQJ SURSHUO\ ,I WKDW KDSSHQV JUHDW MRE <RX FDQ QRZ EURZVH
the web with more anonymity on all your connected devices.
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
TIPS & HOW TOS
SHOPPING
The Best Shopping Apps
to Compare Prices
BY CHANDRA STEELE
S hopping online isn’t as simple as it seems. With so many places to buy
the same product, you want to be sure that when you hit “purchase,”
you’ve secured the best price. That’s where price-comparison apps
come in. A quick search can make sure you’ve found the best bargain and
maybe even an additional coupon code. There are plenty of price-comparison
apps to help, and we’ve shopped around for the best of them.
ShopSavvy
(Available on iOS, Android)
Shop smarter with ShopSavvy. The app lets you search for the items you are
interested in buying and see how much they are both in stores and online. You
FDQ DOVR EURZVH WKURXJK XVHU UHYLHZV DQG ¿QG RXW ZKHQ PDMRU VWRUHV DUH
holding sales.
BuyVia
(Available on iOS, Android)
Buying tech products? BuyVia compares prices at national and local outlets and
lets you set up alerts (including location-based) for products. When you’re in a
VWRUH DQG XQVXUH LI WKH SULFH RQ WKH VKHOI LV WKH ORZHVW \RX FDQ ¿QG XVH WKH 83&
EDUFRGH VFDQQHU WR JHW DQ DQVZHU RQ WKH VSRW %X\9LD DOVR VLPSOL¿HV WHFK MDUJRQ
IRU JLIW EX\HUV DQG TXRWHV UHYLHZV LQFOXGLQJ 3&0DJ¶V LQ LWV SURGXFW
descriptions, recommending who it would make a good gift for and how they
can use it.
Price.com
(Available on iOS)
3ULFH FRP VHDUFKHV WKH ELJ VLWHV DQG WKH VPDOO IRU WKH ORZHVW SULFHV FRXSRQ
codes, and recommendations. It has a barcode scanner but also lets you search
from photos you’ve snapped. So if you’re looking to replace, say, a speaker, take
a picture of your current one and suggestions pop up.
Mycartsavings
(Available on iOS, Android)
:KHWKHU \RXU FDUW LV RQOLQH RU ,5/ 0\FDUWVDYLQJV KDV D EDVNHWIXO RI ERXQW\ IRU
you. The app will track the price of an item and alert you when it reaches the
amount you’re willing to pay. If you’re multitasking, you can search the app
with your voice.
Amazon
(Available on iOS, Android)
The Amazon app has a barcode scanner you can use when you’re in a store to
¿QG WKH LWHP RQ $PD]RQ DQG FKHFN LWV SULFH &KRRVH WKH FDPHUD LFRQ QH[W WR WKH
VHDUFK EDU DQG KROG LW RYHU D EDUFRGH 7KH DSS DOVR LQFOXGHV $OH[D ZKLFK FDQ
play music or audiobooks while you shop.
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
TIPS & HOW TOS
PRIVACY
How to Manage Your
Google Privacy Settings
BY ERIC GRIFFITH
A privacy policy is meant to be a contract between you and a company—
big tech companies in particular—that ensures these companies are
keeping your data safe. One company that has an enormous amount
of your data, from email and photos to videos to documents, is Google.
The Google Privacy Policy has been “updated” 37 times since its inception in
1999; updates typically happen three or four times a year. To its credit, Google
makes all the changes in the policy pretty obvious and provides an archive of all
previous policies.
It can and will change to suit Google, or to suit new laws and regulations Google
has to follow. For example, in 2018, the General Data Protection Regulation
(GDPR) completely changed how big companies handle customer data. Even
though it’s an EU regulation, the GDPR touched any company with personally
LGHQWL¿DEOH LQIR 3,, RQ FXVWRPHUV WKHUH 7KDW¶V GH¿QLWHO\ *RRJOH
GDPR doesn’t necessarily help those of us in the United States, but there are
ways to take control of what Google has on you. That means mastering your
Google My Account dashboard.
