|Building the Perfect Computer⁠

This blog post is part of a series on my experience building my perfect computer. As part of my job at Member.buzz, I needed a high-performance computer for programming, graphic design, and video rendering. I also wanted it to look the part; looking as beautiful on the outside as it is in the inside.

Before we get to far, here is a video showing the result:

Through the process, I did a lot of research and found answers to some obscure prolems. I hope that some of the information I found can help others as they go through their journey.

My overall goal was to build a top-of-the-line custom computer while ensuring that it would be reliable enough to use as my everyday work computer (although I deviated a bit from the reliability requirement with my custom water-cooling solution).

⁠Articles⁠

I have separated all of my research into the following series of articles:

Components
An overview of how I choose the components for my computer.

Lighting
A review of the different types of lighting options available.

Overclocking
An overview of maximizing the performance from your computer.

Air Cooling
How to choose the right fans.

Water Cooling, Part 1
Choosing the type of water cooling to use.

Water Cooling, Part 2
Creating a custom water cooling loop.

Cable Management
How to keep your cables out of sight.

Modding
How to bring your computer to the next level through custom modifications.

Tools
Information on various tools used.

Brands and Retailers
A list of the different brands, with reviews on which ones are best.

Parts⁠

Here is an overview of my build, you can see details about why I choose each component in the relevant articles above.

Components

Case

Phanteks EvolvX

CPU

AMD Ryzen 9 3950x

16 Core/32 Threads with 4.0/4.4 Ghz CCX Overclocking

Motherboard

MSI Ace X570

Memory

Corsair Dominator Platinum RGB

64 GB at 3600 Mhz

GPU

PNY nVidia Quadro P4000

Sound Card

Creative Sound BlasterX AE-5

Cooling

Fittings

PrimoChill UV Blue

Fans

Corsair QL120 (6x)

be quiet! Silent Wings 3 BL070 (3x)

Radiator

EKWB CoolStream PE-360

Reservoir

Phanteks R160

Tubing

Chemglass Borosilicate (1/2” OD, 3/32” Wall)

Coolant

Koolance UV Blue

Monitor

Barrowch Temperature Sensor

Valve

Bykski Clover Valve

Pump

Bykski DDC Pump (B-PMD3-COV)

Filter

Alphacool Plexi Eiszapfen

Fan Hub

DeepCool Fan Hub

Lighting

RGB Controller

Corsair iCue Commander Corsair iCue Lighting Node Pro

UV Lighting

LEDdess UV Light Strip

Temperature Sensor

Alphacool Eiszapfen Sensor Plug

About

⁠As you may have realized, this series of articles has very little to do with the products provided by Member.buzz. However, we thought some of the research we did while building this computer would be useful to others.

⁠Fuzzylogic.io is our company blog, which is powered by the Member.buzz platform. If you are interested in creating your own blog, you can create one today for free on our platform.

Comments

To add a comment, please login or register.

Related

C-Level Security: Bank security and the egg timer (how good management trumps technology)
The development of technology for securing information has been advancing at a pace that is truly astounding. In 20 years the security industry has evolved from Sun Micro Systems' Sunscreen and the Cisco PIX (yes I know there were a few others) to over a thousand security products of which nearly 700 are currently VC funded. All are trying to generate business from within this ever advancing market currently called Cyber Security. There are few tech markets growing at the rate of Cyber Security and as a result we are seeing investors, in a near desperate attempt to gather slivers of this market, throwing money at companies with Rube-Goldberg-inspired technology. We now have a flood of technology solutions that no one person can understand and the customers that consume this technology struggle daily with supporting and operating these systems. Many of the C-Level executives reading this may want to consider a management solution for the next expensive problem your engineering team presents to you.
What to Say to the C-Level, get your security project funded today!
In near every business adding costs to Information Systems will be seen, by the people running the business, as a cost first, benefit second. Remarkably this still holds true despite a constant pulse of security events hitting the C-Level desks. So let's, as security professionals, develop an understanding of the C-Suite and the C-Levels as to their priorities.
C-Level: Fan Boy, XEB
In 1999 I was extremely busy. I had just started a company, my second, in the Network Security field which was new and unknown. Sales were slow, hacking was deep, deep inside campuses like Stanford and MIT and was considered sport. I was getting traction with banks and was in SF for a meeting. I remember walking down Mission past a guitar shop and hearing this song, guitar was hitting the tonic breaking into cool background riffs, a little vocal falsetto opening then breaking into verse…..broken and then back…..WTF. Reminiscent of a Cello piece I know……..inspired….. I stopped dead in my tracks - stunned. Who are these guys!?!
C-Level Security: When your team uses military analogies, are they using the wrong narrative?
For years, I have bristled when people would use medieval military descriptions in an attempt to convey concepts within the Network Security business. Bastions, Firewalls, Moats, Drawbridges, Countermeasures; all of these descriptions give way to a more accurate and detailed explanation of what was really taking place.