Bitcoin and processor
2. Modern multi-core CPU aims at instruction set parallelism (ILP) and task parallelism (TLP), while GPU is data parallelism (DLP)
3. GPU often has a larger bandwidth of memory, that is, the so-called video memory, so it will also have good performance in high throughput applications
4. CPU is a general-purpose operation. In short, it means brainless calculation and violent calculation. Whether it's 100 children sharing apples or simulating the earth, it can be decomposed into the most basic calculation of 1 + 1 = 2. GPU is specially designed to deal with high-order mathematical algorithms, such as calculating the relative positions of light source, object, viewpoint and shadow, which requires trigonometric functions to be piled up. The bitcoin digger uses SHA-256, a secure hash function invented by the US National Security Agency, which is generally used for password encryption and decryption. This algorithm can perform a large number of 32-bit integer right-rotate operations, which is very suitable for GPU which is good at large-scale concurrent computing and password cracking.
Starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique
why use graphics card to mine
compared with the complex computing of CPU, GPU used by graphics card is used for general computing. So it can stack hundreds of stream processors awesome. Each stream processor is like a small CPU. Although its ability to run complex programs is far from the power of CPU, it can not support many processors, so the actual performance, especially the single precision floating point performance is much stronger than that of CPU. p>
the actions in bitcoin can be considered as the use of graphics card to do continuous general computing, and the computational complexity is relatively low and quite repetitive. The stream processor used by graphics card is just suitable for such an algorithm. It's like constantly solving equations. The graphics card is 2000 middle school students, while the CPU is 8 math doctors. Although the mathematical knowledge of the doctor of mathematics is far more than that of the middle school students, the speed of solving medium-sized equations such as virtual currency is certainly not as fast as that of 2000 middle school students
so we used graphics card to mine virtual currency at the beginning. After that, someone developed a specific algorithm to make the stream processor of the graphics card greatly strengthen the virtual currency solution, which is the origin of the mining machine
DCC lending chain is not MLM, the specific analysis is as follows:
1. DCC lending chain is a smart lending contract proct based on blockchain technology, which is launched by famous Japanese financial experts and Japanese domestic financial companies. The purpose of loan chain is to give intangible digital assets the same status as real estate, and to carry out mortgage short-term lending and financing lending within the controllable range of value
Second, MLM refers to the illegal act of organizers' development personnel to obtain wealth by developing personnel or requiring the personnel to be developed to obtain the qualification to join in on the condition of paying certain fees. The essence of MLM is "Ponzi scheme", that is to say, the money of later comers is distributed to the income of former comersthe new type of MLM: it does not restrict personal freedom, does not accept ID cards and mobile phones, and does not take big classes collectively. Instead, it uses capital operation as a banner to pull people to cheat money, drives luxury cars, wears gold and silver, and uses money to attract your relatives and friends to join, and finally makes you lose all your money
extended data:
Network loan risk
1. The virtuality of network transaction leads to the inability to authenticate the credit status of both sides of the loan, which is prone to fraud and default disputes
2. Among the large amount of information about lenders released by the network platform, many of them issued loans in the name of "loan company" and "financing company". In fact, only financial institutions approved by the state can engage in financial services such as credit financing. Those who engage in financial activities without authorization will be investigated for legal responsibility for "illegal fund-raising" and "illegal attraction of public deposits" and disturbing the order of financial management
3. If the loan is issued on behalf of the network platform, then the network platform is lax in self-discipline, or the internal control proceres are invalid, or it is used by others, then the situation of fabricating loan information and illegal fund-raising may occur