CONTROLLING YOUR GOOGLE PRIVACY
My Account is meant to be a one-stop spot to take control of your privacy and
security when it comes to this monolithic company. Rather than visiting
settings for every individual Google service—Gmail, Google Drive, Android
phones, the Chrome browser(s), YouTube, and a hundred others—you change
global settings here. Mostly.
Go to My Account and do two things right away: a Security Checkup and a
Privacy Checkup.
If you have multiple Google accounts—say, one for work and one you use
personally—choose the one you want to check from the menu at the upper-right
RI WKH GHVNWRS VFUHHQ 8VLQJ D GL̆HUHQW DYDWDU SKRWR IRU HDFK DFFRXQW ZLOO KHOS
you better distinguish between them.)
2Q WKH 0\ $FFRXQW SDJH WKH 85/ ZLOO EH D OLWWOH GL̆HUHQW IRU HDFK *RRJOH
account you have. It’ll end with /u/0 for the default account, /u/1 for the
second, and so forth. Do a security check for each account.
Find Security Checkup at security.google.com/settings/security/secureaccount
(or click Take action in the Critical Security issues found box).
It will take you through a number of cards to check items such as:
• Your devices (what’s signed in to the account)
• Known compromised passwords you’ve saved
• Third-party access
• Recent security activity
• 6WHS 9HUL¿FDWLRQ ZKHWKHU LW¶V RQ RU QRW
• Gmail settings
Any items marked with a yellow or red warning (an exclamation point in a
circle) should get a once-over. For example, when you see devices you no longer
use listed under Your Devices, nix them. Third-party access lists apps and
services that have access to your Google data, some of which could be
problematic. Delete those, too.
The Your saved passwords section R̆HUV D FKHFN RQ WKH SDVVZRUGV VWRUHG
in your browser, which is probably Google’s Chrome. This is invaluable, because
Google can tell you which passwords have been leaked or hacked and whether
you’re still using them. Click Go to Password Checkup and run it. It’ll show
you not only compromised passwords but also reused passwords (that’s a big
no-no) and accounts using weak passwords. Take an evening to change them all
(and start using a password manager, while you’re at it).
,I \RX KDYHQ¶W DOUHDG\ DFWLYDWHG VWHS YHUL¿FDWLRQ GR VR 1HZ DFFRXQWV VKRXOG
VRRQ EH JHWWLQJ VWHS YHUL¿FDWLRQ DXWRPDWLFDOO\ :LWK WZR IDFWRU
authentication (2FA) activated, you can’t sign into your Google account with a
password alone; you’ll need a secondary method of authentication. It adds an
extra step, but if someone guesses or steals your password, that won’t be
enough information to sign into your account.
To authenticate, you’ll receive a code sent via voice or You can grab
text message or displayed inside an authenticator app. backup key
Or select the Google “prompt” feature, which displays a
QRWL¿FDWLRQ RQ \RXU SKRQH DVNLQJ ZKHWKHU \RX¶UH WU\LQJ codes for those
WR VLJQ LQWR \RXU DFFRXQW 7R ¿QG WKH SURPSW RSHQ WKH times when
Google or Gmail app on your phone; tap yes.
you can’t use
Security Checkup is also a good place to set up extra your phone
security options; backup phone numbers, for example. or set up a
Here, you can grab backup key codes for those times hardware
when you can’t use your phone or set up a hardware
security key. Scroll to Your Devices and revoke them all security key.
if you want to force a full 2FA login on all future devices.
If you’ve created any app passwords—unique
SDVVZRUGV IRU VSHFL¿F VHUYLFHV WKDW GRQ¶W XVH WUDGLWLRQDO
Gmail logins, such as game consoles—revoke them as
needed. This is also where you generate new app
passwords, but with most modern hardware, they’re a
WKLQJ RI WKH SDVW 0DNH VXUH \RX¶YH ¿OOHG LQ WKH
Account recovery options with a recovery email and
phone number preferably not related to Google.
