Suchergebnis auf Amazon.de für: Bitcoins

Amazon Awarded Bitcoin-Related Cloud Computing Patent - Have you seen this?

Amazon Awarded Bitcoin-Related Cloud Computing Patent - Have you seen this? submitted by OpeningGateways to Bitcoin [link] [comments]

Amazon Awarded Bitcoin-Related Cloud Computing Patent

Amazon Awarded Bitcoin-Related Cloud Computing Patent submitted by CubanCorona to INTELLECTUALPROPERTY [link] [comments]

Amazon Awarded Bitcoin-Related Cloud Computing Patent

Amazon Awarded Bitcoin-Related Cloud Computing Patent submitted by MuchBitcoin to MuchBitcoin [link] [comments]

Amazon Awarded Bitcoin-Related Cloud Computing Patent

Amazon Awarded Bitcoin-Related Cloud Computing Patent submitted by BTCNews to BTCNews [link] [comments]

Hackers Use Organizations' Amazon Cloud Computer Resources to Mine Bitcoin

Hackers Use Organizations' Amazon Cloud Computer Resources to Mine Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Hackers Use Organizations' Amazon Cloud Computer Resources to Mine Bitcoin

Hackers Use Organizations' Amazon Cloud Computer Resources to Mine Bitcoin submitted by kanoptx to Bitcoin [link] [comments]

List of 110+ Free Udemy & Popular Discounted : ETL & Data Integration Masterclass, HTML, JavaScript, & Bootstrap, Marketing Analytics, Microsoft Excel, Machine Learning, Android App Developer, React JS - A Complete Guide for Frontend Web Development, Python, Tableau, Instructional Design & Many More

