Tag: Crypto
-
Bringing agile to quantum hardware
Posted on March 15, 2022, Level beginner Resource Length medium
We want to build the best, highest-performance quantum computers, all while making processors available to clients so that they can experiment with quantum and find potential benefits to their organizations. Achieving this goal requires a new way of thinking about hardware development methodology. By Markus Brink.
Tags cio ibm teams agile learning crypto
-
How to become a blockchain developer
Posted on March 14, 2022, Level beginner Resource Length medium
With an average salary of $154k per year and steady job growth, now is the ideal time to learn blockchain development. To create and improve blockchain technologies, blockchain developers exercise various skills, including computer networking, cryptography, algorithms, and data structures. By Prajix.
Tags cio app-development fintech blockchain how-to learning crypto
-
Securing IoT with Quantum Cryptography
Posted on January 25, 2022, Level intermediate Resource Length short
The Internet of Things (IoT) is a growing technology that continues to gain traction year after year. On the one hand, it can be helpful, but on the other hand, it carries many security threats. These threats include scalable remote attacks, side-channel attacks on cryptography, DDoS attacks, data breaches, malware, and others. By Roland Atoui.
Tags cloud cio infosec crypto iot
-
Experimenting with Chaos Engineering and Blockchain
Posted on August 4, 2021, Level intermediate Resource Length medium
In this article, we'll show how you can use the open-source Chaos Toolkit (CTK) to better understand Blockchain, stable-states, and what immutability really means. By Sal Kimmich.
Tags devops blockchain learning fintech crypto
-
Defenseless: UVA engineering computer scientists discover vulnerability affecting computers globally
Posted on May 7, 2021, Level beginner Resource Length medium
In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Since Spectre was discovered, the world's most talented computer scientists from industry and academia have worked on software patches and hardware defenses, confident they've been able to protect the most vulnerable points in the speculative execution process without slowing down computing speeds too much. By Audra Book @virginia.edu.
Tags infosec management cio miscellaneous software linux servers crypto
-
Worst nightmare cyberattack: The untold story of the SolarWinds hack
Posted on April 16, 2021, Level beginner Resource Length long
The routine software update may be one of the most familiar and least understood parts of our digital lives. By Dina Temple Raston.
Tags infosec cio management software crypto servers
-
Monetizing your blog with cryptocurrencies
Posted on March 20, 2021, Level beginner Resource Length medium
Current internet has been dominated by huge corporations, spying on users and selling their data to the advertisement companies. Amount of ads in internet is unbearable, pushing the quality content out in favour of mass produced click baits. By Damian Sosnowski.
Tags miscellaneous crypto blockchain fintech
-
Mapping the future of legal personality
Posted on November 22, 2020, Level beginner Resource Length long
This article evaluates how to adapt to disruption by examining the concept of legal personality as applied to DAOs, taking into account the unique features of DAOs, and reimagining how these and other Innovative Technology Arrangements might be regulated more effectively. By Max Ganado, Joshua Ellul, Gordon Pace, Steven Tendon, and Bryan Wilson.
Tags blockchain teams crypto miscellaneous how-to cloud cio
-
Generating UUIDs at scale on the Web
Posted on July 10, 2020, Level beginner Resource Length long
Can you trust every browser to generate globally unique identifiers at scale? At Teads, we have tried, and the answer is yes, with a few caveats. This article describes the experiments we've run and the discoveries we made along the way. By Matthieu Wipliez, senior software engineer @ Teads.
Tags web-development browsers cloud infosec crypto
-
The crypto price-innovation cycle
Posted on May 27, 2020, Level beginner Resource Length medium
People who've been in crypto for a long time view the space as evolving in cycles, alternating between periods of high activity and "crypto winters." There have been three cycles so far. The first peaked in 2011, the second in 2013, and the third in 2017. By Chris Dixon and Eddy Lazzarin on Andreessen Horowitz.
Tags crypto blockchain fintech software analytics
-
WEF will now read you your (blockchain) rights
Posted on May 24, 2020, Level beginner Resource Length short
The World Economic Forum finalized a "blockchain bill of rights." ConsenSys, Andreessen Horowitz, and Colombia have already signed on. By Jeff Benson.
Tags blockchain fintech crypto
-
How to setup a free Beam node with Google Cloud Computing
Posted on September 24, 2019, Level intermediate Resource Length long
Wilke Trei wrote a piece about running an own node of the Beam MW network. An always-online own node allows you to connect to your wallets on all your devices to this trusted node.
Tags google crypto blockchain fintech cloud