Since the recent boom in Bitcoin and other cryptocurrencies, there has been a boom of more than 5000 traded cryptocurrencies. No wonder malicious actors seized the opportunities as well. The potential of Bitcoin as a digital gold is still striving [Read More…]
Understanding RAM, CPU, L1, L2, and L3 cache – Part 2
If you are reading this article, I guess you already went over part 1 which addressed the main issues about Memory. In part 1, we have mostly seen how memory reacts in a virtual environment. We should not confuse virtual [Read More…]