ETL & Data Integration Masterclass, HTML, JavaScript, & Bootstrap, Marketing Analytics, Microsoft Excel, Machine Learning, Android App Developer, React JS - A Complete Guide for Frontend Web Development, Python, Tableau, Instructional Design & Many More
Source: Freebies Global - https://freebiesglobal.com/
  1. [English] 6h 24m HTML, JavaScript, & Bootstrap - Certification Course https://www.udemy.com/course/html-javascript-bootstrap-certification-course/?couponCode=YOUACCELOCT26 2 Days left at this price!
  2. [English] 0h 37m Quick Guide: Setup a Local Testing Server using WAMP or MAMP https://www.udemy.com/course/quick-guide-setup-a-local-testing-server-using-wamp-or-mamp/?couponCode=YOUACCELOCT26 2 Days left at this price!
  3. [English] 1h 27m Learn MySQL - For Beginners https://www.udemy.com/course/learn-mysql-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  4. [English] 1h 28m Learn JavaScript - For Beginners https://www.udemy.com/course/learn-javascript-for-beginners-v/?couponCode=YOUACCELOCT26 2 Days left at this price!
  5. [English] 1h 47m Learn PHP - For Beginners https://www.udemy.com/course/learn-php-for-beginners-n/?couponCode=YOUACCELOCT26 2 Days left at this price!
  6. [English] 5h 57m JavaScript, Bootstrap, & PHP - Certification for Beginners https://www.udemy.com/course/javascript-bootstrap-php-certification-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  7. [English] 2h 23m Learn XML-AJAX - For Beginners https://www.udemy.com/course/learn-xml-ajax-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  8. [English] 2h 45m Learn Bootstrap - For Beginners https://www.udemy.com/course/learn-bootstrap-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  9. [English] 1h 15m Learn jQuery - For Beginners https://www.udemy.com/course/learn-jquery-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  10. [English] 3h 9m CSS & JavaScript - Certification Course for Beginners https://www.udemy.com/course/css-javascript-certification-course-for-beginners/?couponCode=YOUACCELOCT26 2 Days left at this price!
  11. [English] 6h 2m Ultimate AWS Certified Alexa Skill Builder Specialty 2020 https://www.udemy.com/course/ultimate-aws-certified-alexa-skill-builder-specialty/?couponCode=20F2F1085B9FE981B09C 2 Days left at this price!
  12. [English] 9h 13m Pentaho for ETL & Data Integration Masterclass 2020- PDI 9.0 https://www.udemy.com/course/pentaho-for-etl-data-integration-masterclass/?couponCode=OCTXXVI20 1 Day left at this price!
  13. [English] 34h 56m Machine Learning & Deep Learning in Python & R https://www.udemy.com/course/data_science_a_to_z/?couponCode=OCTXXVI20 1 Day left at this price!
  14. [English] 0h 52m Public Speaking: A tactical approach https://www.udemy.com/course/publicspeakingtactics/?couponCode=9546D2A90B72DB31BF85 2 Days left at this price!
  15. [Spanish] 8h 22m Introducción a Adobe Photoshop CC 2020 (Actualizado) https://www.udemy.com/course/introduccion-a-adobe-photoshop-cc-2020-actualizado/?couponCode=GRATIS-CAPDESIS 2 Days left at this price!
  16. [English] 3h 36m The Complete React JS Course - Basics to Advanced https://www.udemy.com/course/react-js-basics-to-advanced/?couponCode=FREEOCTOBER 2 Days left at this price!
  17. [English] 0h 48m Develop Your Listening Skills to Shine at Work and in Life https://www.udemy.com/course/develop-your-listening-skills-to-shine-at-work-and-in-life/?couponCode=86E39195E8A8084CE232 1 Day left at this price!
  18. [Spanish] 11h 40m Curso Excel y Power BI – Análisis y Visualización de Datos https://www.udemy.com/course/curso-tutorial-aprender-como-usar-power-bi-excel-ejercicios-practicos/?couponCode=OCT20-1 2 Days left at this price!
  19. [English] 1h 28m Learn! Modern JavaScript for React JS - ES6 https://www.udemy.com/course/modern-javascript-es6-for-react-js/?couponCode=FREEOCTOBER 2 Days left at this price!
  20. [English] 2h 5m The Obvious Secrets To Success No One Knows https://www.udemy.com/course/success-secrets-coach/?couponCode=TOSTSNEXPOCT292020 2 Days left at this price!
  21. [English] 2h 21m EQ-2 Resilience and Mental Strength - Emotional Intelligence https://www.udemy.com/course/resiliance-emotional-intelligence/?couponCode=EQRMSEXPOCT292020 2 Days left at this price!
  22. [English] 5h 37m Marketing Analytics: Pricing Strategies and Price Analytics https://www.udemy.com/course/marketing-analytics-pricing-strategies-and-price-analytics/?couponCode=OCTXXVI20 1 Day left at this price!
  23. [German ] 2h 52m Werde ein Menschen-Magnet - Die Charisma-Formel https://www.udemy.com/course/werde-ein-menschen-magnet-die-charisma-formel/?couponCode=CHARISTART 2 Days left at this price!
  24. [English] 12h 46m Complete Machine Learning with R Studio - ML for 2020 https://www.udemy.com/course/machine-learning-with-r-studio/?couponCode=OCTXXVI20 1 Day left at this price!
  25. [English] 7h 7m Marketing Analytics: Forecasting Models with Excel https://www.udemy.com/course/marketing-analytics-forecasting-models-with-excel/?couponCode=OCTXXVI20 1 Day left at this price!
  26. [English] 7h 57m Learn! Python from scratch - Basics to Advanced https://www.udemy.com/course/python-programming-beginner-to-advanced/?couponCode=FREEOCTOBER 2 Days left at this price!
  27. [English] 2h 30m Youtube & Instagram Video Production + Editing Bootcamp 2020 https://www.udemy.com/course/youtube-video-production-bootcamp-2018/?couponCode=PUMPKIN 2 Days left at this price!
  28. [English] 0h 32m GDPR and Data Protection Compliance for Beginners https://www.udemy.com/course/gdpr-and-data-protection-compliance-for-beginners/?couponCode=GDPRFREE 2 Days left at this price!
  29. [English] 1h 57m Machine learning & AI Hands on 3 Projects. https://www.udemy.com/course/machine-learning-and-ai-with-hands-on-projects/?couponCode=FREEOCTOBER 2 Days left at this price!
  30. [English] 6h 49m Machine Learning - Step by Step (2020) https://www.udemy.com/course/step-by-step-guide-to-machine-learning-course/?couponCode=FREEOCTOBER 2 Days left at this price!
  31. [English] 4h 7m Step by step guide to be an Android App Developer https://www.udemy.com/course/a-beginners-guide-to-android-app-development/?couponCode=FREEOCTOBER 2 Days left at this price!
  32. [English] 3h 32m HTML5 - Basics to Advanced with hands-on projects. https://www.udemy.com/course/html-basic-to-advanced/?couponCode=FREEOCTOBER 2 Days left at this price!
  33. [English] 9h 59m Step by Step Guide for Javascript - Basics to Advanced https://www.udemy.com/course/javascript-basics-to-advanced/?couponCode=FREEOCTOBER 2 Days left at this price!
  34. [English] 21h 57m React JS - A Complete Guide for Frontend Web Development https://www.udemy.com/course/react-js-a-complete-guide-for-frontend-web-development/?couponCode=FREEOCTOBER 2 Days left at this price!
  35. [English] 2h 36m EMDR Therapy For PTSD Post Traumatic Stress Disorder https://www.udemy.com/course/certificate-in-ptsd-symptom-relief-through-emdr-therapy/?couponCode=1CE6BA95EB2043A8612C 2 Days left at this price!
  36. [English] 2h 21m Unblock Chakras, Cleanse Aura, Chromotherapy Color Therapy https://www.udemy.com/course/color-therapy-certification-improve-your-life-through-colo?couponCode=81E73256860229CAAF0E 2 Days left at this price!
  37. [English] 2h 59m How To Declutter Your Home With Before After Video Included https://www.udemy.com/course/declutter-and-organize-for-better-home-and-less-stress/?couponCode=B73EF8EC273534ED7BC4 2 Days left at this price!
  38. [English] 1h 14m Nursing Professionals Get Motivated! Motivation For Nurses https://www.udemy.com/course/motivation-for-nurses-30-days-of-praise-for-nurses/?couponCode=334FEE6E04DCBEF2182D 2 Days left at this price!
  39. [English] 1h 12m Canva T-Shirt Design Course Create Stunning Graphics Today! https://www.udemy.com/course/canva-t-shirt-design-course-create-stunning-graphics-today/?couponCode=CHRISTMAS_CAME_EARLY 2 Days left at this price!
  40. [English] 0h 31m Fundamentals of Network Security https://www.udemy.com/course/fundamentals-of-network-security-b/?couponCode=HARISH_INDIA 2 Days left at this price!
  41. [English] 1h 14m Sell Photo Online: Beginners Guide Stock Photography https://www.udemy.com/course/mastering-stock-photography-step-by-step-guideline/?couponCode=STOCKOCT2020F3 2 Days left at this price!
  42. [English] 6h 5m Tableau 2020 Training for Data Science & Business Analytics https://www.udemy.com/course/tableau-for-data-science-and-business-analytics/?couponCode=FB27OCT2020 2 Days left at this price!
  43. [English] 11h 46m Futures Trading Ninja: DIY 12Hour TOP-NOTCH Trading Strategy https://www.udemy.com/course/futures-trading/?couponCode=1OCT20 2 Days left at this price!
  44. [Spanish] 5h 35m Google Adsense. 99 Secretos que Internet No te Enseña. 2020. https://www.udemy.com/course/google-adsense-gana-dinero-achirou-alvaro-chirou-pablo-munoz/?couponCode=TWITCH 2 Days left at this price!
  45. [English] 7h 0m CNN for Computer Vision with Keras and TensorFlow in Python https://www.udemy.com/course/cnn-for-computer-vision-with-keras-and-tensorflow-in-python/?couponCode=OCTXXVI20 1 Day left at this price!
  46. [English] 6h 29m HR Analytics Course with R https://www.udemy.com/course/hr-analytics-course-with-?couponCode=ANALYTICS27 2 Days left at this price!
  47. [English] 6h 59m Instructional Design Course: All Levels Beginner to Advanced https://www.udemy.com/course/instructional-design-course/?couponCode=DESIGN27 2 Days left at this price!
  48. [English] 0h 58m Motion Graphics: Make Liquid Motion Effects in After Effects https://www.udemy.com/course/motion-graphics-liquid-motion-effects-in-after-effects/?couponCode=UD1FREE201026 1 Day left at this price!
  49. [English] 4h 31m Learn Excel from beginner to advance with Example https://www.udemy.com/course/learn-excel-from-beginner-to-advance-with-example/?couponCode=FREE50 2 Days left at this price!
  50. [English] 1h 39m Mastering Deno.js: Beginner to Expert [2020] https://www.udemy.com/course/mastering-denojs-beginner-to-expert/?couponCode=OCTOBERSALE 1 Day left at this price!
  51. [English] 0h 41m Public Speaking for Beginners https://www.udemy.com/course/public-speaking-for-beginners-al/?couponCode=2979E8D97444605D7156 2 Days left at this price!
  52. [English] 0h 58m Presentation Skills: Give a Great New Business Pitch https://www.udemy.com/course/how-to-give-a-new-business-pitch-presentation/?couponCode=74EFB7D6C2FB1A0D9B1E 2 Days left at this price!
  53. [English] 0h 51m Journalism: Conduct Great Media Interviews https://www.udemy.com/course/how-to-conduct-interviews/?couponCode=C84C17A28AE58CBD454E 2 Days left at this price!
  54. [English] 1h 7m Sales Skills Training: Give a Winning Sales Presentation https://www.udemy.com/course/how-to-give-a-sales-presentation/?couponCode=60C26DD7117AF1729851 2 Days left at this price!
  55. [English] 1h 40m Public Speaking: You Can Give Great Financial Presentations https://www.udemy.com/course/how-to-give-financial-presentations/?couponCode=2CDEE253D2739633312E 2 Days left at this price!
  56. [English] 2h 59 The Complete Motivation Course: Motivation for Your Success https://www.udemy.com/course/the-complete-motivation-course-motivation-for-your-success/?couponCode=9960F956CB6AA19CF809 2 Days left at this price!
  57. [English] 1h 24m The Complete Google Forms Course - Sending & Analyzing Forms https://www.udemy.com/course/the-complete-google-forms-course-sending-analyzing-forms/?couponCode=2076C8A7ADCBD6DBDE99 2 Days left at this price!
  58. [English] 4h 54m Master Django by Building Complete RESTful API Project https://www.udemy.com/course/master-django-by-building-complete-restful-api-project/?couponCode=OCTOBERSALE 1 Day left at this price!
  59. [English] 9h 18m Complete Adobe Premiere Pro CC Course - Beginner to Advanced https://www.udemy.com/course/adobepremiereprocccourse/?couponCode=FREEADOBE 2 Days left at this price!
  60. [Spanish] 1h 18m Comienza con R ¡Añade valor a tu CV en 2 horas! https://www.udemy.com/course/el-arte-de-programar-en-r-anade-valor-a-tu-cv/?couponCode=B90E90DE425C8BAC6D10 2 Days left at this price!
  61. [Spanish] 1h 15m Aprende SQL desde cero: ¡Curso con mas de 50 ejercicios! 1 https://www.udemy.com/course/aprende-sql-desde-cero-curso-con-mas-de-50-ejercicios/?couponCode=9497A0979D086BC59ACA 2 Days left at this price!
  62. [Spanish] 1h 41m Tableau: Crea un impacto con la información https://www.udemy.com/course/tableau-10-desde-cero/?couponCode=0B9A15DAABECEF4283E3 2 Days left at this price!
  63. [Spanish] 1h 4m Microsoft Excel - Análisis de datos con tablas dinámicas https://www.udemy.com/course/microsoft-excel-analisis-de-datos-con-tablas-dinamicas/?couponCode=E132A1381313060EADBA 2 Days left at this price!
  64. [Spanish] 1h 47m SQL: Creación de Bases de Datos (De cero a profesional) https://www.udemy.com/course/sql-creacion-de-bd/?couponCode=4C2909E4D310F1B4FA41 2 Days left at this price!
  65. [Arabic] 0h 43m YouTube SEO mini course (Get more views) in Arabic https://www.udemy.com/course/youtube-seo-mini-course/?couponCode=B9CB7555A84C81E259A6 2 Days left at this price!
  66. [English] 4h 48m Microsoft Excel - Learn MS EXCEL For DATA Analysis https://www.udemy.com/course/microsoft-excel-learn-ms-excel-for-data-analysis/?couponCode=23966F2BE2A43C33E5ED 2 Days left at this price!
  67. [English] 0h 33m 30 Days Challenge for a Better Time Management https://www.udemy.com/course/30-days-challenge-for-a-better-time-management/?couponCode=TMFREE 2 Days left at this price!
  68. [English] 2h 15m Outsource Mastery: How To Earn More Money By Doing Less Work https://www.udemy.com/course/outsource-mastery/?couponCode=OCTFREEOUTSOURCE 2 Days left at this price!
  69. [English] 4h 44m Microsoft Excel: Beginner to Data Analysis and Dashboards https://www.udemy.com/course/getting-started-with-microsoft-excel/?couponCode=4471C851C1F635EA50B6 2 Days left at this price!
  70. [English] 1h 55m Machine Learning & Data Science Foundations Masterclass https://www.udemy.com/course/machine-learning-data-science-foundations-masterclass/?couponCode=CLUB11 2 Days left at this price!
  71. [English] 1h 26m Public Speaking: You Can Speak to Large Audiences https://www.udemy.com/course/how-to-speak-to-large-audiences/?couponCode=D862393E365C81A88F76 2 Days left at this price!
  72. [English] 1h 12m Online Course Creation: Complete Course of Blunders to Avoid https://www.udemy.com/course/online-course-creation-complete-course-of-blunders-to-avoid/?couponCode=795DDC3D62699701AA68 2 Days left at this price!
  73. [English] 1h 0m Basics Of Stop Motion Animation Using Canva And OpenShot https://www.udemy.com/course/basics-of-stop-motion-animation-using-canva-and-openshot/?couponCode=87D29D78BE69CC4A77E6 2 Days left at this price!
  74. [English] 1h 23m Basics Of Flat Design Illustrations In Canva https://www.udemy.com/course/how-to-do-flat-design-for-social-media-marketing-in-canva/?couponCode=7C34A04E50CDC001F0FB 2 Days left at this price!
  75. [English] 1h 6m TEDx for NGOs, NonProfits & Volunteers https://www.udemy.com/course/tedx-nonprofit-org/?couponCode=TNNPVEXPOCT292020 2 Days left at this price!
  76. [English] 0h 49m Color Theory Basics: Learning Color Theory With Adobe Color https://www.udemy.com/course/color-theory-basics-learning-color-theory-with-adobe-colo?couponCode=6950A9D3ED98C8948A02 2 Days left at this price!
  77. [English] 3h 37m Intro To Basic Video Creation https://www.udemy.com/course/intro-to-basic-video-creation/?couponCode=2A0546CA0E43EEF9DFEC 2 Days left at this price!
  78. [English] 3h 19m Photo Editing With Free Software https://www.udemy.com/course/photo-editing-with-free-software/?couponCode=6A1829B7BD9A5CD55E4F 2 Days left at this price!
  79. [English] 2h 19m Introduction To The Basics Of Melt & Pour Soap https://www.udemy.com/course/introduction-to-the-basics-of-melt-pour-soap/?couponCode=1A40DBD5832B6B268670 2 Days left at this price!
  80. [English] 0h 57m Analyzing Self Storage Businesses for Maximum Profit https://www.udemy.com/course/self-storage-business/?couponCode=ASBMPEXPOCT292020 2 Days left at this price!
  81. [English] 1h 35m Affiliate Marketing Mastery (2021) - Beginner To Advanced https://www.udemy.com/course/affiliate-marketing-mastery-2021-beginner-to-advanced/?couponCode=MANISHMEHTA 2 Days left at this price!
  82. [English] 2h 59m Complete SQL Bootcamp with MySQL, PHP & Python https://www.udemy.com/course/complete-sql-bootcamp-with-mysql-php-python/?couponCode=SQLBOOTOCT2020F3 1 Day left at this price!
  83. [English] 0h 52m Data Analytics with Excel PivotTables https://www.udemy.com/course/data-analytics-with-excel-pivottables-2016/?couponCode=45D4278FB61058D3D9E4 1 Day left at this price!
  84. [English] 0h 52m Understanding HIPAA Compliance https://www.udemy.com/course/understanding-hipaa-compliance/?couponCode=B3F4C350DD6FB06C1225 1 Day left at this price!
  85. [English] 0h 34m Time Management for Professionals https://www.udemy.com/course/time-management-for-professionals/?couponCode=7E69781A8998EA9C8309 1 Day left at this price!
  86. [English] 9h 39m How to Write and Publish a Research Paper: Complete Guide https://www.udemy.com/course/how-to-write-and-publish-a-research-paper-complete-guide/?couponCode=PAPER26 1 Day left at this price!
  87. [English] 4h 45m Grant Writing Full Course: Nonprofits, Artists & Freelancers https://www.udemy.com/course/grant-writing-course/?couponCode=GRANT26 1 Day left at this price!
  88. [English] 7h 8m Big Data on Amazon web services (AWS) https://www.udemy.com/course/big-data-on-amazon-web-services-aws-cloud-2018/?couponCode=BE8474FF563682A467C7 1 Day left at this price!
  89. [English] 2h 36m C Programming For Beginners -Build Bank ATM Machine Software https://www.udemy.com/course/c-programming-for-beginners-with-real-world-examples/?couponCode=19D2D84BB2687DF326BB 21 hrs left at this price!
  90. [English] 2h 42m SQL Injections Unlocked - SQLi Web Attacks https://www.udemy.com/course/sql-injections-unlocked-sqli-web-attacks/?couponCode=FOR-MY-HACKMATES 18 hrs left at this price!
  91. [English] 7h 4m Build 9 PIC Microcontroller Engineering projects today! https://www.udemy.com/course/pic-microcontroller-build-engineering-projects-today/?couponCode=STAYHOME1022020 21 hrs left at this price!
  92. [English] 1h 2m Arduino: Everything you need to Know https://www.udemy.com/course/arduino-for-newbies-crash-course/?couponCode=STAYHOME1022020 21 hrs left at this price!
  93. [English] 4h 24m The Complete Raspberry Pi Bootcamp https://www.udemy.com/course/raspberry-pi-complete-raspberrypi-bootcamp-python-raspberry-pi/?couponCode=STAYHOME1022020 21 hrs left at this price!
  94. [English] 0h 44m Arduino meets Python: Step by Step https://www.udemy.com/course/arduino-python-control-py-code-arduino-using-python-pip/?couponCode=STAYHOME1022020 21 hrs left at this price!
  95. [English] 1h 37m Sensors: Everything You Need To Know https://www.udemy.com/course/sensors-interfacing-sensor-wiring-sensor-temperature-humidity-sensors/?couponCode=STAYHOME1022020 21 hrs left at this price!
  96. [English] 1h 22m Arduino SMS Sending Motion Detector using Python https://www.udemy.com/course/arduino-sms-sending-motion-detector-using-python/?couponCode=STAYHOME1022020 21 hrs left at this price!
  97. [English] 2h 15m PIC Microcontrollers Timer and Watchdog Timer https://www.udemy.com/course/pic-microcontrollers-timer0-watchdog-timer-advance-picmicrocontrolle?couponCode=STAYHOME1022020 21 hrs left at this price!
  98. [English] 3h 47m Adobe Photoshop CC- Basic Photoshop training https://www.udemy.com/course/adobe-photoshop-cc-basic-photoshop-training/?couponCode=0210CF7D2FCCC0923A73 1 Day left at this price!
  99. [English] 0h 59m How to Make Passive Income With Bitcoin Lending https://www.udemy.com/course/how-to-make-passive-income-with-bitcoin-lending/?couponCode=OCTTHW2020 1 Day left at this price!
  100. [English] 6h 35m YouTube 2020 Million+ Views: Increase Profits, Subs & Rank https://www.udemy.com/course/youtubehacks/?couponCode=FREEPASS0000 1 Day left at this price!
  101. [English] 1h 19m Gain Love Relationship Skills Life Coaching Course https://www.udemy.com/course/get-a-relationship-life-coaching-love-relationship-building/?couponCode=8488CEF063E042E4BD80 1 Day left at this price!
  102. [English] 4h 11m NodeJS for Absolute Beginners https://www.udemy.com/course/nodejs-for-absolute-beginners/?couponCode=E6BFBDF8BB87E36F792E 1 Day left at this price!
  103. [English] 2h 1m Educación Emocional para niños de 3 a 5 años https://www.udemy.com/course/educacion-emocional-para-ninos-de-3-a-5-anos/?couponCode=142522ECD9028DE90A66 1 Day left at this price!
  104. [Spanish] 0h 35m Sistema para Hotel con php y Mysql (2020) https://www.udemy.com/course/sistema-para-hotel-con-php-y-mysql-2020-a/?couponCode=ECFE213D6989C53B2971 1 Day left at this price!
  105. [English] 2h 10m Master the Art of CV Building, Cover Letter & Job Interview https://www.udemy.com/course/master-job-landing/?couponCode=I-TRULY-CARE 1 Day left at this price!
  106. [English] 7h 38m Accounting, Bookkeeping & Financial Statements: Zero to Pro https://www.udemy.com/course/accounting-for-entrepreneurs/?couponCode=3B3CFB3F58EF8A38BF7D 1 Day left at this price!
  107. [English] 4h 40m Facebook Ads - from Beginner to Pro https://www.udemy.com/course/facebook-advertisement-from-beginners-to-pro/?couponCode=FACEBOOK-ADS-FREE 19 hrs left at this price!
  108. [English] 9h 27m Python 3: From ZERO to GUI programming https://freebiesglobal.com/python-3-from-zero-to-gui-programming 18 hrs left at this price!
  109. [English] 4h 27m Vedic Math & Mental Math - MULTIPLICATION : Full Course https://www.udemy.com/course/vedic-math-mental-math-multiplication-full-course/?couponCode=F9BAC66EEF2DD829D3B5 1 Day left at this price!
  110. [English] 1h 18m Learn 23 Ways to Make Money Online with Your Smartphone! https://www.udemy.com/course/make-money-with-your-smartphone/?couponCode=9D54EE1B421C3B3AB3FB 1 Day left at this price!
  111. [English] 1h 0m The Smartphone Product Photography Course https://www.udemy.com/course/the-smartphone-product-photography-course/?couponCode=CA54DC4D6967F6BC73F9 1 Day left at this price!
  112. [English] 2h 47m The complete forex course from scratch to professional https://www.udemy.com/course/the-complete-forex-course-from-scratch-to-professional/?couponCode=78C5F0F6865B3E555A0C 1 Day left at this price!
  113. [English] 4h 42m Watercolor Painting Next Level Techniques and Effects https://www.udemy.com/course/watercolor-painting-next-level-techniques-effects/?couponCode=FREEWATERCOLORCOURSE 1 Day left at this price!
  114. [English] 4h 19m Python Learn by Python Projects & Python Quizzes in 2020 https://www.udemy.com/course/the-complete-python-for-beginner-master-python-from-scratch/?couponCode=00F0142C2B69AE9804EA 1 Day left at this price!
  115. [English] 5h 35m Excel Basics [2020] + Advanced in Ms Excel 2019 & Office 365 https://freebiesglobal.com/excel-basics-2020-advanced-in-ms-excel-2019-office-365 1 Day left at this price!
  116. [English] 10h 39m Lead Generation MASTERY with Facebook Lead & Messenger Ads https://www.udemy.com/course/facebook-lead-ads-course/?couponCode=LEADADS111 1 Day left at this price!
Popular & Best Udemy Courses from $9.99
  1. [English] 32h 33m Master JavaScript – The Most Compete JavaScript Course 2020 $11.99 https://www.udemy.com/course/master-javascript-the-most-compete-javascript-course-2020/?couponCode=LEARNOCT 3 Days left at this price!
  2. [English] 7h 53m Introduction to Cloud Computing on Amazon AWS for Beginners $9.99 https://www.udemy.com/course/introduction-to-cloud-computing-on-amazon-aws-for-beginners/?couponCode=AWSOCT 4 Days left at this price!
  3. [English] AWS Certified Cloud Practitioner 500 Practice Exam Questions $9.99 https://www.udemy.com/course/aws-certified-cloud-practitioner-practice-exams-c/?couponCode=AWSOCT 4 Days left at this price!
  4. [English] 34h 0m The Complete Train the Trainer Bootcamp - Beginners-Advanced $12.99 https://www.udemy.com/course/the-complete-train-the-trainer-bootcamp-beginners-advanced/?couponCode=THANKS1 3 Days left at this price!
  5. [English] 26h 49m Leading Effective Meetings - You Can Lead Effective Meetings $12.99 https://www.udemy.com/course/leading-effective-meetings-you-can-lead-effective-meetings/?couponCode=THANKS2 3 Days left at this price!
  6. [English] 44h 40m SEO TRAINING 2021: Complete SEO Course + WordPress SEO Yoast $10.99 https://www.udemy.com/course/online-seo-training/?couponCode=2OCT999 4 Days left at this price!
  7. [English] 8h 9m Facebook Dynamic Ads (Facebook Dynamic Retargeting) MASTERY $9.99 https://www.udemy.com/course/facebook-dynamic-ads/?couponCode=OCT999 4 Days left at this price!
  8. [English] 56h 8m The Complete Digital Marketing Course for Local Businesses $9.99 https://www.udemy.com/course/local-digital-marketing/?couponCode=2OCT999 4 Days left at this price!
  9. [English] 29h 1m BEST of Facebook Ads: Facebook Ads 2021 ULTIMATE PRO Edition $13.99 https://www.udemy.com/course/facebook-ads-2021/?couponCode=OCT999 4 Days left at this price!
  10. [English] 39h 52m BEST of SEO: #1 SEO Training & Content Marketing Course 2021 $9.99 https://www.udemy.com/course/seo-training-2021/?couponCode=2OCT999 4 Days left at this price!
  11. [English] AWS Certified Developer Associate Practice Exam Questions $9.99 https://www.udemy.com/course/aws-developer-associate-practice-exams/?couponCode=AWSOCT 2 Days left at this price!
  12. [English] 29h 21m AWS Certified Developer Associate Exam Training 2020 [NEW] $9.99 https://www.udemy.com/course/aws-certified-developer-associate-exam-training/?couponCode=AWSOCT 2 Days left at this price!
  13. [English] 31h 16m The Agile Methodology for Project Risk Managers $12.99 https://www.udemy.com/course/the-agile-methodology-for-project-risk-managers/?couponCode=LEARN2020OCT 3 Days left at this price!
  14. [English] 37h 7m Risk Management for Business Analysts (PMI-RMP/IIBA-ECBA) $12.99 https://www.udemy.com/course/risk-management-for-business-analysts-pmi-rmpiiba-ecba/?couponCode=LEARN2020OCT 3 Days left at this price!
  15. [English] 42h 20m Project Management Professional Certification Program (PMP) $12.99 https://www.udemy.com/course/project-management-professional-certification-program-pmp/?couponCode=LEARN2020OCT 4 Days left at this price!
submitted by ViralMedia007 to FREECoursesEveryday [link] [comments]

