AMD is totally cleaning up in the world of desktop processors, with Intel lagging way behind its rival now, at least going by Amazon’s rankings of the bestselling CPUs.
As you may be aware, Amazon keeps track of the bestsellers across its entire range of tech (and other) products, and the top processor list is currently dominated by AMD, with Team Red now holding the entire top 10.
In fact, the first Intel CPU you’ll see is the Intel Core i5-13600KF at number 13, so the top 12 processors are from AMD (at the time of writing, anyway). Granted, Intel does have numbers 14, 15, 17, and 18 as well, notably with older CPUs from the 13th-gen and 14th-gen ranges, with no Core Ultra 200S (Arrow Lake) chips to be seen in the top 20 – or indeed in the top 100.
Are those chips simply too fresh to the market, then? Well, AMD’s Ryzen 9800X3D is also very new on the scene and is ranked at the number four spot, in fact, it's been so popular that at the time of writing it's sold out of stock.
What are AMD’s top chips by sales, then? At number one we have the AMD Ryzen 5700X, the mainstay from two generations ago which is still selling strongly, followed by its more affordable sibling, the 5600X.
The AMD Ryzen 7800X3D is in third place, followed by the 9800X3D as mentioned, and then the Ryzen 7600X is in fifth. It makes sense to see the 7800X3D in a strong position; it's now the cheaper alternative to the next-gen 9800X3D, while remaining a strong choice of CPU for serious PC gamers.
(Image credit: Future/John Loeffler) Analysis: Processing advantage AMDThis represents a very clear picture of how AMD has pulled ahead in the CPU arena, albeit it is just one retailer – though a huge retail player, of course.
If you look at Newegg, which also keeps a regularly updated CPU ranking, this isn’t quite as heavily weighted towards AMD, but Team Red is clearly winning. In this case, Intel does have chips at numbers five through to eight, and 14, plus 20, but the rest of the top 20 is entirely AMD (again, that’s correct at the time of writing, though the processors may have shuffled around a bit by the time you’re reading this).
It’s much the same story as Amazon with the bestselling Ryzen chips, though the top seller is actually the Ryzen 9800X3D in this case (even though it has sold out – stock is still a big issue for would-be buyers), followed by the Ryzen 7600X (with a nice discount as you might guess). For Intel, the 14700K and 14900K are the top offerings – you won’t find an Arrow Lake CPU until number 39, where the flagship 285K currently resides.
Are we particularly surprised at this development? Well, not really, although the grip AMD has on the market at Amazon is pretty eye-opening. But given recent history in the world of CPUs, with Intel having a nightmarish time with its 14th-gen and 13th-gen silicon suffering serious instability problems, and Arrow Lake having a wobbly launch too, it’s pretty much a given that AMD is going to capitalize on these missteps.
Even if Ryzen 9000 also received a rather lukewarm reception, albeit the Ryzen 9800X3D has turned that around as a gaming powerhouse chip – the problem with that new 3D V-Cache CPU is that it’s out of stock everywhere, as noted.
Via Tom’s Hardware
You might also likeOne of the best Garmin watches for the great outdoors looks set to get an imminent upgrade after a listing for a new Instinct 3 was spotted on Garmin's own website.
The Garmin Instinct 2 is one of our favorite Garmins, a five-star pick rocking a choice of sizes, tough exterior, great training tools, GPS, and very good battery life – which is why we're so hyped for the seemingly-imminent launch of the next generation.
Now, it looks like Garmin itself is also gearing up for the release, having accidentally listed the repair costs for a Garmin Instinct 3, and revealing some key new details in the process.
As spotted by Fitness Tracker Test, Garmin Spain's website leaked a repair code for a new 'Instinct 3, SOLAR,45mm,NEGRO'. As such, it seems that the Instinct 3 will be available in at least one of its popular sizes, a solar-powered version, and a black color option.
Garmin Instinct 3 details leaked (Image credit: Future)This latest leak is the first concrete information we've seen regarding a new Garmin Instinct, and it looks like the company is sticking to at least some of the formula that made its last version so great.
It's no surprise that a solar option will be available, and as the report notes a 45mm size listing doesn't preclude other options. It does, however, suggest that the company may be sticking to the current configurations of 40mm, 45mm, and 50mm.
