Performance comparison of miner and common miner
At present, the mining machines in the market are mainly divided into two categories, one is PC based mining machine, the other is professional mining machine based on ASIC chip
the general PC mining machine can be used as a home computer, but the CPU performance is weak and the power consumption is high. Professional mining machine based on ASIC chip can not be used as ordinary computer because it has no graphics card and does not support mainstream desktop operating system
extended data:
mining machine is one of the ways to obtain bitcoin is a kind of network virtual currency proced by open source P2P software. It doesn't rely on a specific currency institution to issue, but is generated by a large number of calculations of a specific algorithm. It uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions economically. The decentralized nature of P2P and the algorithm itself can ensure that the currency value cannot be manipulated by mass proction
any computer can become a mining machine, but the profit will be relatively low, and there may not be one in ten years. Many companies have developed professional mining machines, which are equipped with special mining crystal. They are tens or hundreds of times higher than ordinary computers
mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it is just a garbage card like hd6770, can surpass the single graphics card of most users in terms of computing power
and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there are considerable expenses in mining
in addition to the display card burning machine, some ASIC (application specific integrated circuit) professional mining machines are also put into the battlefield. ASIC is specially designed for hash operation. Although the performance may not be able to kill the display card in seconds, it is already quite strong. Moreover, because their power consumption is far lower than that of the display card, it is easier to form scale and the electricity cost is also lower, It is difficult to compete with these excavators. And this kind of machine will be more expensive
Mining is a work that needs a lot of computing power to support. The reason why we use the graphics card mining machine is that the graphics card is easier to carry out a lot of repeated calculations than the CPU, so the general mining machine of the graphics card selects the graphics card mining machine
but mining also need to find a useful mining software, I have been using ha Yu miner mining, easy to use, high income< br />
1g version is the most popular. This model can well balance the mining speed and price
in other words, there are a lot of "mining machine graphics cards" on Taobao, because these graphics cards use less materials under the same core and basically unchanged hash speed, such as recing video memory to improve the performance price ratio (the size of video memory has little to do with the mining speed), which can shorten the time to recover the cost
in short, the graphics card of mining machine is the core of common high-end graphics card + the workmanship of low-end graphics card, or some cheap medium and high-end public graphics card.
2) why don't engineering companies build their own expressways to collect tolls
3) why don't high-speed rail companies carry passengers themselves
in a complete instrial chain, equipment manufacturers, proct procers, channel operators, retail cashers and so on constitute the instrial chain. Everyone has different division of labor. In these different division of labor, they jointly obtain profits in the instrial chain according to their contributions. This is a complete instrial chain.
1. The provincial characteristics of the blockchain, once included in the block, are irreversible and can not be tampered with, and the information is true and effective, but there is only one case that is false, that is, the information written in the first attempt is false, resulting in the false information stored in the block
2, Basically, it's the application side of the technology