End of day summary - 09/11

The Dow rose 131.06, or 0.48%, to 27,665.64, the Nasdaq lost 66.05, or 0.60%, to 10,853.55, and the S&P 500 advanced 1.78, or 0.05%, to 3,340.97.
Traders at /thewallstreet cheered as volatility returned to the stock market.
The major averages finished Friday's trading in mixed fashion, as dip buyers provided support for the Dow and the continued tech selloff made the Nasdaq the laggard once again. The chances for another round of fiscal stimulus ahead of the election were hurt yesterday after Democrats stopped the passage of the "skinny" GOP package, but the U.S. economy looks poised for a strong rebound in Q3, corporate earnings continue to largely overshoot pessimistic forecasts and the Fed remains "all in," leaving investors to mull the cross-currents.
Similar to the days before, today's price action was technically-oriented given the absence of market-moving news and the losses in stocks like AAPL, -1.3%, AMZN, -1.9%, and MSFT, -0.7% on no specific corporate news. Apple shares fell 7.4% this week.
The difference today was that their losses were offset by relative strength in the cyclical sectors, namely industrials (+1.4%), materials (+1.3%), and financials (+0.8%). Still, when Apple and Amazon are down more than 1.0%, there must be more winners than losers to make a meaningful difference.
There were more of the latter on Friday, as declining issues outpaced advancing issues at the NYSE and Nasdaq. The information technology (-0.8%), consumer discretionary (-0.3%), and communication services (-0.3%) sectors ended the day in negative territory due to their exposure to the mega-cap stocks.
Interestingly, the S&P 500 was down as much as 0.9% intraday and fell below its 50-day moving average (3322). A broad rebound in the afternoon, however, helped the benchmark index turn positive and close above the key technical level.
In TikTok news, President Trump said that the deadline established for China's ByteDance to sell video-sharing service TikTok's U.S. operations would not be extended, Reuters reported. "It'll either be closed up or they'll sell it," the president told reporters, adding, "There will be no extension of the TikTok deadline." MSFT in partnership with WMT and Oracle have been seen as the leading suitors to purchase TikTok's operations in the U.S., Canada, Australia and New Zealand.
Subsequently, Reuters reported that Chinese officials are so opposed to a forced sale of TikTok's U.S. operations that they would prefer to see the app shut down in the U.S. over that conclusion. Reuters noted that China was willing, if needed, to use revisions it made to a technology exports list on Aug. 28 to delay any deal reached by ByteDance.
Electric vehicle hopeful NKLA continued its fight this morning with a short-seller, which now appears to be "short-sellers." Nikola issued a statement in response to claims made about the company by activist short-seller Hindenburg Research yesterday, calling the firm's report "a hit job for short sale profit driven by greed." Nikola, which added that it has "nothing to hide and we will refute these allegations," announced that it has retained law firm Kirkland & Ellis to evaluate potential legal recourse and intends to bring the actions of the short-seller, together with evidence and documentation, to the attention of the SEC. Following the company's press release regarding the response, Andrew Left's Citron Research said via Twitter, "Congrats to Hindenburg for exposing what appears to be a total fraud with $NKLA. Citron will cover half of all legal expenses. You can't SLAPP the truth away. Explains why Milton sold at $10 this June $NKLA response warrants an SEC investigation to maintain integrity of EV mkt." After having dropped 11% on Thursday, Nikola shares fell a further 14.5%.
Meanwhile, CNBC reported that AAPL has updated its App Store guidelines ahead of the release of iOS 14, with one major revision relating to game streaming services. The tech giant said in its revised guidelines that services such as Google Stadia (GOOG) and Microsoft xCloud are explicitly permitted, though under the condition that games offered in the service must be downloaded directly from the App Store, not from an all-in-one app.
Among the noteworthy gainers was Shares of ORCL, which was in focus after the company reported what Barclays analyst Raimo Lenschow called a "surprisingly strong beat" and growth on licenses despite the continued macro uncertainty. NOG, which rose 1.3% after acquiring interests in the Delaware Basin and raising Q3 production guidance. Also higher was CX, which gained 8.3% in New York after Morgan Stanley analyst Nikolaj Lippmann upgraded the stock to Overweight from Equal Weight.
Among the notable losers was AMRS, which dropped 25.8% after responding to a lawsuit filed by Lavvan against the company for patent infringement and trade secret misappropriation. Also lower was CHWY, which declined 9.8% after reporting some cats have tried to take over the company with whiteclaws.
Despite a blowout fiscal Q4 report, PTON were 4.2% lower following last night's from the fitness products and services provider.
Elsewhere stocks were higher, with the Shanghai composite up 0.79% to around 3,260.35 while the Shenzhen component rose 1.57% to about 12,942.95. Hong Kong’s Hang Seng index advanced 0.78% to end its trading day at 24,503.31.

Currency

The U.S. Dollar Index (93.35, +0.01, unch) reclaimed its overnight loss, gaining 0.7% for the week.