Third-party access is a review of the apps, websites,
and devices connected via your Google account
credentials or with access to your account. It could be
something as obscure as a Google Chrome extension
that works with Gmail or some Google Docs add-on that
you don’t remember installing. Remove any you’re not
using or don’t recognize. If you get rid of something you
need, you can always give it permission again later.
Corporate users can also see the Advanced
Protection Program option, which protects against
targeted phishing attacks and much more.
:KHQ \RX¶UH GRQH LQ WKH 6HFXULW\ &KHFNXS JR EDFN WR
My Account and under Personal Info > Password, Google will tell you how
long it’s been since you last changed your Google account password. If it’s been
over a year, consider yourself thoroughly disgraced in the eyes of the tech gods.
Change it right now.
PRIVACY CHECKUP
Back at the My Account page, under Privacy suggestions available, click Review
Suggestions to start a multi-step Privacy Checkup that lets you review how
*RRJOH XVHV \RXU GDWD 6XJJHVWLRQV DUH R̆HUHG DW WKH WRS RI WKH SDJH EXW VFUROO
down to hit all the key privacy settings available.
Set up an auto-delete on use of your Location History. Keeping a Location
History that spans across all the devices that use your Google account can be
KDQG\²VD\ IRU UH ¿QGLQJ SODFHV \RX¶YH EHHQ DQG ZDQW WR JR WR DJDLQ XVLQJ
Google Maps. But it’s also one of many data points on you that Google can use
for targeted ads. You can set up auto-delete with a click or skip it.
In fact, you can instruct Google not to track Web & App Activity or to easily
delete it after a few months. That goes for all the info Google collects any time
you use any Google service or product. Ads in various spots will not be very
targeted and seem random after that, but that’s how advertising worked for
hundreds of years before the internet and Madison Avenue teamed up.
:KHQ \RX DXWRPDWLFDOO\ GHOHWH \RXU YouTube history, then the videos you
like and save, the channels to which you subscribe, and what shows up on your
<RX7XEH DFWLYLW\ IHHG DUH DOO D̆HFWHG ,W FDQ DOVR OLPLW ZKDW KDSSHQV RQ
connected accounts (such as Twitter) and manage the privacy of videos you
upload (public, private, or unlisted).
The Google Photos SULYDF\ RSWLRQ WKDW FRPHV QH[W LV OLPLWHG WR WXUQLQJ R̆ WKH
ability for better face-matching and another important option: removing geo-
location on items shared by a link. That means when you share a photo of
yourself, a stalker type can’t look at the metadata on the image and pinpoint
\RXU ORFDWLRQ 1RWH WKDW LW DSSOLHV RQO\ WR FRQWHQW VKDUHG YLD D OLQN
The Help People Connect with you option is about hiding your registered
SKRQH QXPEHUV RQ *RRJOH VR WKH\ FDQ¶W EH XVHG E\ RWKHUV WR ¿QG \RX IRU WKLQJV
such as video chats. If you have a Google Voice account, it will also appear here.
Uncheck all the boxes to make them private.
:KHQ \RX JR EDFN WR 0\ $FFRXQW DQG FOLFN Data & Personalization, you’ll
¿QG RWKHU VHWWLQJV WR WZHDN WKDW DUH DOVR LPSRUWDQW WR SULYDF\ HYHQ WKRXJK WKH\
aren’t part of the privacy checkup. For example, Ad Settings let you fully check
if Google’s commercials are personalized for you (which means more tracking of
your data) or not.
Be sure to check the Inactive Account Manager. It helps you plan ahead for
the day your account becomes inactive. Google will help you determine when
that inactivity kicks in—after 3, 6, 9, or 12 months of you not using Google
tools—and you can set up the account to be shared with someone you trust.
PERSONALIZATION MATTERS
Back at the My Account section, hit Data & Personalization. This is the
nitty-gritty of preventing your personal data and Google usage from being used.
Google says this data is used only to help your future activities, but it is
essentially how Google learns about you, and that future help is for how you use
its products, such as Google Maps or Google Assistant. This is how those tools
seem to know what you want before you even ask. (You’ll see a lot of overlap
here from what you found in the privacy and security checkups above.)
A check mark appears next to all the items collecting data, but you can toggle
WKHP R̆ (DFK VHFWLRQ LQFOXGHV D OLQN WKDW UHDGV ³0DQDJH $FWLYLW\´ ZLWK
GL̆HUHQW RSWLRQV IRU HDFK 8QGHU Location History > Manage Activity, for
example, you’ll see what’s called the Google Maps Timeline: a map displaying
locations where you were logged into Google. Mine showed trips to Florida from
years past, my time in the Mediterranean on a cruise, and of course, all stops
around my home state. There’s even route info if you used Google Maps to get
somewhere. Limit it all if you don’t think it’s helping you.
Consider limiting your location services, so Google (and Apple, Microsoft,
Facebook, and so on) stop tracking your physical presence via your phone.
Remember, Google makes the majority of its billions by showing you ads in
search results, on its other products, and across the internet. You’re not going to
WXUQ DGYHUWLVLQJ R̆ KHUH IRU WKDW \RX QHHG DQ DG EORFNHU SURJUDP $OO \RX FDQ
do is limit how much you are targeted.
You can click Go to Ad Settings to see the list of topics you (supposedly) like.
&OLFN WKH LFRQ QH[W WR DQ\ WRSLFV WKDW \RX GRQ¶W IHHO DFWXDO D̆HFWLRQ IRU 2U KLW
WKH WRJJOH XS WRS WR WXUQ R̆ DOO SHUVRQDOL]DWLRQ WKRXJK *RRJOH ZLOO SRS XS D
warning about why it will make ads you see “less useful.” You can set your
gender (which you can customize!) and age. Visit AdChoices, and you can opt
out of personalized Google Ads on non-Google sites.
MY ACTIVITY
If you want to see all your activity in one place, not just separated by service,
check out myactivity.google.com, which shows you everything you’ve done
that’s remotely Google-related. The amount of data is pretty staggering.
:DQW WR GHOHWH D GD\¶V RU GDWH UDQJH¶V ZRUWK RI GDWD" 2U HUDVH DOO \RXU GDWD E\
*RRJOH SURGXFW VR \RX ORVH <RX7XEH DFWLYLW\ IRU H[DPSOH EXW QRWKLQJ HOVH "
Do it. You can even pick a keyword to search and delete the related activity.
Click the Delete activity by link in the left navigation.
TAKEOUT YOUR DATA
:RQGHULQJ H[DFWO\ ZKDW *RRJOH KDV RQ \RX" 'RZQORDG DOO WKH GDWD DQG FKHFN LW
out via Google Takeout. To be clear, this doesn’t remove any data from Google
servers—it just shows you what Google has stored. Even if you should delete
your account, it’s unlikely all this data gets deleted entirely. Maybe someday,
the US will have GDPR-like laws that force Google to allow that. For now, go to
takeout.google.com. You’ll see the giant list of products Alphabet (Google’s
SDUHQW FRPSDQ\ R̆HUV DQG RI ZKLFK \RX DUH SUREDEO\ D FXVWRPHU
Untoggle any that you don’t care about, and click Next step at the bottom of
WKH SDJH <RX¶UH R̆HUHG DQ DUFKLYH ¿OH LQ =,3 RU 7*= IRUPDW \RX FDQ VHW D
maximum size for the archive, up to 50GB. If you have more than that stored
ZLWK *RRJOH \RX¶OO KDYH WR GRZQORDG PXOWLSOH ¿OHV <RX FDQ KDYH D OLQN HPDLOHG
WR \RX RU WR KDYH WKH ¿OHV VHQW GLUHFWO\ WR *RRJOH 'ULYH 'URSER[ %R[ RU
Microsoft OneDrive. Be patient: This could take hours or days.