The news follows a brief nod to the Instinct 3 in a recent Garmin leak suggesting some Garmin watches will add support for rucking, with leaker @Jw speculating that the feature could arrive alongside a new Instinct 3 before the end of the year.
The Instinct 2 turned two in November, indicating that a release of the third iteration could be very close at hand.
You may also likeThe National Institute of Standards and Technology (NIST) has recently updated its guidelines on password rotation, advising against the once-standard practice of requiring users to change their passwords every 30, 60 or 90 days – unless an organization has experienced a data breach. This marks a significant shift from traditional cybersecurity policies that aimed to prevent breaches through frequent password changes. However, NIST’s new stance may seem at odds with the real-world needs of organizations focused on reducing security risks.
Understanding password rotationPassword rotation refers to the practice of regularly changing passwords to minimize the risk of unauthorized access to sensitive information. There are two primary types of password rotation: manual and automatic.
Manual password rotation requires users to update their passwords at set intervals, while automatic password rotation relies on technology to generate passwords and replace them without user intervention.
While manual password rotation has been common practice, it often has the unintended effect of leading to weak passwords and user frustration. In contrast, automated password rotation enhances security by regularly generating strong and unique passwords without the user burden of having to generate or remember them.
NIST’s shift away from frequent manual rotationNIST’s latest guidance discourages enforcing mandatory password changes every 30, 60 or 90 days unless there is evidence of a breach. This change stems from the realization that frequent mandatory password updates can lead to poor user behavior, such as creating weak or easily guessed passwords for convenience.
For example, when required to change passwords frequently, users may make only minor adjustments to an old password – like changing “Password1” to “Password2” – which weakens security and makes it easier for attackers to guess credentials using techniques like credential stuffing or brute force attacks. Those passwords are also frequently reused across multiple accounts.
NIST’s updated guidance recognizes that the effectiveness of frequent password changes is limited unless there is specific evidence of compromised credentials. Rather than focusing on how often passwords should change, NIST now emphasizes the use of strong passwords and Multi-Factor Authentication (MFA) as more effective means of enhancing security.
Why password rotation still mattersDespite NIST’s recommendation to reduce mandatory password rotation, it remains relevant in certain contexts – particularly for privileged accounts that hold access to sensitive systems and data. Rotating passwords can effectively limit exposure if credentials are compromised. Automated password rotation is essential because it:
Additionally, password rotation is a critical measure for organizations that have shared accounts or use contractors, and for securing accounts when offboarding employees.
The challenge of manual password rotationWhile password rotation is still relevant, not all methods are created equal. Manual password rotation presents challenges, such as user fatigue, weak password creation and reduced productivity. Users may struggle to generate and remember new, strong passwords, opting instead for easily memorable patterns or predictable variations of old passwords, which makes accounts vulnerable to attacks.
Additionally, enforcing manual password rotation disrupts workflows. Employees may waste time trying to recall or reset forgotten passwords, detracting from their primary work duties. Frequent changes without automated systems can lead to more frustration than security.
Balancing security and usability with automated password rotationAutomated password rotation addresses the shortcomings of manual password changes while maintaining high levels of security. Organizations can benefit from:
To implement automated password rotation, organizations should consider using a Privileged Access Management (PAM) solution that automates the generation, rotation and secure storage of passwords. This ensures strong passwords are regularly updated and stored in an encrypted vault, accessible only to authorized accounts based on the principle of least privilege to limit exposure.
Embracing a modern approach to password securityNIST’s updated guidelines reflect a more nuanced approach to password security, emphasizing the importance of strong, unique passwords while de-emphasising frequent manual rotation. However, password rotation remains critical for privileged accounts.
Automated password rotation is key to balancing security and usability in today’s complex threat landscape. Organisations should adopt modern PAM solutions to implement strong password practices without burdening users, ensuring sensitive data remains protected while maintaining productivity. By embracing automated password rotation, businesses can stay ahead of cyber threats and protect their most critical systems and information.
We've featured the best business password manager.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Full spoilers follow for Arcane seasons 1 and 2.
There are only three episodes left of Arcane's second and final season and, as the clock ticks down to its finale, fans are still waiting for an answer to an absolutely huge question.