Treasury

U.S. Treasuries ended the abbreviated week with modest gains across the curve. The cash session started with some light selling for the second day in a row, but the market recovered from the early dip with ease.

Commodity

Gold slipped on Friday on a lack of further stimulus from the European Central Bank and the U.S. government, but for the week the safe-haven metal was set to end higher. Crude remained on track for a second weekly drop as investors expected a global glut to persist if demand weakens further with rising COVID-19 cases in some countries.

Crypto

Bitcoin is struggling to gather upside traction despite repeated defense of support at $10,000. The top cryptocurrency’s sell-off from the August high of $12,476 looks to have come to a halt near $10,000 over the past seven days.

YTD

  • FAAMG + some penny stocks +21.0% YTD
  • Spoos +3.4% YTD
  • Old man -3.1% YTD
  • Russy -10.3% YTD

CPI

Total CPI increased 0.4% m/m while core CPI, which excludes food and energy, also rose 0.4%. Those gains left total CPI up 1.3% yyr and core CPI up 1.7% yyr.
The key takeaway from the report, which featured the largest increase in the index for used cars and trucks (+5.4%) since March 1969, is that the increase in the all items index was broad-based; nonetheless, annual inflation rates are still running well below 2.0%, so there is still more noise than bothersome policy signal in the August report.

IPO (Most Anticipated)

Week of Sep14-18
  • Company: AMWL Amwell (NYSE) | Leading telehealth company enabling digital delivery of care for healthcare’s key stakeholders | Initial Shares: 35.0 M | Initial Range: $14.00-16.00 | Priced On: NA | Opened: NA | Underwriters: Lead: Morgan Stanley, Goldman Sachs, Piper Jaffray, UBS, Credit Suisse, Cowen
  • Company: BNL Broadstone Net Lease | REIT that acquires, owns, and manages primarily single-tenant commercial real estate properties | Initial Shares: 33.5 M | Initial Range: $17.00-19.00 | Priced On: NA | Opened: NA | Underwriters: Lead: J.P. Morgan, Goldman Sachs, BMO Capital Markets, Morgan Stanley, Capital One Securities, Truist Securities
  • Company: FROG JFrog (Nasdaq) | Developer of an end-to-end, hybrid, universal DevOps platform | Initial Shares: 11.6 M | Initial Range: $33.00 -37.00 | Priced On: NA | Opened: NA | Underwriters: Lead: Morgan Stanley, JP Morgan, BofA Securities
  • Company: SNOW Snowflake (NYSE) | Developer of a data cloud platform that enables customers to consolidate data into a single source to drive business insights | Initial Shares: 28.0 M | Initial Range: $75.00-85.00 | Priced On: NA | Opened: NA | Underwriters: Lead: Goldman Sachs, Morgan Stanley, JP Morgan, Allen & Co, Citigroup
  • Company: STEP StepStone Group (Nasdaq) | Global private markets investment firm | Initial Shares: 17.5 M | Initial Range: $15.00-17.00 | Priced On: NA | Opened: NA | Underwriters: Lead: JPMorgan, Goldman Sachs, Morgan Stanley, Barclays, UBS Investment Bank
  • Company: SUMO Sumo Logic (Nasdaq) | Pioneer of Continuous Intelligence, a new category of software, which enables organizations to address opportunities presented by digital transformation and cloud computing | Initial Shares: 14.8 M | Initial Range: $17.00-21.00 | Priced On: NA | Opened: NA | Underwriters: Lead: Morgan Stanley, JP Morgan, RBC Capital, Jefferies
  • Company: U Unity Software (NYSE) | Leading platform for creating and operating interactive, real-time 3D content | Initial Shares: 25.0 M | Initial Range: $34.00-42.00 | Priced On: NA | Opened: NA | Underwriters: Lead: Goldman Sachs, Credit Suisse, BofA, Barclays, William Blair
Week of Sep21-25
  • Company: PLTR Palantir Technologies (NYSE) | Software developer for defense, intelligence agencies, law enforcement, and commercial enterprises | Initial Shares: 244.2 | Initial Range: NA | Priced On: NA | Opened: NA | Underwriters: Lead: Direct Listing

What's next?

Beer o'clock
Summary scraped from the interweb. Took 0.41 seconds.
submitted by hibernating_brain to thewallstreet [link] [comments]

How EpiK Protocol “Saved the Miners” from Filecoin with the E2P Storage Model?

How EpiK Protocol “Saved the Miners” from Filecoin with the E2P Storage Model?

