Grassroots Implementation of Grassroots Dissemination

:::info This paper is available on arxiv under CC BY-NC-ND 4.0 DEED license. Authors: (1) Ehud Shapiro, Department of Computer Science and Applied Math, Weizmann Institute of Science, Israel and ehud.shapiro@weizmann.ac.il. ::: Table of Links Abstract and Introduction Grassroots Protocols Grassroots Implementation of Grassroots Dissemination Applications of Grassroots Dissemination Supporting Digital Sovereignty Future Work & … Read more

Grassroots Distributed Systems: Preliminaries: Asynchronous Distributed Multiagent Transition System

:::info This paper is available on arxiv under CC BY-NC-ND 4.0 DEED license. Authors: (1) Ehud Shapiro, Department of Computer Science and Applied Math, Weizmann Institute of Science, Israel and ehud.shapiro@weizmann.ac.il. ::: Table of Links Abstract and Introduction Grassroots Protocols Grassroots Implementation of Grassroots Dissemination Applications of Grassroots Dissemination Supporting Digital Sovereignty Future Work & … Read more

Grassroots Distributed Systems for Digital Sovereignty: Abstract and Introduction

:::info This paper is available on arxiv under CC BY-NC-ND 4.0 DEED license. Authors: (1) Ehud Shapiro, Department of Computer Science and Applied Math, Weizmann Institute of Science, Israel and ehud.shapiro@weizmann.ac.il. ::: Table of Links Abstract and Introduction Grassroots Protocols Grassroots Implementation of Grassroots Dissemination Applications of Grassroots Dissemination Supporting Digital Sovereignty Future Work & … Read more

ZKBase Unveils Detailed Product Roadmap: Testnet Launch, Mainnet Integration and Beyond

Dear ZKBase Community, The ZKBase team is excited to announce the detailed product roadmap on May 9th, 2024. ZKBase is a decentralized, GPU-based, programmable ZKEVM chain. Our goal is to provide a stable and efficient decentralized platform to support a wide range of DApp development and smart contract operations. Product Planning Phase One: Testnet ZKBase … Read more

Criminal IP And Quad9 Collaborate To Exchange Domain And IP Threat Intelligence

TORRANCE, California, May 13th, 2024/CyberNewsWire/–Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking threats to end users.  Criminal IP underwent rigorous data evaluation to integrate … Read more

Neural Network for Valuing Bitcoin: Numerical Results, Implementation and Discussion

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for Valuing Bitcoin: Availability of Data, Code and Materials, Contributions

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for Valuing Bitcoin: Conclusion, Acknowledgments, and Funding

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for Valuing Bitcoin: Methodology

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for valuing Bitcoin: References

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for Valuing Bitcoin: Abstract and Introduction

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Neural Network for Valuing Bitcoin: Neural Network Methodology

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Edson Pindza, Tshwane University of Technology; Department of Mathematics and Statistics; 175 Nelson Mandela Drive OR Private Bag X680 and Pretoria 0001; South Africa [edsonpindza@gmail.com]; (2) Jules Clement Mba, University of Johannesburg; School of Economics, College of Business and Economics and P. … Read more

Propchain Exits First Property ‘Sixty7 Boulevard’, Initiating Massive Utility For Token Holders

Propchain, a leading Proptech player in the real estate sector, has announced the successful exit of its first property, Sixty7 Boulevard, listed on its Real Estate investment platform, Prop.com. Originally centered on the global real estate market, Propchain’s property investment platform has strategically shifted its focus to target the Dubai real estate market. This change … Read more

When It’s Time to Give REST a Rest

Through my years of building services, the RESTful API has been my primary go-to. However, even though REST has its merits, that doesn’t mean it’s the best approach for every use case. Over the years, I’ve learned that, occasionally, there might be better alternatives for certain scenarios. Sticking with REST just because I’m passionate about … Read more

The United States International Cyberspace & Digital Policy Strategy

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This is the table of links with all parts. ::: TABLE OF CONTENTS Preface Introduction The Digital World: Opportunities and Challenges Cyber Attacks and National Security Threats Competing Internet Norms Threats to Internet and Digital Freedom Challenges … Read more

Shaping the Future of Digital Infrastructure: Opportunities and Risks in the Global Economy

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here.This part is 7 of 38. ::: Challenges of the Digital Economy Some 2.6 billion people still do not have access to the Internet, leaving a third of the world unconnected. This situation presents an economic development challenge … Read more