No, not the "what's going on with Jayce?" one, which I already examined in this article about Jayce walking a very dark path in Arcane season 2's later entries. I'm talking about the hit Netflix show's main villain, who's yet to be revealed as Arcane approaches its endgame.
There have been plenty of candidates for the series' antagonist-in-chief. Silco fulfilled that role last season but, following his demise in the season 1 finale, we're none the wiser about who's succeeding him as Arcane's Big Bad. Is it Ambessa, who's been an increasingly antagonistic figure since her season 1 episode 7 debut? How about Jayce following his unexpected heel turn in Arcane season 2 act 2? What if, in the end, it actually ends up being Jinx?
The Black Rose are an incredibly powerful, menacing, and secretive Noxus-based faction (Image credit: Netflix)In many viewers' minds, mine included, it won't be any of them. Indeed, fans have had a magical theory about Arcane's main villain for a long time, with some proposing that the Black Rose, a secret and dark magic-wielding organization, will be the show's actual evildoers. It's a hypothesis that predates Arcane season 2's official trailer being released in mid-September, too, with that two-minute-long teaser hinting at the Black Rose's introduction.
Well, as I covered in my Arcane season 2 act 1 ending explained piece, the Black Rose is officially part of the proceedings. What's still unclear after the arrival of season 2 episodes 4 through 6, though, is whether the Noxus-based sect is one of the best Netflix shows' chief bad guys. Or, rather, bad girls, because three of their four most famous members are females. That includes their infamous leader LeBlanc, the millennia-old sorceress who's essentially Noxus' shadow ruler and pulls the strings of whoever sits on the expansionist empire's physical throne.
What does the Black Rose want with Mel? (Image credit: Netflix/Riot Games/Fortiche Production)With the Black Rose playing an increasingly larger role as Arcane season 2's story progresses, will we see LeBlanc and/or any other Black Rose members appear before Arcane's final credits roll? I had the opportunity to speak to the animated League of Legends (LoL) show's creators Christian Linke and Alex Yee ahead of its initial debut on November 9, so I felt obliged to ask the pair if this would be the case. Interestingly, they didn't actually deny it.
"Hmm... you really want to know, don't you?" Linke replied with a wry smile and a not-so-coy laugh. Before I had a chance to respond, Yee jumped in to cleverly add: "Are you asking 'will they be there' or 'will you see them?'"
The coolest version of the Black Rose is when they're invisible
Christian Linke, Arcane co-creatorYou've played this game before, haven't you, gentlemen? Considering the pair didn't outright deny that LeBlanc and/or her fellow ancient magic wielders would appear, I'm led to believe that, at the very least, one of them will. I've got the evidence to back that up, too. The cast list of season 2 episode 5's end credits sequence mentions a character named 'illusionary sorceress' who's not only the individual who speaks to Mel in this chapter but also voiced by Minnie Driver. Don't be shocked if Driver is the voice for Arcane's animated take on LeBlanc, and, providing I'm right, if Driver and LeBlanc are subsequently added to my Arcane season 2 cast and character guide.
But I digress. Even if I'm completely wrong in my assumptions about members of the Black Rose appearing before season 2 ends, it doesn't sound like this is the last we'll see of them. With many more LoL movie and TV adaptations in development, Linke suggested they may crop up, or at least be mentioned, in future projects.
I'm convinced that we'll see LeBlanc appear in Arcane before it ends (Image credit: League of Legends universe website)"When we've talked about them internally, the coolest version of the Black Rose is when they're invisible," Linke said. "But what's also really cool is they're one of the first glimpses of this larger world, and the characters that have an association with the arcane and magic that comes from another realm. It's a good thing that fans have opinions on what's happening with Hextech, magic, and all of these things, and we're really excited about those things, too. But, you know, the Black Rose is an integral part of season 2, and that's all you'll get for now."
For more coverage ahead of season 2 act 3's release, check out more articles from my exclusive chat with Linke and Yee below.
You might also likeIn today’s dynamic application landscape, delivering IT infrastructure that’s highly available, performant and secure is paramount for organizations of all sizes. Load balancers help achieve this by distributing client network traffic across multiple servers. They also distribute traffic across geographic locations to minimize downtime and enhance the application experience.