Most of what I got was an archive of Gmail messages, which is not something
you can use instantly. That’s because the email archive comes in one big MBOX
IRUPDW ¿OH 7KH HDVLHVW ZD\ WR DFFHVV DOO WKRVH ROG PHVVDJHV LV WR JHW D IUHH
desktop email client with native MBOX support, such as Mozilla Thunderbird,
DYDLODEOH IRU :LQGRZV 0DF RU /LQX[ LQ DOPRVW DQ\ ODQJXDJH
Google Drive documents were, however, instantly usable—they all arrive
FRQYHUWHG LQWR WKHLU 0LFURVRIW 2̇FH IRUPDW HTXLYDOHQWV 'RLQJ D 7DNHRXW RI
WKLV GDWD LV D PXVW LI \RX¶UH OHDYLQJ D FRPSDQ\ WKDW XVHV *RRJOH :RUNVSDFH
(formerly G Suite.)
1RZ LPDJLQH \RX¶YH XSORDGHG RU FUHDWHG \HDUV¶ ZRUWK RI You could
YouTube videos, Hangouts chats, documents in Drive, always just
images on Google Photos, and more. It gets big, fast. All delete your
of that data is on servers to help Google make a perfect entire Google
SUR¿OH RI \RX account and
walk away.
OTHER TIPS FOR PRIVACY But that’s a
Remember, almost every browser has a privacy mode— bit drastic.
Google Chrome calls it Incognito—in which you can surf
without cookies or anything else tracking you. Even the
mobile browsers on smartphones support it.
You could always just delete your entire Google account
and walk away. But that’s a bit drastic, especially since
there are literally hundreds of sites and services that use
your Google credentials for logins.
:KDWHYHU \RXU IHHOLQJV DERXW SULYDF\ LW EHKRRYHV \RX
to take a glance through the settings above. You’re
ERXQG WR ¿QG VRPHWKLQJ *RRJOH¶V GRLQJ WKDW GRHVQ¶W VLW
right. Be thankful it gives us as much control over
privacy as it does (or maybe thank the regulators who
force Google’s hand). It’s still not enough for the truly
security and privacy obsessed, but it helps with a
balance of feeling good while getting the most out of the
RWKHUZLVH H[FHOOHQW VHUYLFHV WKH FRPSDQ\ R̆HUV
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
WHAT’S NEW NOW
THE WHY AXIS
What Will Be the Highest-
Paying IT Career 5 Years
From Now? BY OLIVER RIST
During and since the pandemic, many workers have considered a job
change, often to keep working from home: As many businesses
PDQGDWH D UHWXUQ WR WKH ṘFH WKHLU HPSOR\HHV ZRXOG UDWKHU FKDQJH
jobs than go back to their cubes. If you’re among these adventurers, and you’re
HYHQ D OLWWOH WHFK VDYY\ \RX QRW RQO\ KDYH RSWLRQV²\RX FDQ DOVR WXUQ D MRE
FKDQJH LQWR D VLJQL¿FDQW VDODU\ ERRVW E\ IRFXVLQJ RQ F\EHUVHFXULW\
7KHUH DUH D VHULHV RI KLJK SD\LQJ ,7 VNLOOV \RX FRXOG FKDVH EXW QRQH KDYH PRUH
SRWHQWLDO WKDQ VHFXULW\ %DVHG RQ DQ 2FWREHU VWXG\ IURP %XUQLQJ *ODVV
7HFKQRORJLHV GHSHQGLQJ RQ WKH VHFXULW\ VNLOO \RX GHFLGH WR FKDVH \RX¶OO VHH
¿YH \HDU SURMHFWHG JURZWK XS WR DQG D VLJQL¿FDQW This skill is
SRWHQWLDO DQQXDO VDODU\ EXPS RQ DYHUDJH EHWZHHQ best if you’re
DQG GHSHQGLQJ RQ WKH GLVFLSOLQH
currently a
7KH DUHD ZLWK WKH PRVW SRWHQWLDO LV DSSOLFDWLRQ developer,
GHYHORSPHQW VHFXULW\ DQG LW¶V SUREDEO\ WKH RQH WKDW¶OO since you’ll be
get you the most thanks from customers and users, focusing on
VLQFH \RX¶OO EH PDNLQJ WKHLU DSSV DQG FORXG VHUYLFHV making code as
VDIHU 7KLV VNLOO LV EHVW LI \RX¶UH FXUUHQWO\ D GHYHORSHU bulletproof as
VLQFH \RX¶OO EH IRFXVLQJ RQ PDNLQJ FRGH DV EXOOHWSURRI
DV SRVVLEOH possible.