https://preview.redd.it/n5jzxozn27v51.png?width=2222&format=png&auto=webp&s=6cd6bd726582bbe2c595e1e467aeb3fc8aabe36f
On October 20, Eric Yao, Head of EpiK China, and Leo, Co-Founder & CTO of EpiK, visited Deep Chain Online Salon, and discussed “How EpiK saved the miners eliminated by Filecoin by launching E2P storage model”. ‘?” The following is a transcript of the sharing.
Sharing Session
Eric: Hello, everyone, I’m Eric, graduated from School of Information Science, Tsinghua University. My Master’s research was on data storage and big data computing, and I published a number of industry top conference papers.
Since 2013, I have invested in Bitcoin, Ethereum, Ripple, Dogcoin, EOS and other well-known blockchain projects, and have been settling in the chain circle as an early technology-based investor and industry observer with 2 years of blockchain experience. I am also a blockchain community initiator and technology evangelist
Leo: Hi, I’m Leo, I’m the CTO of EpiK. Before I got involved in founding EpiK, I spent 3 to 4 years working on blockchain, public chain, wallets, browsers, decentralized exchanges, task distribution platforms, smart contracts, etc., and I’ve made some great products. EpiK is an answer to the question we’ve been asking for years about how blockchain should be landed, and we hope that EpiK is fortunate enough to be an answer for you as well.
Q & A
Deep Chain Finance:
First of all, let me ask Eric, on October 15, Filecoin’s main website launched, which aroused everyone’s attention, but at the same time, the calls for fork within Filecoin never stopped. The EpiK protocol is one of them. What I want to know is, what kind of project is EpiK Protocol? For what reason did you choose to fork in the first place? What are the differences between the forked project and Filecoin itself?
Eric:
First of all, let me answer the first question, what kind of project is EpiK Protocol.
With the Fourth Industrial Revolution already upon us, comprehensive intelligence is one of the core goals of this stage, and the key to comprehensive intelligence is how to make machines understand what humans know and learn new knowledge based on what they already know. And the knowledge graph scale is a key step towards full intelligence.
In order to solve the many challenges of building large-scale knowledge graphs, the EpiK Protocol was born. EpiK Protocol is a decentralized, hyper-scale knowledge graph that organizes and incentivizes knowledge through decentralized storage technology, decentralized autonomous organizations, and generalized economic models. Members of the global community will expand the horizons of artificial intelligence into a smarter future by organizing all areas of human knowledge into a knowledge map that will be shared and continuously updated for the eternal knowledge vault of humanity
And then, for what reason was the fork chosen in the first place?
EpiK’s project founders are all senior blockchain industry practitioners and have been closely following the industry development and application scenarios, among which decentralized storage is a very fresh application scenario.
However, in the development process of Filecoin, the team found that due to some design mechanisms and historical reasons, the team found that Filecoin had some deviations from the original intention of the project at that time, such as the overly harsh penalty mechanism triggered by the threat to weaken security, and the emergence of the computing power competition leading to the emergence of computing power monopoly by large miners, thus monopolizing the packaging rights, which can be brushed with computing power by uploading useless data themselves.
The emergence of these problems will cause the data environment on Filecoin to get worse and worse, which will lead to the lack of real value of the data in the chain, high data redundancy, and the difficulty of commercializing the project to land.
After paying attention to the above problems, the project owner proposes to introduce multi-party roles and a decentralized collaboration platform DAO to ensure the high value of the data on the chain through a reasonable economic model and incentive mechanism, and store the high-value data: knowledge graph on the blockchain through decentralized storage, so that the lack of value of the data on the chain and the monopoly of large miners’ computing power can be solved to a large extent.
Finally, what differences exist between the forked project and Filecoin itself?
On the basis of the above-mentioned issues, EpiK’s design is very different from Filecoin, first of all, EpiK is more focused in terms of business model, and it faces a different market and track from the cloud storage market where Filecoin is located because decentralized storage has no advantage over professional centralized cloud storage in terms of storage cost and user experience.
EpiK focuses on building a decentralized knowledge graph, which reduces data redundancy and safeguards the value of data in the distributed storage chain while preventing the knowledge graph from being tampered with by a few people, thus making the commercialization of the entire project reasonable and feasible.
From the perspective of ecological construction, EpiK treats miners more friendly and solves the pain point of Filecoin to a large extent, firstly, it changes the storage collateral and commitment collateral of Filecoin to one-time collateral.
Miners participating in EpiK Protocol are only required to pledge 1000 EPK per miner, and only once before mining, not in each sector.
What is the concept of 1000 EPKs, you only need to participate in pre-mining for about 50 days to get this portion of the tokens used for pledging. The EPK pre-mining campaign is currently underway, and it runs from early September to December, with a daily release of 50,000 ERC-20 standard EPKs, and the pre-mining nodes whose applications are approved will divide these tokens according to the mining ratio of the day, and these tokens can be exchanged 1:1 directly after they are launched on the main network. This move will continue to expand the number of miners eligible to participate in EPK mining.
Secondly, EpiK has a more lenient penalty mechanism, which is different from Filecoin’s official consensus, storage and contract penalties, because the protocol can only be uploaded by field experts, which is the “Expert to Person” mode. Every miner needs to be backed up, which means that if one or more miners are offline in the network, it will not have much impact on the network, and the miner who fails to upload the proof of time and space in time due to being offline will only be forfeited by the authorities for the effective computing power of this sector, not forfeiting the pledged coins.
If the miner can re-submit the proof of time and space within 28 days, he will regain the power.
Unlike Filecoin’s 32GB sectors, EpiK’s encapsulated sectors are smaller, only 8M each, which will solve Filecoin’s sector space wastage problem to a great extent, and all miners have the opportunity to complete the fast encapsulation, which is very friendly to miners with small computing power.
The data and quality constraints will also ensure that the effective computing power gap between large and small miners will not be closed.
Finally, unlike Filecoin’s P2P data uploading model, EpiK changes the data uploading and maintenance to E2P uploading, that is, field experts upload and ensure the quality and value of the data on the chain, and at the same time introduce the game relationship between data storage roles and data generation roles through a rational economic model to ensure the stability of the whole system and the continuous high-quality output of the data on the chain.
Deep Chain Finance:
Eric, on the eve of Filecoin’s mainline launch, issues such as Filecoin’s pre-collateral have aroused a lot of controversy among the miners. In your opinion, what kind of impact will Filecoin bring to itself and the whole distributed storage ecosystem after it launches? Do you think that the current confusing FIL prices are reasonable and what should be the normal price of FIL?
Eric:
Filecoin mainnet has launched and many potential problems have been exposed, such as the aforementioned high pre-security problem, the storage resource waste and computing power monopoly caused by unreasonable sector encapsulation, and the harsh penalty mechanism, etc. These problems are quite serious, and will greatly affect the development of Filecoin ecology.
These problems are relatively serious, and will greatly affect the development of Filecoin ecology, here are two examples to illustrate. For example, the problem of big miners computing power monopoly, now after the big miners have monopolized computing power, there will be a very delicate state — — the miners save a file data with ordinary users. There is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. And after the big miners have monopolized computing power, there will be a very delicate state — — the miners will save a file data with ordinary users, there is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. Because I can fake another identity to upload data for myself, but that leads to the fact that for any miner I go to choose which data to save. I have only one goal, and that is to brush my computing power and how fast I can brush my computing power.
There is no difference between saving other people’s data and saving my own data in the matter of computing power. When I save someone else’s data, I don’t know that data. Somewhere in the world, the bandwidth quality between me and him may not be good enough.
The best option is to store my own local data, which makes sense, and that results in no one being able to store data on the chain at all. They only store their own data, because it’s the most economical for them, and the network has essentially no storage utility, no one is providing storage for the masses of retail users.
The harsh penalty mechanism will also severely deplete the miner’s profits, because DDOS attacks are actually a very common attack technique for the attacker, and for a big miner, he can get a very high profit in a short period of time if he attacks other customers, and this thing is a profitable thing for all big miners.
Now as far as the status quo is concerned, the vast majority of miners are actually not very well maintained, so they are not very well protected against these low-DDOS attacks. So the penalty regime is grim for them.
The contradiction between the unreasonable system and the demand will inevitably lead to the evolution of the system in a more reasonable direction, so there will be many forked projects that are more reasonable in terms of mechanism, thus attracting Filecoin miners and a diversion of storage power.
Since each project is in the field of decentralized storage track, the demand for miners is similar or even compatible with each other, so miners will tend to fork the projects with better economic benefits and business scenarios, so as to filter out the projects with real value on the ground.
For the chaotic FIL price, because FIL is also a project that has gone through several years, carrying too many expectations, so it can only be said that the current situation has its own reasons for existence. As for the reasonable price of FIL there is no way to make a prediction because in the long run, it is necessary to consider the commercialization of the project to land and the value of the actual chain of data. In other words, we need to keep observing whether Filecoin will become a game of computing power or a real value carrier.
Deep Chain Finance:
Leo, we just mentioned that the pre-collateral issue of Filecoin caused the dissatisfaction of miners, and after Filecoin launches on the main website, the second round of space race test coins were directly turned into real coins, and the official selling of FIL hit the market phenomenon, so many miners said they were betrayed. What I want to know is, EpiK’s main motto is “save the miners eliminated by Filecoin”, how to deal with the various problems of Filecoin, and how will EpiK achieve “save”?
Leo:
Originally Filecoin’s tacit approval of the computing power makeup behavior was to declare that the official directly chose to abandon the small miners. And this test coin turned real coin also hurt the interests of the loyal big miners in one cut, we do not know why these low-level problems, we can only regret.
EpiK didn’t do it to fork Filecoin, but because EpiK to build a shared knowledge graph ecology, had to integrate decentralized storage in, so the most hardcore Filecoin’s PoRep and PoSt decentralized verification technology was chosen. In order to ensure the quality of knowledge graph data, EpiK only allows community-voted field experts to upload data, so EpiK naturally prevents miners from making up computing power, and there is no reason for the data that has no value to take up such an expensive decentralized storage resource.
With the inability to make up computing power, the difference between big miners and small miners is minimal when the amount of knowledge graph data is small.
We can’t say that we can save the big miners, but we are definitely the optimal choice for the small miners who are currently in the market to be eliminated by Filecoin.
Deep Chain Finance:
Let me ask Eric: According to EpiK protocol, EpiK adopts the E2P model, which allows only experts in the field who are voted to upload their data. This is very different from Filecoin’s P2P model, which allows individuals to upload data as they wish. In your opinion, what are the advantages of the E2P model? If only voted experts can upload data, does that mean that the EpiK protocol is not available to everyone?
Eric:
First, let me explain the advantages of the E2P model over the P2P model.
There are five roles in the DAO ecosystem: miner, coin holder, field expert, bounty hunter and gateway. These five roles allocate the EPKs generated every day when the main network is launched.
The miner owns 75% of the EPKs, the field expert owns 9% of the EPKs, and the voting user shares 1% of the EPKs.
The other 15% of the EPK will fluctuate based on the daily traffic to the network, and the 15% is partly a game between the miner and the field expert.
The first describes the relationship between the two roles.
The first group of field experts are selected by the Foundation, who cover different areas of knowledge (a wide range of knowledge here, including not only serious subjects, but also home, food, travel, etc.) This group of field experts can recommend the next group of field experts, and the recommended experts only need to get 100,000 EPK votes to become field experts.
The field expert’s role is to submit high-quality data to the miner, who is responsible for encapsulating this data into blocks.
Network activity is judged by the amount of EPKs pledged by the entire network for daily traffic (1 EPK = 10 MB/day), with a higher percentage indicating higher data demand, which requires the miner to increase bandwidth quality.
If the data demand decreases, this requires field experts to provide higher quality data. This is similar to a library with more visitors needing more seats, i.e., paying the miner to upgrade the bandwidth.
When there are fewer visitors, more money is needed to buy better quality books to attract visitors, i.e., money for bounty hunters and field experts to generate more quality knowledge graph data. The game between miners and field experts is the most important game in the ecosystem, unlike the game between the authorities and big miners in the Filecoin ecosystem.
The game relationship between data producers and data storers and a more rational economic model will inevitably lead to an E2P model that generates stored on-chain data of much higher quality than the P2P model, and the quality of bandwidth for data access will be better than the P2P model, resulting in greater business value and better landing scenarios.
I will then answer the question of whether this means that the EpiK protocol will not be universally accessible to all.
The E2P model only qualifies the quality of the data generated and stored, not the roles in the ecosystem; on the contrary, with the introduction of the DAO model, the variety of roles introduced in the EpiK ecosystem (which includes the roles of ordinary people) is not limited. (Bounty hunters who can be competent in their tasks) gives roles and possibilities for how everyone can participate in the system in a more logical way.
For example, a miner with computing power can provide storage, a person with a certain domain knowledge can apply to become an expert (this includes history, technology, travel, comics, food, etc.), and a person willing to mark and correct data can become a bounty hunter.
The presence of various efficient support tools from the project owner will lower the barriers to entry for various roles, thus allowing different people to do their part in the system and together contribute to the ongoing generation of a high-quality decentralized knowledge graph.
Deep Chain Finance:
Leo, some time ago, EpiK released a white paper and an economy whitepaper, explaining the EpiK concept from the perspective of technology and economy model respectively. What I would like to ask is, what are the shortcomings of the current distributed storage projects, and how will EpiK protocol be improved?
Leo:
Distributed storage can easily be misunderstood as those of Ali’s OceanDB, but in the field of blockchain, we should focus on decentralized storage first.
There is a big problem with the decentralized storage on the market now, which is “why not eat meat porridge”.
How to understand it? Decentralized storage is cheaper than centralized storage because of its technical principle, and if it is, the centralized storage is too rubbish for comparison.
What incentive does the average user have to spend more money on decentralized storage to store data?
Is it safer?
Existence miners can shut down at any time on decentralized storage by no means save a share of security in Ariadne and Amazon each.
More private?
There’s no difference between encrypted presence on decentralized storage and encrypted presence on Amazon.
Faster?
The 10,000 gigabytes of bandwidth in decentralized storage simply doesn’t compare to the fiber in a centralized server room. This is the root problem of the business model, no one is using it, no one is buying it, so what’s the big vision.
The goal of EpiK is to guide all community participants in the co-construction and sharing of field knowledge graph data, which is the best way for robots to understand human knowledge, and the more knowledge graph data there is, the more knowledge a robot has, the more intelligent it is exponentially, i.e., EpiK uses decentralized storage technology. The value of exponentially growing data is captured with linearly growing hardware costs, and that’s where the buy-in for EPK comes in.
Organized data is worth a lot more than organized hard drives, and there is a demand for EPK when robots have the need for intelligence.
Deep Chain Finance:
Let me ask Leo, how many forked projects does Filecoin have so far, roughly? Do you think there will be more or less waves of fork after the mainnet launches? Have the requirements of the miners at large changed when it comes to participation?
Leo:
We don’t have specific statistics, now that the main network launches, we feel that forking projects will increase, there are so many restricted miners in the market that they need to be organized efficiently.
However, we currently see that most forked projects are simply modifying the parameters of Filecoin’s economy model, which is undesirable, and this level of modification can’t change the status quo of miners making up computing power, and the change to the market is just to make some of the big miners feel more comfortable digging up, which won’t help to promote the decentralized storage ecology to land.
We need more reasonable landing scenarios so that idle mining resources can be turned into effective productivity, pitching a 100x coin instead of committing to one Fomo sentiment after another.
Deep Chain Finance:
How far along is the EpiK Protocol project, Eric? What other big moves are coming in the near future?
Eric:
The development of the EpiK Protocol is divided into 5 major phases.
(a) Phase I testing of the network “Obelisk”.
Phase II Main Network 1.0 “Rosetta”.
Phase III Main Network 2.0 “Hammurabi”.
(a) The Phase IV Enrichment Knowledge Mapping Toolkit.
The fifth stage is to enrich the knowledge graph application ecology.
Currently in the first phase of testing network “Obelisk”, anyone can sign up to participate in the test network pre-mining test to obtain ERC20 EPK tokens, after the mainnet exchange on a one-to-one basis.
We have recently launched ERC20 EPK on Uniswap, you can buy and sell it freely on Uniswap or download our EpiK mobile wallet.
In addition, we will soon launch the EpiK Bounty platform, and welcome all community members to do tasks together to build the EpiK community. At the same time, we are also pushing forward the centralized exchange for token listing.
Users’ Questions
User 1:
Some KOLs said, Filecoin consumed its value in the next few years, so it will plunge, what do you think?
Eric:
First of all, the judgment of the market is to correspond to the cycle, not optimistic about the FIL first judgment to do is not optimistic about the economic model of the project, or not optimistic about the distributed storage track.
First of all, we are very confident in the distributed storage track and will certainly face a process of growth and decline, so as to make a choice for a better project.
Since the existing group of miners and the computing power already produced is fixed, and since EpiK miners and FIL miners are compatible, anytime miners will also make a choice for more promising and economically viable projects.
Filecoin consumes the value of the next few years this time, so it will plunge.
Regarding the market issues, the plunge is not a prediction, in the industry or to keep learning iteration and value judgment. Because up and down market sentiment is one aspect, there will be more very important factors. For example, the big washout in March this year, so it can only be said that it will slow down the development of the FIL community. But prices are indeed unpredictable.
User2:
Actually, in the end, if there are no applications and no one really uploads data, the market value will drop, so what are the landing applications of EpiK?
Leo: The best and most direct application of EpiK’s knowledge graph is the question and answer system, which can be an intelligent legal advisor, an intelligent medical advisor, an intelligent chef, an intelligent tour guide, an intelligent game strategy, and so on.
submitted by EpiK-Protocol to u/EpiK-Protocol [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

NEAR PROJECT REPORT

NEAR PROJECT REPORT
Author: Gamals Ahmed, CoinEx Business Ambassador
https://preview.redd.it/xbnvecjn71t51.png?width=1164&format=png&auto=webp&s=acfd141ead035ee156f218eec9fc41288142a922

ABSTRACT

The effects of the web by a number of companies have seduced a large number of users as these companies keep their data to prevent them from searching for alternatives. Likewise, these huge platforms have attracted applications to build their highest ecosystems before either severing access or actively opposing their interests when the applications became so successful. As a result, these walled gardens have effectively hindered innovation and monopolized large sections of the web. After the emergence of blockchain technology and decentralized cryptocurrencies, the need for applications to support decentralization has emerged. Several blockchain-based companies, applications and platforms have appeared in decentralization. In this research report, we will explain the approach adopted by the NEAR decentralization platform in designing and implementing the basic technology for its system. Near is a basic platform for cloud computing and decentralized storage managed by the community, designed to enable the open web for the future. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future.

