>>60853732
>Right now you basically need qubic's permission to use the chain. You can only use it because they allow you to
Uh, no.
>>60853755
>Please show me your factory where you refine raw silicon into Ryzen 9 chips.
Ryzen 9 use cases:
>Gaming
High-FPS competitive gaming (paired with powerful GPUs)
Streaming while gaming (game + OBS encoding simultaneously)
>Content Creation
Video editing (Adobe Premiere, DaVinci Resolve)
3D rendering (Blender, Cinema4D)
Music production & audio processing (FL Studio, Ableton, Pro Tools)
Graphic design & photo editing (Photoshop, Illustrator)
>Software Development
Compiling large codebases (C++, Java, etc.)
Running multiple IDEs, emulators, and debuggers
Android/iOS app development with virtualization
>Virtualization & Emulation
Running multiple virtual machines (VMware, VirtualBox)
Hosting test environments and container clusters (Docker, Kubernetes)
High-performance emulation (e.g. console emulators)
>Scientific & Technical Workloads
Data science & machine learning (TensorFlow, PyTorch with CPU workloads)
Simulation software (MATLAB, ANSYS, engineering tools)
Large dataset processing and number crunching
>Productivity & Multitasking
Heavy multitasking (dozens of browser tabs + productivity apps)
Office suites, remote work setups, and virtual collaboration
Running multiple monitors and high-res workflows
>Home Servers / Workstations
NAS/home lab setups
Game servers or dedicated streaming servers
Video transcoding and Plex media servers
-
>Crypto mining ASIC use cases
Mining crypto
>>60853767
>Don't tell him that China might attack Taiwan and block manufacturing and export of his permissionless CPUs.
lol as if only RandomX miners would be affected. Which just underscores the point: withholding access to CPUs would affect everybody, withholding access to mining ASICs affects only miners.
ASIC mining = permissioned.