Apple A10 Fusion
Qualcomm Snapdragon 800 MSM8974AA v2
19 facts in comparison
A 32-bit operating system can only support up to 4GB of RAM. 64-bit allows more than 4GB, giving increased performance. It also allows you to run 64-bit applications.
With integrated graphics you don’t need to buy a separate graphics card.
A smaller size indicates that the process to create the chip is newer.
Apple A12X Bionic
3 (Qualcomm Adreno 330 (450MHz))
OpenGL ES is used for games on mobile devices such as smartphones. Newer versions support better graphics.
Qualcomm Snapdragon 439
1.1 (Qualcomm Adreno 330 (450MHz))
Some applications use OpenCL to utilise the power of the graphics processing unit (GPU) for non-graphical computing. Newer versions introduce more functionality and better performance.
AMD Ryzen 3 3300U
2 x 2.34GHz & 2 x 1.1GHz
4 x 2.3GHz
MediaTek Helio X30
2 x 2.6 & 4 x 2.2 & 4 x 1.9GHz
More threads result in faster performance and better multitasking.
Intel Core i7-8700B
Using big.LITTLE technology, a chip can switch between two sets of processor cores in order to maximise performance and battery life. For example, when playing a game the more powerful cores will be used to increase performance, whereas checking email will use the less powerful cores to maximise battery life.
More memory channels increases the speed of data transfer between the memory and the CPU.
Qualcomm Snapdragon 845
The system on a chip (SoC) has an integrated LTE cellular chip. LTE is capable of downloading at faster speeds than older, 3G technology.
128 (Qualcomm Krait 400)
NEON provides acceleration for media processing, such as listening to MP3s.
4 (Qualcomm Krait 400)
Vector Floating-Point (VFP) is used by the processor to deliver increased performance in areas such as digital imaging.
Dynamic frequency scaling is a technology that allows the processor to conserve power and reduce noise when it is under a light load.
It is easier to obtain better performance when using virtualization if it is hardware-assisted.
NX bit helps protect the computer from malicious attacks.