1. INTRODUCTION

The richness of the web is increasing day by day with the combined efforts of millions of people who have benefited from “innovation without permission” as content and applications are created without asking anyone. this lack of freedom of data has led to an environment hostile to the interests of its participants. And as we explained in the summary previously, web hosting companies have hindered innovation and greatly monopolized the web.
In the future, we can fix this by using new technologies to re-enable the permissionless innovation of the past in a way, which creates a more open web where users are free and applications are supportive rather than adversarial to their interests.
Decentralization emerged after the global financial crisis in 2008, which created fundamental problems of confidence in the heavily indebted banking system. Then the decentralized financial sector based on Blockchain technology has emerged since 2009.
Decentralized Blockchain technology has made it easy for decentralized digital currencies like Bitcoin to exchange billions of dollars in peer-to-peer transfers for a fraction of the price of a traditional banking system. This technology allows participants in the over $ 50 billion virtual goods economy to track, own and trade in these commodities without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital.
By default, the Internet where freedom of data enables innovation will lead to the development of a new form of software development. On this web, developers can quickly create applications from open state components and boost their efforts by using new business models that are enabled from within the program itself rather than relying on parasitic relationships with their users. This not only accelerates the creation of applications that have a more honest and cooperative relationship with its users, but also allows the emergence of completely new business built on them.
To enable these new applications and the open web, it needs the appropriate infrastructure. The new web platform cannot be controlled by a single entity and its use is not limited due to insufficient scalability. It should be decentralized in design like the web itself and supported by a community of distributors widely so that the value they store cannot be monitored, modified or removed without permission from the users who store this value on their behalf.
A new decentralization technology (Blockchain), which has facilitated decentralized digital currencies like Bitcoin, has made billions of dollars in peer-to-peer transfers at a fraction of the price of the traditional banking system. This technology allows participants in the $ 50 billion + virtual goods economy to track, own and trade in these goods without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital.
Although the cost of storing data or performing a calculation on the Ethereum blockchain is thousands and millions of times higher than the cost of performing the same functionality on Amazon Web Services. A developer can always create a “central” app or even a central currency for a fraction of the cost of doing the same on a decentralized platform because a decentralized platform, by definition, will have many iterations in its operations and storage.
Bitcoin can be thought of as the first, very basic, version of this global community-run cloud, though it is primarily used only to store and move the Bitcoin digital currency.
Ethereum is the second and slightly more sophisticated version, which expanded the basic principles of Bitcoin to create a more general computing and storage platform, though it is a raw technology, which hasn’t achieved meaningful mainstream adoption.

1.1 WHY IS IT IMPORTANT TO PAY THE EXTRA COST TO SUPPORT DECENTRALIZATION?

Because some elements of value, for example bits representing digital currency ownership, personal identity, or asset notes, are very sensitive. While in the central system, the following players can change the value of any credits they come into direct contact with:
  1. The developer who controls the release or update of the application’s code
  2. The platform where the data is stored
  3. The servers which run the application’s code
Even if none of these players intend to operate with bad faith, the actions of governments, police forces and hackers can easily turn their hands against their users and censor, modify or steal the balances they are supposed to protect.
A typical user will trust a typical centralized application, despite its potential vulnerabilities, with everyday data and computation. Typically, only banks and governments are trusted sufficiently to maintain custody of the most sensitive information — balances of wealth and identity. But these entities are also subject to the very human forces of hubris, corruption and theft.
Especially after the 2008 global financial crisis, which demonstrated the fundamental problems of confidence in a highly indebted banking system. And governments around the
world apply significant capital controls to citizens during times of crisis. After these examples, it has become a truism that hackers now own most or all of your sensitive data.
These decentralized applications operate on a more complex infrastructure than today’s web but they have access to an instantaneous and global pool of currency, value and information that today’s web, where data is stored in the silos of individual corporations, cannot provide.

1.2 THE CHALLENGES OF CREATING A DECENTRALIZED CLOUD

A community-run system like this has very different challenges from centralized “cloud” infrastructure, which is running by a single entity or group of known entities. For example:
  1. It must be both inclusive to anyone and secure from manipulation or capture.
  2. Participants must be fairly compensated for their work while avoiding creating incentives for negligent or malicious behavior.
  3. It must be both game theoretically secure so good actors find the right equilibrium and resistant to manipulation so bad actors are actively prevented from negatively affecting the system.

2. NEAR

NEAR is a global community-run computing and storage cloud which is organized to be permissionless and which is economically incentivized to create a strong and decentralized data layer for the new web.
Essentially, it is a platform for running applications which have access to a shared — and secure — pool of money, identity and data which is owned by their users. More technically, it combines the features of partition-resistant networking, serverless compute and distributed storage into a new kind of platform.
NEAR is a community-managed, decentralized cloud storage and computing platform, designed to enable the open web in the future. It uses the same core technology for Bitcoin and Blockchain. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future.
NEAR is a decentralized community-run cloud computing and storage platform, which is designed to enable the open web of the future. On this web, everything from new currencies to new applications to new industries can be created, opening the door to a brand new future.
NEAR is a scalable computing and storage platform with the potential to change how systems are designed, how applications are built and how the web itself works.
It is a complex technology allow developers and entrepreneurs to easily and sustainably build applications which reap the benefits of decentralization and participate in the Open Web while minimizing the associated costs for end users.
NEAR creates the only community-managed cloud that is strong enough to power the future of the open web, as NEAR is designed from the ground up to deliver intuitive experiences to
end users, expand capacity across millions of devices, and provide developers with new and sustainable business models for their applications.
The NEAR Platform uses a token — also called “NEAR”. This token allows the users of these cloud resources, regardless of where they are in the world, to fairly compensate the providers of the services and to ensure that these participants operate in good faith.

2.1 WHY NEAR?

Through focus, we find that Platforms based on blockchain technologies like Bitcoin and Ethereum have made great progress and enriched the world with thousands of innovative applications spanning from games to decentralized financing.
However, these original networks and none of the networks that followed were not able to bridge the gap towards mainstream adoption of the applications created above them and do not provide this type of standard that fully supports the web.
This is a result of two key factors:
  1. System design
  2. Organization design
System design is relevant because the technical architecture of other platforms creates substantial problems with both usability and scalability which have made adoption nearly impossible by any but the most technical innovators. End-users experience 97–99% dropoff rates when using applications and developers find the process of creating and maintaining their applications endlessly frustrating.
Fixing these problems requires substantial and complex changes to current protocol architectures, something which existing organizations haven’t proven capable of implementing. Instead, they create multi-year backlogs of specification design and implementation, which result in their technology falling further and further behind.
NEAR’s platform and organization are architected specifically to solve the above-mentioned problems. The technical design is fanatically focused on creating the world’s most usable and scalable decentralized platform so global-scale applications can achieve real adoption. The organization and governance structure are designed to rapidly ship and continuously evolve the protocol so it will never become obsolete.

2.1.1 Features, which address these problems:

1. USABILITY FIRST
The most important problem that needs to be addressed is how to allow developers to create useful applications that users can use easily and that will capture the sustainable value of these developers.
2. End-User Usability
Developers will only build applications, which their end users can actually use. NEAR’s “progressive security” model allows developers to create experiences for their users which more closely resemble familiar web experiences by delaying onboarding, removing the need for user to learn “blockchain” concepts and limiting the number of permission-asking interactions the user must have to use the application.
1. Simple Onboarding: NEAR allows developers to take actions on behalf of their users, which allows them to onboard users without requiring these users to provide a wallet or interact with tokens immediately upon reaching an application. Because accounts keep track of application-specific keys, user accounts can also be used for the kind of “Single Sign On” (SSO) functionality that users are familiar with from the traditional web (eg “Login with Facebook/Google/Github/etc”).
2. Easy Subscriptions: Contract-based accounts allow for easy creation of subscriptions and custom permissioning for particular applications.
3. Familiar Usage Styles: The NEAR economic model allows developers to pay for usage on behalf of their users in order to hide the costs of infrastructure in a way that is in line with familiar web usage paradigms.
4. Predictable Pricing: NEAR prices transactions on the platform in simple terms, which allow end-users to experience predictable pricing and less cognitive load when using the platform.

2.1.2 Design principles and development NEAR’s platform

1. Usability: Applications deployed to the platform should be seamless to use for end users and seamless to create for developers. Wherever possible, the underlying technology itself should fade to the background or be hidden completely from end users. Wherever possible, developers should use familiar languages and patterns during the development process. Basic applications should be intuitive and simple to create while applications that are more robust should still be secure.
2. Scalability: The platform should scale with no upper limit as long as there is economic justification for doing so in order to support enterprise-grade, globally used applications.
3. Sustainable Decentralization: The platform should encourage significant decentralization in both the short term and the long term in order to properly secure the value it hosts. The platform — and community — should be widely and permissionlessly inclusive and actively encourage decentralization and participation. To maintain sustainability, both technological and community governance mechanisms should allow for practical iteration while avoiding capture by any single parties in the end.
4. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose. Optimize for simplicity, pragmatism and ease of understanding above theoretical perfection.

2.2 HOW NEAR WORKS?

NEAR’s platform provides a community-operated cloud infrastructure for deploying and running decentralized applications. It combines the features of a decentralized database with others of a serverless compute platform. The token, which allows this platform to run also, enables applications built on top of it to interact with each other in new ways. Together, these features allow developers to create censorship resistant back-ends for applications that deal with high stakes data like money, identity, assets, and open-state components, which interact seamlessly with each other. These application back-ends and components are called “smart contracts,” though we will often refer to these all as simply “applications” here.
The infrastructure, which makes up this cloud, is created from a potentially infinite number of “nodes” run by individuals around the world who offer portions of their CPU and hard drive space — whether on their laptops or more professionally deployed servers. Developers write smart contracts and deploy them to this cloud as if they were deploying to a single server, which is a process that feels very similar to how applications are deployed to existing centralized clouds.
Once the developer has deployed an application, called a “smart contract”, and marked it unchangeable (“immutable”), the application will now run for as long as at least a handful of members of the NEAR community continue to exist. When end users interact with that deployed application, they will generally do so through a familiar web or mobile interface just like any one of a million apps today.
In the central cloud hosted by some companies today like: Amazon or Google, developers pay for their apps every month based on the amount of usage needed, for example based on the number of requests created by users visiting their webpages. The NEAR platform similarly requires that either users or developers provide compensation for their usage to the community operators of this infrastructure. Like today’s cloud infrastructure, NEAR prices usage based on easy to understand metrics that aren’t heavily influenced by factors like system congestion. Such factors make it very complicated for developers on alternative blockchain-based systems today.
In the centralized cloud, the controlling corporation makes decisions unilaterally. NEAR community-run cloud is decentralized so updates must ultimately be accepted by a sufficient quorum of the network participants. Updates about its future are generated from the community and subject to an inclusive governance process, which balances efficiency and security.
In order to ensure that the operators of nodes — who are anonymous and potentially even malicious — run the code with good behavior, they participate in a staking process called “Proof of Stake”. In this process, they willingly put a portion of value at risk as a sort of deposit, which they will forfeit if it is proven that they have operated improperly.

2.2.1 Elements of the NEAR’s Platform

The NEAR platform is made up of many separate elements. Some of these are native to the platform itself while others are used in conjunction with or on top of it.
1. THE NEAR TOKEN
NEAR token is the fundamental native asset of the NEAR ecosystem and its functionality is enabled for all accounts. Each token is a unique digital asset similar to Ether, which can be used to:
a) Pay the system for processing transactions and storing data.
b) Run a validating node as part of the network by participating in the staking process.
c) Help determine how network resources are allocated and where its future technical direction will go by participating in governance processes.
The NEAR token enables the economic coordination of all participants who operate the network plus it enables new behaviors among the applications which are built on top of that network.
2. OTHER DIGITAL ASSETS
The platform is designed to easily store unique digital assets, which may include, but aren’t limited to:
  • Other Tokens: Tokens bridged from other chains (“wrapped”) or created atop the NEAR Platform can be easily stored and moved using the underlying platform. This allows many kinds of tokens to be used atop the platform to pay for goods and services. “Stablecoins,” specific kinds of token which are designed to match the price of another asset (like the US Dollar), are particularly useful for transacting on the network in this way.
  • Unique Digital Assets: Similar to tokens, digital assets (sometimes called “Non Fungible Tokens” (NFTs) ranging from in-game collectibles to representations of real-world asset ownership can be stored and moved using the platform.
3. THE NEAR PLATFORM
The core platform, which is made up of the cloud of community-operated nodes, is the most basic piece of infrastructure provided. Developers can permissionlessly deploy smart contracts to this cloud and users can permissionlessly use the applications they power. Applications, which could range from consumer-facing games to digital currencies, can store their state (data) securely on the platform. This is conceptually similar to the Ethereum platform.
Operations that require an account, network use, or storage at the top of the platform require payment to the platform in the form of transaction fees that the platform then distributes to its community from the authentication contract. These operations could include creating new accounts, publishing new contracts, implementing code by contract and storing or modifying data by contract.
As long as the rules of the protocol are followed, any independent developer can write software, which interfaces with it (for example, by submitting transactions, creating accounts or even running a new node client) without asking for anyone’s permission first.
4. THE NEAR DEVELOPMENT SUITE
Set of tools and reference implementations created to facilitate its use by those developers and end users who prefer them. These tools include:
  • NEAR SDKs: NEAR platform supports (Rust and AssemblyScript) languages to write smart contracts. To provide a great experience for developers, NEAR has a full SDK, which includes standard data structures, examples and testing tools for these two languages.
  • Gitpod for NEAR: NEAR uses existing technology Gitpod to create zero time onboarding experience for developers. Gitpod provides an online “Integrated Development Environment” (IDE), which NEAR customized to allow developers to easily write, test and deploy smart contracts from a web browser.
  • NEAR Wallet: A wallet is a basic place for developers and end users to store the assets they need to use the network. NEAR Wallet is a reference implementation that is intended to work seamlessly with the progressive security model that lets application developers design more effective user experiences. It will eventually include built-in functionality to easily enable participation by holders in staking and governance processes on the network.
  • NEAR Explorer: To aid with both debugging of contracts and the understanding of network performance, Explorer presents information from the blockchain in an easily digestible web-based format.
  • NEAR Command Line Tools: The NEAR team provides a set of straightforward command line tools to allow developers to easily create, test and deploy applications from their local environments.
All of these tools are being created in an open-source manner so they can be modified or deployed by anyone.

