Результатов: 109

NeuralTrade Network ICO

Most people are desperately seeking financial freedom in their life. Sadly financial freedom remains a dream to them or an elusive theory that forever escapes them. The biggest problem around financial freedom is some magic formula or some secret success model that they believe exists, they spend an endless amount of time, effort and even resources in obtaining this magic formula or the secret success model. дальше »

2019-2-15 22:51


Trading Technologies: Professional TT Crypto Software Tools?

Trading Technologies Crypto is the newly-announced cryptocurrency capability of “TT”, Trading Technologies’ flagship electronic trading software platform. Prior to recently, TT was able to provide support for investment professionals to make electronic trades in sectors that precluded the cryptocurrency markets. дальше »

2019-1-30 11:29


The last resort of failing tech companies is UX design – it won’t save them

Facebook is using billboards to demonstrate their commitment to fighting fake news. Uber is running TV spots to illustrate the company’s commitment to doing good. Once considered disruptors, digital companies are now using the same strategies oil and tobacco companies used back in the ’90s to project the illusion of an optimistic future — while their design teams are still tied to aggressive, revenue-driven, short-term metrics. дальше »

2019-1-1 16:00


Фото:

US government building tools to deanonymize anonymous cryptocurrencies

If you thought you were safe using privacy coins like Zcash and Monero you might want to think again. It appears that the US Department of Homeland Security (DoHS) is looking to develop forensic analysis techniques for privacy-focused cryptocurrencies like Zcash and Monero, according to a pre-solicitation document spotted by The Block. дальше »

2018-12-4 15:19


Report Links 74% of Bitcoin Mining to China, Sees Threat to Network

Bitcoin, the world’s most sought-after cryptocurrency, could be at the wish and whim of Asia’s economic giant. A recent study titled “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin,” jointly researched by Princeton University and Florida International University researchers, suggests China’s mining scene has an overwhelming influence over Bitcoin, something that could invite network manipulation. дальше »

2018-10-11 00:29


Фото:

Coinbase Rolls Out Crypto “Bundles” and New Educational Resources

Coinbase is unveiling a suite of new initiatives designed to expand its market. In a blog released today entitled “Helping People Understand, Explore and Buy Cryptocurrency,” Coinbase is reaching out to potential newcomers to the crypto space — people who may want to join the crypto world but are unsure about how to proceed. дальше »

2018-9-27 19:59


Фото:

Twitter: ‘We killed our legacy dev tools because nobody used them’

Twitter has deprecated three of its legacy developer APIs. As of today, the Site Streams, User Streams, and its REST Direct Message Endpoints are officially retired. Shakeups are seldom welcome, and bracing itself for an angry developer backlash, Twitter has published a blog post explaining its reasioning behind the cull of its APIs. дальше »

2018-8-16 19:05


Фото:

Breeze Wallet with Breeze Privacy Protocol Mainnet Now Available for Download

The Breeze Wallet with the Breeze Privacy Protocol public mainnet has been released and is now open to the public. The wallet showcases Stratis technology — a platform built for visual basic apps and blockchain solutions — and places heavy emphasis on both privacy and security for businesses seeking to implement business-to-business (B2B) transactions on the Stratis and Bitcoin blockchain networks. дальше »

2018-8-4 00:02


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03


Фото:

Op Ed: Addressing the Threat of Cryptomining Malware

One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »

2018-7-18 23:18