The Battle for Internet Freedom: Surveillance, Censorship, and Online Manipulation

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This part is 6 of 38. ::: Threats to the Internet and Digital Freedom Authoritarian and illiberal states are seeking to restrict human rights online and offline through the misuse of the Internet and digital technologies. Governments … Read more

The Battle for Internet Governance: Authoritarian Agendas vs. Multistakeholder Norms

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This part is 5 of 38. ::: Competing Internet Norms Russia, the PRC, and other authoritarian states have promoted a vision of global Internet governance that centers on domestic control and top-down, state-centric mechanisms over the existing … Read more

The Growing Cyber Threat Landscape: Insights into State-Sponsored and Criminal Cyber Activities

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This part is 4 of 38. ::: Cyber Attacks and National Security Threats Adversarial cyber campaigns can cumulatively produce strategic loss for the United States and its allies, and they increasingly put the development goals of emerging … Read more

The Promises and Challenges of Global Digital Revolution

:::tip You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This part is 3 of 38. ::: The Digital World: Opportunities and Challenges Digital technologies have revolutionized how we live, work, and learn. They, along with expanded connectivity, not only power economic growth but also facilitate the … Read more

Dependency Inversion Principle in Go: What It Is and How to Use It

Intro In this article, we will discuss the Dependency Inversion principle. In short, we’ll talk about what it is and examine this principle using a simple Go application as an example. What is the Dependency Inversion Principle? The Dependency Inversion Principle (DIP) is one of the five SOLID principles of object-oriented programming (OOP), first introduced … Read more

Metamorphosis Commenced: Network States v0.01

When most people think of a pop-up city, they think of Burning Man. In fact, up until recently, “pop-up cities” referred to temporary or semi-permanent “semi-urban” developments that emerged in response to various social, economic, or environmental factors. A few examples: Disaster Relief and Refugee Camps: After natural disasters like earthquakes and hurricanes, or conflicts … Read more

The Digital Graveyards Phenomenon

Today, more than 5.07 billion people use social media globally. In the last year, more than 259 million new social media accounts were created, equating to more than 62.6 percent of the global population now using or accessing social media. Our dependence on these platforms as communication tools and connecting with others has meant that … Read more

Exploring Benefits of Using Alternative Search Engines

:::info Authors: (1) Yagci, Nurce, HAW Hamburg, Germany & nurce.yagci@haw-hamburg.de; (2) Sünkler, Sebastian, HAW Hamburg, Germany & sebastian.suenkler@haw-hamburg.de; (3) Häußler, Helena, HAW Hamburg, Germany & helena.haeuessler@haw-hamburg.de; (4) Lewandowski, Dirk, HAW Hamburg, Germany & dirk.lewandowski@haw-hamburg.de. ::: Table of Links Abstract and Introduction Literature Review Objectives and Research Questions Methods Results Discussion Conclusion, Research Data, Acknowledgments, and … Read more

Differences in Top Search Results Between Google and Alternative Search Engines

:::info Authors: (1) Yagci, Nurce, HAW Hamburg, Germany & nurce.yagci@haw-hamburg.de; (2) Sünkler, Sebastian, HAW Hamburg, Germany & sebastian.suenkler@haw-hamburg.de; (3) Häußler, Helena, HAW Hamburg, Germany & helena.haeuessler@haw-hamburg.de; (4) Lewandowski, Dirk, HAW Hamburg, Germany & dirk.lewandowski@haw-hamburg.de. ::: Table of Links Abstract and Introduction Literature Review Objectives and Research Questions Methods Results Discussion Conclusion, Research Data, Acknowledgments, and … Read more

Domain Classification: Analyzing Source Types in Search Engine Results

:::info Authors: (1) Yagci, Nurce, HAW Hamburg, Germany & nurce.yagci@haw-hamburg.de; (2) Sünkler, Sebastian, HAW Hamburg, Germany & sebastian.suenkler@haw-hamburg.de; (3) Häußler, Helena, HAW Hamburg, Germany & helena.haeuessler@haw-hamburg.de; (4) Lewandowski, Dirk, HAW Hamburg, Germany & dirk.lewandowski@haw-hamburg.de. ::: Table of Links Abstract and Introduction Literature Review Objectives and Research Questions Methods Results Discussion Conclusion, Research Data, Acknowledgments, and … Read more