3. ECONOMIC

Primarily economic forces drive the ecosystem, which makes up the NEAR platform. This economy creates the incentives, which allow participants permissionlessly organize to drive the platform’s key functions while creating strong disincentives for undesirable, irresponsible or malicious behavior. In order for the platform to be effective, these incentives need to exist both in the short term and in the long term.
The NEAR platform is a market among participants interested in two aspects:
  • On the supply side, certification contract operators and other core infrastructure must be motivated to provide these services that make up the community cloud.
  • On the demand side, platform developers and end-users who pay for their use need to be able to do so in a simple, clear and consistent way that helps them.
Further, economic forces can also be applied to support the ecosystem as a whole. They can be used at a micro level to create new business models by directly compensating the developers who create its most useful applications. They can also be used at a macro level by coordinating the efforts of a broader set of ecosystem participants who participate in everything from education to governance.

3.1 NEAR ECONOMY DESIGN PRINCIPLES

NEAR’s overall system design principles are used to inform its economic design according to the following interpretations:
1. Usability: End users and developers should have predictable and consistent pricing for their usage of the network. Users should never lose data forever.
2. Scalability: The platform should scale at economically justified thresholds.
3. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose.
4. Sustainable Decentralization: The barrier for participation in the platform as a validating node should be set as low as possible in order to bring a wide range of participants. Over time, their participation should not drive wealth and control into the hands of a small number. Individual transactions made far in the future must be at least as secure as those made today in order to safeguard the value they modify.

3.2 ECONOMIC OVERVIEW

The NEAR economy is optimized to provide developers and end users with the easiest possible experience while still providing proper incentives for network security and ecosystem development.
Summary of the key ideas that drive the system:
  • Thresholded Proof of Stake: Validating node operators provide scarce and valuable compute resources to the network. In order to ensure that the computations they run are correct, they are required to “stake” NEAR tokens, which guarantee their results. If these results are found to be inaccurate, the staker loses their tokens. This is a fundamental mechanism for securing the network. The threshold for participating in the system is set algorithmically at the lowest level possible to allow for the broadest possible participation of validating nodes in a given “epoch” period (½ of a day).
  • Epoch Rewards: Node operators are paid for their service a fixed percentage of total supply as a “security” fee of roughly 4.5% annualized. This rate targets sufficient participation levels among stakers in order to secure the network while balancing with other usage of NEAR token in the ecosystem.
  • Protocol treasury: In addition to validators, protocol treasury received a 0.5% of total supply annually to continuously re-invest into ecosystem development.
  • Transaction Costs: Usage of the network consumes two separate kinds of resources — instantaneous and long term. Instantaneous costs are generated by every transaction because each transaction requires the usage of both the network itself and some of its computation resources. These are priced together as a mostly-predictable cost per transaction, which is paid in NEAR tokens.
  • Storage Costs: Storage is a long term cost because storing data represents an ongoing burden to the nodes of the network. Storage costs are covered by maintaining minimum balance of NEAR tokens on the account or contract. This provides indirect mechanism of payment via inflation to validators for maintaining contract and account state on their nodes.
  • Inflation: Inflation is determined as combination of payouts to validators and protocol treasury minus the collected transaction fees and few other NEAR burning mechanics (like name auction). Overall the maximum inflation is 5%, which can go down over time as network gets more usage and more transactions fees are burned. It’s possible that inflation becomes negative (total supply decreases) if there is enough fees burned.
  • Scaling Thresholds: In a network, which scales its capacity relative to the amount of usage it receives, the thresholds, which drive the network to bring on additional capacity are economic in nature.
  • Security Thresholds: Some thresholds, which provide for good behavior among participants are set using economic incentives. For example, “Fishermen” (described separately).
Full Report
submitted by CoinEx_Institution to Coinex [link] [comments]

What I currently use for privacy (after almost 2 years of long investing into it)

First of all, my threat model: I'm just an average person that wants to AVOID the maximum I can to be monitored and tracked by the government and big corps, a lot of people out there REALLY hate me and I've gone through lots of harassment and other stuff, I also plan to take my activism and love for freedom more seriously and to do stuff that could potentially lead me to very high danger or even put my life on the line. That being said, my main focus is on something that is privacy-friendly but also something with decent security (no point having a lot of privacy if a script kiddie can just break into it an boom, everything is gone) anonymity is also desirable but I'm pretty aware that true 100% anonymity is simply not possible and to achieve the maximum you can of it currently you'd have to give up A LOT of stuff in which I don't think I really could. So basically, everything that I said + I don't want to give up some hobbies of mine (as playing games etc)
Here's what I use/have done so far, most of it is based on privacytools.io list and research I've done.
Mobile:
Google Pixel 3a XL running GrapheneOS
Apps: Stock apps (Vanadium, Gallery, Clock, Contacts etc) + F-DROID, NewPipe, OsmAnd+, Joplin, Tutanota, K-9 Mail, Aegis Authenticator, KeePassDX, Syncthing, Signal, Librera PRO, Vinyl, Open Camera and Wireguard.
I also use BlahDNS as my private DNS.
Other smartphone stuff/habits: I use a Supershieldz Anti Spy Tempered Glass Screen Protector on my phone and I also have a Faraday Sleeve from Silent Pocket which my phone is on most of the times (I don't have smartphone addiction and would likely advice you to break free from smartphone addiction if you have it). I NEVER use bluetooth (thank god Pixel 3a have a headphone jack so yeah, no bluetooth earphones here) and always keep my Wi-Fi off if I'm not using it.
Computer:
I have a desktop that I built (specs: Asus B450M Gaming, AMD Ryzen 3 3300X, Radeon RX 580 8GB, 16GB DDR4 2666Mhz, 3TB HDD, 480GB SSD) that is dualbooted with QubesOS and Arch Linux.
Qubes is my main OS that I use as daily driver and for my tasks, I use Arch for gaming.
I've installed linux-hardened and its headers packages on my Arch + further kernel hardening using systctl and boot parameters, AppArmor as my MAC system and bubblewrap for sandboxing programs. I also spoof my MAC address and have restricted root access, I've also protected my GRUB with password (and use encrypted boot) and have enabled Microcode updates and have NTP and IPV6 disabled.
Also on Arch, I use iptables as a firewall denying all incoming traffic, and since it's my gaming PC, I don't game on the OS, instead, I use a KVM/QEMU Windows VM for gaming (search "How I Built The "Poor-Shamed" Computer" video to see what I'm talking about) I also use full disk encryption.
Software/Providers:
E-Mails: I use ProtonMail (Plus Account paid with bitcoin) and Tutanota (free account as they don't accept crypto payment yet, come on Tutanota, I've been waiting for it for 2 years already) since I have plus account on ProtonMail it allows me to use ProtonMail Bridge and use it on Claws Mail (desktop) and K-9 Mail (mobile) as for Tutanota I use both desktop and mobile app.
Some other e-mails habits of mine: I use e-mail aliases (ProtonMail plus account provides you with 5) and each alias is used for different tasks (as one for shopping, one for banking, one for accounts etc) and none of my e-mails have my real name on it or something that could be used to identify me. I also highly avoid using stuff that require e-mail/e-mail verification for usage (e-mail is such a pain in the ass tbh) I also make use of Spamgourmet for stuff like temporary e-mail (best service I found for this doing my research, dunno if it's really the best tho, heard that AnonAddy does kinda the same stuff but dunno, recommendations are welcomed)
Browsers/Search Engine: As mentioned, I use Vanadium (Graphene's stock browser) on mobile as it is the recommended browser by Graphene and the one with the best security for Android, for desktop I use a Hardened Firefox (pretty aware of Firefox's security not being that good, but it's the best browser for PC for me as Ungoogled Chromium is still not there in A LOT of things + inherent problems of Chrome as not being able to disable WebRTC unless you use an extension etc) with ghacks-user.js and uBlock Origin (hard mode), uMatrix (globally blocking first party scripts), HTTPS Everywhere (EASE Mode), Decentraleyes (set the recommended rules for both uBlock Origin and uMatrix) and Temporary Containers as addons. I also use Tor Browser (Safest Mode) on a Whonix VM on Qubes sometimes. DuckDuckGo is my to-go search engine and I use DNS over HTTPS on Firefox (BlahDNS as my provider once again)
browsing habits: I avoid JavaScript the maximum I can, if it's really needed, I just allow the scripts temporarely on uBlock Origin/uMatrix and after I'm done I just disable it. I also generally go with old.reddit.com instead of reddit.com (as JavaScript is not required to browse the old client), nitter.net for checking twitter stuff (although I rarely have something peaking my interest on Twitter) and I use invidious.snopyta.org as youtube front-end (I do however use YouTube sometimes if a video I wanna see can't be played on invidious or if I wanna watch a livestream) and html.duckduckgo.com instead of duckduckgo.com other than avoiding JavaScript most of my browsing habits are just common sense at this point I'd say, I also use privatebin (snopyta's instance) instead of pastebin. I also have multiple firefox profiles for different tasks (personal usage, shopping, banking etc)
VPN: I use Mullvad (guess you can mention it here since it's PTIO's recommended) paid with bitcoin and honestly best service available tbh. I use Mullvad's multihop implementation on Wireguard which I manually set myself as I had the time and patience to learn how.
password manager: KeePassXC on desktop and KeePassDX on my smartphone, my password database for my desktop is stored on a USB flash driver I encrypted with VeraCrypt.
some other software on desktop: LibreOffice (as a Microsoft Office substitute), GIMP (Photshop substitute), Vim (I use it for multiple purposes, mainly coding IDE and as a text editor), VLC (media player), Bisq (bitcoin exchange), Wasabi (bitcoin wallet), OBS (screen recording), Syncthing (file sync), qBitTorrent (torrent client) and Element (federated real-time communication software). I sadly couldn't find a good open-source substitute to Sony Vegas (tested many, but none was in the same level of Vegas imo, KDENLive is okay tho) so I just use it on a VM if I need it (Windows VM solely for the purpose of video editing, not the same one I use for gaming)
Other:
router: I have an Asus RT-AC68U with OpenWRT as its firmware. I also set a VPN on it.
cryptocurrency hardware wallet: I store all of my cryptocurrency (Bitcoin and Monero) on a Ledger Nano S, about 97% of my money is on crypto so a hardware wallet is a must for me.
I have lots of USB flash drivers that I use for Live ISOs and for encrypted backups. I also have a USB Data Blocker from PortaPow that I generally use if I need to charge my cellphone in public or in a hotel while on a trip (rare occasion tbh).
I have a Logitech C920e as webcam and a Blue Yeti microphone in which I never let them plugged, I only plug them if it's necessary and after I'm done I just unplug them.
I also have a Nintendo Switch Lite as a gaming console that I most of the times just use offline, I just connect to the internet if needed for a software update and then just turn the Wi-Fi off from it.
Other Habits/Things I've done:
payments: I simply AVOID using credit card, I try to always pay on cash (I live in a third-world country so thank god most of people here still depend on cash only) physically and online I try my best to either by using cryptocurrency or using gift cards/cash by mail if crypto isn't available. I usually buy crypto on Bisq as I just don't trust any KYC exchange (and neither should you) and since there aren't many people here in my area to do face to face bitcoin trade (and I'm skeptical of face to face tbh), I use the Wasabi Wallet (desktop) to coinjoin bitcoin before buying anything as this allows a bit more of privacy, I also coinjoin on Wasabi before sending my bitcoins to my hardware wallet. I also don't have a high consumerism drive so I'm not constantly wanting to buy everything that I see (which helps a lot on this criteria)
social media/accounts: as noted, aside from Signal and Element (which I don't even use that often) I just don't REALLY use any social media (tried Mastodon for a while but I was honestly felt it kinda desert there and most of its userbase from what I've seen were some people I'd just... rather don't hang with tbh) and, althoug not something necessary is something that I really advise people to as social media is literally a poison to your mind.
I also don't own any streaming service like Netflix/Amazon Prime/Spotify etc, I basically pirate series/movies/songs and that's it.
I've also deleted ALL my old accounts from social media (like Twitter etc) and old e-mails. ALL of my important and main accounts have 2FA enabled and are protected by a strong password (I use KeePass to generate a 35 character lenght password with numbers, capital letters, special symbols etc, each account uses a unique password) I also NEVER use my real name on any account and NEVER post any pictures of myself (I rarely take pictures of stuff if anything)
iot/smart devices: aside from my smartphone, I don't have any IOT/smart device as I honestly see no need for them (and most of them are WAY too expensive on third-world countries)
files: I constatly backup all of my files (each two weeks) on encrypted flash drivers, I also use BleachBit for temporary data cleaning and data/file shredding. I also use Syncthing as a substitute to stuff like Google Drive.
Future plans:
learn to self-host and self-host an e-mail/NextCloud (and maybe even a VPN)
find something like BurneHushed but FOSS (if you know any please let me know)
So, how is it? anything that I should do that I'm probably not doing?
submitted by StunningDistrust to privacytoolsIO [link] [comments]