Since 65% of organizations say their cloud environment is multi-cloud, enterprise IT teams and decision-makers are re-evaluating their load-balancing choices more frequently. They need a versatile, secure and cost-efficient solution that aligns with modern deployment needs—one that optimises workflows and minimises downtime to enhance application performance. Understanding the essential role of load balancers, the state of load balancing in modern tech ecosystems and where application delivery sits today gives professionals a holistic perspective from which to make informed choices.
The changing load balancer landscapeNumerous industry trends and application influences shape how load balancers are used today. Enterprise IT teams and decision-makers are increasingly open to exploring and starting to use load-balancing vendors and solutions. A survey conducted by EMA revealed that 80% of enterprise organizations indicated a willingness to consider switching load-balancing vendors in the next two years.
There are numerous reasons behind the changing demands for applications. The rise of cloud-based applications, micro-service architectures and hybrid cloud deployments have increased the complexity of load-balancing requirements. Many organizations struggle to support this evolving application landscape with their current load balancers, highlighting their need for a solution that offers advanced security, robust analytics and other features that simplify management.
Ongoing support costs for their existing load balancers and additional deployments can be significant, as can adding additional nodes for new applications. This drives organizations to seek out more cost-effective alternatives that will enable them to flexibly scale their load-balancing architecture without considerable spikes in their operational costs.
Benefits of load balancingLoad balancers drive business value in various ways—far beyond enhancing the performance, availability, reliability and redundancy of IT infrastructure to maintain continuous service.
In addition to these critical roles, load balancers can also optimize resource utilization, significantly reducing costs and improving system performance. They facilitate the efficient use of server resources, reducing the risk of underutilization or overloading.
Perhaps a lesser-known but critical benefit—load balancers can enhance security by controlling traffic in a way that mitigates the risk of DDoS attacks. They can detect and block malicious traffic, helping to protect the network from potential threats. They can also play a crucial part in disaster recovery strategies by redirecting traffic to backup servers in case of a failure. This capability maintains business continuity and minimizes downtime.
Load balancing also allows organizations to easily add or remove servers based on traffic demands. This flexibility supports seamless scalability, accommodating growing user bases without service disruptions.
Considerations for choosing a load-balancing platformWhen evaluating load-balancing platforms, it’s vital to find one that can flex as organizational needs change in scale and complexity. A platform offering customer-focused support and rich online resources will help an organization of any size get the maximum benefit from deployments.
It's also worth checking out the vendor’s development history. For instance, research how the vendor has been investing back in product R&D and how quickly they address bugs. Some vendors can even provide an estimate on ROI. Finally, it’s critical that licensing isn’t only Perpetual and offers flexibility that can scale to the business’s needs.
Some fundamental features to look for in a solution include:
Core load balancing: Core load-balancing functionality that’s table stakes for modern organizations includes on-premises, cloud and hybrid application deployments. It's better still to find one that offers a Global Server Load Balancing (GSLB) feature that can be used across multiple data centers, cloud providers and regions.
Cybersecurity functionality: Layered cybersecurity functionality can provide an additional security boost to an organization's existing cybersecurity practices. These include a Web Application Firewall (WAF), Edge Security Pack (ESP) including Reverse Proxy, End Point Authentication, Active Directory integration, RADIUS authentication, Single Sign On (SSO) across virtual services, RSA SecurID dual factor authentication and Persistent Logging and Reporting.
Adaptable deployment options: Load balancers can be deployed in different infrastructure setups, including dedicated hardware, virtual machines or cloud platforms, like Azure and AWS.
Flexible and competitive pricing: Specifiers should be able to choose the licensing model that fits their business needs. These include Perpetual, Subscription, Pay-as-You-Go (PAYG) and Pooled. With the right choice, organisations can achieve significant cost savings for deployment and reduce ongoing support costs.
Prioritizing security and efficiencyThe load balancer landscape continues to evolve in anticipation of upcoming industry trends and influences. Therefore, a versatile, secure and efficient load-balancing solution is essential for enterprise businesses.
For organizations to optimize their current load-balancing capabilities for the best application experience, there must be in alignment with modern deployment needs, improved functionality, flexible licensing and lower cost of ownership, plus industry-leading support and online resources.
We list the best cloud firewall.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro