Ir al contenido principal

MONTAJE MODDING

 En el mundo de la informática, un MODDING PC es el proceso de alterar el hardware y el software de un ordenador para darle un aspecto y un funcionamiento únicos.


El interior y exterior del dispositivo sufrirán alternación es estéticas sin afectar necesariamente a los ajustes de software. Es más, es posible que en ocasiones los atributos de un equipo puedan mejorarse mediante ajustes y personalizaciones.


El abanico de modificaciones opciones en un MODDING es muy amplio. Ya sea para el diseño o estética, el mayor beneficio del MODDING de PC es la oportunidad de contar tu propia historia, manteniendo la funcionalidad y el rendimiento.


Nos podemos encontrar con 2 tipos de modificaciones del PC: internas o externas, o ambas.

La modificacion del software, que incluye el overclocking, el ajuste de la BIOS, de la RAM y almacenamiento interno 


Hay una amplia gama de herramientas especializadas para tener en cuenta a la hora de diseñar un MODDING como por ejemplo:

Instrumentos de corte 

Pinturas para dar color 

Secador termoplástico 

Amolador y perforador 

Lijas de diferentes materiales

Silicona, pegamento, etc.

Kit de soldadura.

Remachadora, grapadora o tornillería variada.

Materiales como vinilo, resinas, madera, plásticos, etc.


Es imprescindible tener todas las piezas y herramientas necesarias antes de comenzar a trabajar en la modificación. El MODDING de PC es un proceso calculado e incluso perfeccionista para lograr tener éxito en su resultados de calidad, pero siempre va a conllevar un proceso dinámico. Por tanto, tener una buena serie de componentes que ayuden al modder en la carga de trabajo es fundamental para conseguir una excelente modificación.


Se requieren habilidades tanto para el individuo como para la máquina como paciencia, resolución de problemas, versatilidad, flexibilidad, imaginación, innovación, meticulosidad, detallista, etc.


En definitiva, eso sí, bajo ningún concepto permitas que el diseño interfiera con el buen funcionamiento de la electrónica o la refrigeración, ya que de lo contrario se convertirá en algo disfuncional causando percances casi imposibles de revertir.


Buena Suerte!














Comentarios

Entradas populares de este blog

labs we did with juanma

Yesterday Juanma put a labs about connecting switches and routers between them to give wifi to our pcs but we had a problem with the switches and routers because it didn't work. for our luck Juanma helps us after a long time with a lot of errors in the switches and routers, but we had another problem that we didn't have the infratestructure that juanma said to have and when he asked us to do a wireshark to search the apache it didn't show in the wireshark because we didn't mount it in the debian we only had the dhcp. the other day we had another problem with the same thing (not the infrastructure but the switches and routers) and I hope that the next time he will say to do the labs again we will do it perfect.  

Today's class (Raúl García)

 I started my day with AWS class, we had to make diferent virtual machines on amazon web services, so we could put a web page, on which you had to register to see it. I wasn't sure about how to make the "EC2 instances" so I had to watch a YouTube video, I didn't had enought time, but next week we will have more time. Next we had english class, we started with an exam, for me it was easy, so I didn't had any problem there. After that the teacher presented the new project we had to do, on which que have to make a job interview with a teammate in two weeks. I will make the project with Samuel, he is one of my best friends here in puenteuropa, we will do great for sure!

vpn explanation

  A VPN, or Virtual Private Network, is a technology that allows users to securely connect to the Internet over an untrusted network, such as a public Wi-Fi network. When a user connects to a VPN, the VPN server creates a secure, encrypted tunnel between the user's device and the VPN server. All data transmitted between the user's device and the VPN server is encrypted and protected from unauthorized access or interception. This allows users to securely access sensitive information, such as financial transactions or confidential business data, even when using a public Wi-Fi network or other unsecured network. VPNs are also useful for users who want to access content that is restricted by geographic location, such as streaming services or websites that are only available in certain countries. VPNs are typically used by individuals, businesses, and government organizations to protect their online privacy and security. There are many different types of VPNs, including remote-acces...