I started my career in November and investing February 5th, 2020 - my strategy as a once peasant Mexican

My history investing in college and my first month investing in February:

Learned about miners and blockchain validation with a chemical engineering friend before the rally.

My Strategy now that I have income



My current market sentiment







CURRENT HOLDINGS (ordered by priority & checkup time):


GOOG & AMZN exposure through tech ETFs ::: priority FB
NVIDIA, AMD, Intel EXPOSURE through semiconductor ETFS ::: priority Texas Instruments
PAYPAL, MERCADO LIBRE, SQUARE exposure through fintech ETF ::: priority PayPal
Environmental Services exposure through Sanitation ETFS ::: priority Waste Management
Adobe and AutoDesk exposure through cloud software ETFs :: priority Adobe
Nintendo exposure through gaming ETFS :: priority Nintendo
Cisco exposure through cloud networking and edge computing ETFS Cicsco, Fastly, Cloudflare, etc
TELECOM networking ETFS :: priority TMobile
Manufacturing technology, industrial sectors, and robotics exposure to Fanuc, ABB, Siemens, Sherwin-Williams, VW, GM, Nissan, Toyota, Panasonic,
Healthcare services ETF :: priority Cigna
FB -- LONG
PAYPAL -- LONG
TEXAS INSTRUMENTS - LONG
MSFT -- LONG
APPLE -- LONG
ADOBE -- LONG
DISNEY - LONG
BITCOIN - LONG
TMOBILE - 2 YEARS
VISA -- 2 YEARS
JPM -- 2 YEARS
TWITTER -- 2 YEARS
SQUARE -- 1 YEAR
LYFT -- 1 YEAR
FASTLY -- QUARTERLY
CLOUDFLARE -- QUARTERLY
1LIFE MEDICAL -- QUARTERLY
FIVERR -- QUARTERLY
DRAFT KING -- QUARTERLY YEAR + CHICAGO POLITICS
GROUPON -- SPARE CHANGE JAR



EXCITED TO ACQUIRE

submitted by codingprofessor to investing [link] [comments]

A Beginner’s Guide to Understanding the aelf WhitePaper (Part 1)

A Beginner’s Guide to Understanding the aelf WhitePaper (Part 1)

https://preview.redd.it/j27ayhbw0rh51.png?width=512&format=png&auto=webp&s=f15bd6ff4ac50fa0eb0bbad23d59f55da6d98090
In the Bingo game DApp demo, we’ve already talked about the aelf real random number generator, which can generate unpredictable random numbers between 0 and 255, making it a useful tool. The interaction logic of this DApp’s backend is very much the same as that of blockchain smart contract. But this DApp is so simple that it doesn’t really show what aelf is capable of. In fact, aelf’s got an awful lot more in its arsenal. When it comes to supporting enterprise-level applications, this is where aelf comes in. For someone who is new to aelf, the best way to aquaint yourself with aelf’s technology is to read the aelf technical whitepaper.

https://preview.redd.it/yxbt4j9x0rh51.png?width=512&format=png&auto=webp&s=35c371142e08d37c38776dc151c5877f0aa9ca93
If you have read the whitepaper of some blockchain projects, you might find them difficult to understand or even make no sense. As a result, readers (not speculators) are often at a loss as to what these projects are trying to do. Unfortunately, many projects often assume their readers are all experts and can understand the whitepapers with no difficulty. In reality, most blockchain projects are much more complex than Bitcoin. Therefore, if readers only know how Bitcoin works, they still cannot understand these projects’ whitepapers. If you want to draw potential developers to your platform, it is necessary to provide a beginner’s guide to understanding your whitepaper.
That’s why we have prepared this guide. But before reading this guide, you can quickly go through our website, read our slogan, watch the promo video on the homepage, download the whitepaper and before long, you may find something you cannot understand. Don’t worry, let’s start with aelf’s slogan:
Aelf, a Decentralized Cloud Computing Blockchain Network
Cloud computing is the most fundamental feature driving the entire aelf blockchain ecosystem. Running data intensive computation on multiple computers is obviously more cost-effective than on one mainframe computer. Suppose these computers are assembled in a huge building called data center, say thousands of computers, with professional maintenance by a company, say, Amazon, then these data centers are called a cloud, such as Amazon Web Services (AWS).
Having said that, it is still hard for a beginner to understand why cloud computing gives aelf an indispensable edge. This is because most people, including some in the blockchain sector, don’t have a sound knowledge of some of blockchain’s key concepts. As a result, it is difficult for them to move on to the more complex technology, let alone analyze the pros and cons of a blockchain project and its potentials. As far as I know, I think it is necessary to set the record straight on two important blockchain concepts.

What is a blockchain?

This is nonsense! We all know blockchain is a tamper-proof distributed ledger or database technology, as any professional would explain to you. You most probably have memorized this definition by heart and would rattle it off whenever someone asks you what blockchain is. The truth is, this definition is very misleading. Blockchain is not a new invention, nor does it have any magical features (for example: the magical tamper-proof feature). In this sense, it is different from the magical stuff in an alchemist’s furnace. Instead of viewing blockchain as a ledger or database, it is better to see it as a distributed system. So what is a distributed system?
A distributed system is a large number of interconnected computers, which makes it a peer-to-peer system. It was invented around 1960, long before the advent of Internet. There are already a lot of well-known distributed-system-based softwares, such as Bit-torrent and Netflix. In these softwares, people can upload the files on their computers to the P2P network and anyone can download them. But a distributed system can do much more. In the distributed system discipline, people have to solve a big problem, that is, everyone (every node) in the P2P network need to make an unanimous decision no matter what information they receive, and this unanimous decision is what we call a consensus, and this problem is called the Byzantine General Problem.
Say there are three Byzantine generals wanting to attack the same fortress, and they are at three different locations, they could only rely on couriers to send messages. In this situation, any general can only make a decision based on the other two generals’ messages. If one general wants to attack, he let couriers send the “attack” message to the other two generals, so do the other two generals. If the generals are all loyal, each of them should receive “attack, attack” coming from other two generals, and all three generals would attack the fortress. But if one of them is a traitor, he could send one general “attack” and send the other “retreat”, this other general will receive “attack, retreat”, if he follows majority rule, he will not make a decision because the votes on attack and retreat are the same. At the same time, the other general will attack, and the result is that these three generals will not reach a consensus on attack.
The generals are just like the nodes of a distributed system (i.e. blockchain). There are at least two points worth noting: first, all massages (transactions), have to be sent to the other generals (nodes) to keep them informed; second, all the nodes have to reach a consensus.

https://preview.redd.it/nlgharoy0rh51.png?width=512&format=png&auto=webp&s=56c022e327526f13d1f3e13efe80de0483550715
The first point means that it takes time for sending a message to all the nodes in a huge network, the second means that after a new block has been broadcast to the entire network, there should be a mechanism for all the nodes to agree on this block (a package of messages or logs), and it also takes time.
submitted by Floris-Jan to aelfofficial [link] [comments]

CZ Binance - Amazon Will Have To Issue Crypto Sooner or Later - Prime Coin? Accept BTC, XRP, ETH? Introduction to Blockchain on AWS Amazon Web Services (AWS) - EC2 Cloud Computing einfach erklärt Dogecoin mining using AWS EC2 GPU instances g2.2xlarge

Antminer T17+ 64TH/S Bitcoin T17+ 64th 3250W Antminer Bitcoin Miner Mining Machine Better Than Antminer S17. 4.4 out of 5 stars 6. $1,559.00 $ 1,559. 00. FREE Shipping. Kingwin Bitcoin Miner Rig Case W/ 6, or 8 GPU Mining Stackable Frame - Expert Crypto Mining Rack W/Placement for Motherboard for Mining - Air Convection to Improve GPU Cryptocurrency (8 GPU) 4.3 out of 5 stars 30. $89.95 $ 89 ... SWAP BITCOIN No Result . View All Result ... Foundation, a not-for-profit organization based in Zurich, Switzerland overseeing the development of the DFINITY cloud computing network, today unveiled the Network Nervous System (NNS), an open algorithmic governance system that controls the Internet Computer and acts as its brain. This milestone, called the Sodium network, reveals the novel ... More than 200 of his articles on security, cloud computing and data centers have been published in print and syndicated worldwide. His expertise includes Bitcoin, crypto-currencies, Information Security, Cryptography, Cloud Computing, Data Centers, Linux, Open Source and robotics software development. He also has been CISSP certified for 12 years. As a bitcoin entrepreneur, Andreas has founded ... E-commerce giant Amazon has been awarded a bitcoin-related cloud computing patent that envisions the use of digital currencies as payment for cloud computing services on Amazon Web Services (AWS). According to the US Department of Justice, Ho consumed more than $5M in unpaid cloud computing services to mine cryptocurrency such as Bitcoin and Ethereum.

[index] [28302] [25966] [23254] [50449] [44000] [39221] [32027] [15730] [48323] [42043]

CZ Binance - Amazon Will Have To Issue Crypto Sooner or Later - Prime Coin? Accept BTC, XRP, ETH?

Cloud Computing Services Models ... Bitcoins Erklärung: In nur 12 Min. Bitcoin verstehen! - Duration: 11:58. Finanzfluss Recommended for you. 11:58. I Bought 12 Broken PS4's From eBay - Let's Try ... GPU Computing in AWS - 2013 Final Project - Duration: 19 ... Inside a Secret Chinese Bitcoin Mine - Duration: 9:17. Motherboard Recommended for you. 9:17. Deploy Toshi Bitcoin Node with Docker on ... Amazon Web Services 161,598 views. 3:12 ... De echte waarde van bitcoin en crypto-currency technologie - Duration: ... Stephen Fry explains cloud computing - Duration: 5:39. Databarracks 254,427 ... Amazon's history in crypto news includes: - Amazon Awarded Bitcoin-Related Cloud Computing Patent - Amazon Subsidiary Registers Cryptocurrency and Ethereum Domains Amazon Elastic Compute Cloud is a part of Amazon.com's cloud-computing platform, Amazon Web Services, that allows users to rent virtual computers on which to run their own computer applications.

#