&ORXG VHFXULW\ LV WKH QH[W DUHD ZLWK WKH PRVW SRWHQWLDO
JURZWK DQG LV OLNHO\ WKH EHVW ¿W IRU JHQHUDOLVW ,7 SURV
ORRNLQJ WR PRYH LQWR 'HY2SV DQG VRIWZDUH GH¿QHG
QHWZRUNLQJ 6'1 %XW LW¶V DOVR D JRRG GLUHFWLRQ IRU
WHFKQRORJ\ DUFKLWHFWV DQG FRQVXOWDQWV 6LQFH DOO WKH
SRSXODU SXEOLF FORXGV KDYH WKHLU RZQ 'HY2SV WRROV
%XUQLQJ *ODVV EURNH GRZQ ZKLFK FORXGV ZLOO OLNHO\ VHH
WKH PRVW JURZWK LQ WKLV VNLOO FDWHJRU\ 0LFURVRIW $]XUH
WRSSHG WKH OLVW ZLWK JURZWK FORVHO\ IROORZHG E\
*RRJOH &ORXG ZKLFK VKRXOG VHH XS WR JURZWK
,I \RX¶UH QRW DQ ,7 SURIHVVLRQDO \RX FDQ VWLOO SUR¿W IURP
WKH F\EHUVHFXULW\ ERRP 'LVFLSOLQHV LQFOXGLQJ ULVN
DVVHVVPHQW UHJXODWRU\ FRPSOLDQFH DQDO\VLV DQG
YHUWLFDO VHFXULW\ PHDVXUHV OLNH WKRVH IRU KHDOWKFDUH
DFWXDOO\ KLUH QRQ WHFKQLFDO SHUVRQQHO 7KHVH MREV FDQ JR
WR DQ\ WHFK VDYY\ SURIHVVLRQDO EXW HVSHFLDOO\ DWWRUQH\V
DXGLW VSHFLDOLVWV DQG SURMHFW PDQDJHUV
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
MASTHEAD
EDITORIAL
EDITOR-IN-CHIEF, PC MAGAZINE NETWORK Dan Costa
EDITOR Wendy Sheehan Donnell
MANAGING EDITOR, DIGITAL EDITIONS Carol Mangis
PRODUCTION DESIGNER Bob Al-Greene
NEWS & FEATURES
EXECUTIVE EDITOR Chloe Albanesius
FEATURES EDITOR Eric Griffith
SENIOR FEATURES WRITER Chandra Steele
ASSOCIATE EDITOR, HELP & HOW-TO Jason Cohen
SENIOR NEWS EDITOR Matthew Humphries
NEWS REPORTER Michael Kan
EDITORIAL FELLOW Chance Townsend
REVIEWS
EXECUTIVE EDITOR John Burek (hardware), Oliver Rist (business)
MANAGING EDITORS Sean Carroll (software, security), Alex Colon (consumer electronics), Rose Fox (mobile),
Jeffrey L. Wilson (software, gaming)
LEAD ANALYSTS Jim Fisher (digital cameras), Michael Muchmore (software), Neil J. Rubenking (security),
Sascha Segan (mobile)
SENIOR ANALYSTS Tom Brant (hardware), Max Eddy (software, security), Will Greenwald (consumer
electronics), Tony Hoffman (hardware)
ANALYSTS Matthew Buzzi (hardware), Kim Key (security), Jordan Minor (software, gaming), Ben Moore
(software, security), Angela Moscaritolo (consumer electronics), Chris Stobing (hardware), Mike Williams
(software, gaming), Steven Winkelman (mobile)
INVENTORY CONTROL COORDINATOR Joseph Maldonado
ART, MEDIA, & PRODUCTION
SOCIAL MEDIA MANAGER Pete Haas
STAFF PHOTOGRAPHER Molly Flores
PRODUCER Emily Zoda
SENIOR VIDEO PRODUCER Weston Almond
VIDEO PRODUCER Raffi Paul
CONTRIBUTORS
John R. Delaney, Jill Duffy, Tim Gideon, Ben Z. Gottesman, Eric Grevstad, William Harrel, Edward Mendelson,
Stephanie Mlot, M. David Stone, Lance Whitney, Kathy Yakal
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021
MASTHEAD
CORPORATE
ZIFF DAVIS LLC
CHIEF EXECUTIVE OFFICER (J2 GLOBAL) Vivek Shah
PRESIDENT Steven Horowitz
CHIEF FINANCIAL OFFICER (ZIFF MEDIA GROUP) Justin Gee
CHIEF TECHNOLOGY OFFICER (J2 GLOBAL) Joseph Fortuna
GENERAL MANAGER, ZIFF MEDIA GROUP Mike Finnerty
EXECUTIVE VICE PRESIDENT, INTERNATIONAL Geoff Inns
SENIOR VICE PRESIDENT, PUBLISHING (ZIFF MEDIA GROUP) Ronak Patel
SENIOR VICE PRESIDENT, CONTENT; EDITOR-IN-CHIEF, PCMAG.COM Dan Costa
SENIOR VICE PRESIDENT AND GENERAL MANAGER, ACCOUNTING Fredrick Rolff
SENIOR VICE PRESIDENT, BUSINESS OPERATIONS Jason Steele
SENIOR VICE PRESIDENT, CHIEF TECHNOLOGY OFFICER Josh Butts
SENIOR VICE PRESIDENT, CHIEF REVENUE OFFICER Eva Smith
SENIOR VICE PRESIDENT, OPERATIONS Megan Juliano
SENIOR VICE PRESIDENT, AFFILIATE MONETIZATION Lauren Cooley
VICE PRESIDENTS Matias Benitez (engineering) Valerie Gayol (marketing), Kate Hainsworth
(strategy & growth), Scott Kritz (audience growth), John Mark (display monetization),
Allison Neet (audience analytics & insights), Wendy Sheehan Donnell (content), Jessica
Spira (strategic growth)
THE INDEPENDENT GUIDE PC Magazine is the Independent Guide to Technology. Our mission is
to test and review computer- and internet-related products and services and to report fairly and objectively on the
results. Our editors do not invest in firms whose products or services we review, nor do we accept travel tickets or
other gifts of value from such firms. Except where noted, PC Magazine reviews are of products and services that are
currently available. Our reviews are written without regard to advertising or business relationships with any vendor.
HOW TO CONTACT EDITORS We welcome comments from readers. Send your comments to [email protected].
Please include your email address or daytime telephone number. We cannot look up stories from past issues,
recommend products, or diagnose problems with your PC.
PERMISSIONS, REPRINTS, CONTENT, AND TRADEMARK RIGHTS For permission to reuse material in this
publication or to use our logo, contact us at [email protected]. Material in this publication may not be
reproduced in any form without written permission. Copyright © 2021, Ziff Davis LLC. All rights reserved.
Reproduction in whole or in part without permission is prohibited.
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE I AUGUST 2021