Posts

Showing posts from September, 2018

THE HTC EXODUS BLOCKCHAIN PHONE COMES INTO FOCUS

BLOCKCHAIN PHONES ARE  coming, that much is certain. The Sirin Labs Finney and the HTC Exodus are both expected by the end of the year, each with its own, sometimes vaguely defined sense of what exactly that term means. HTC’s Phil Chen, who spearheaded Exodus development, has at least started to fill in the blanks of how the Exodus will pull off its most important trick: keeping your cryptocurrency safe. The Exodus has loftier ambitions than mere storage, of course. “A few years down the road, we see a world where people own their own identities and data, where everyone understands the concept and economics of digital property,” says Chen, HTC's decentralized chief officer. For the moment, though, the primary concern for the Exodus’s intended audience is how well it works as a hardware wallet. That had, until now, been a bit of a question mark. After all, a smartphone seems like an inopportune place to stash digital currency. Android phones, in particular, present inherent se

Dubai Govt Upgrades Payment Portal DubaiPay with Blockchain technology

The Smart Dubai office, a government initiative led by the Crown Prince of Dubai, is integrating blockchain technology into its retail payments smartphone app DubaiPay, enabling reconciliation and settlement transactions in real-time. Developed in collaboration with Dubai’s Department of Finance (DoF), the Smart Dubai Office (SDO) launched the system on Sunday with a press release labeling it a “blockchain-powered upgrade to its financial system’(Dubaipay)’. Current DoF procedures are dependant on staff members physically checking payments collected from different portals to manually reconcile the transactions before settling them. This extensive process includes a fee deduction before the remaining sum is transferred to the relevant overseeing authority, altogether taking up to 45 days. Speaking to  Gulf news , Mira Sultan Obaid Abdul Rahman, Smart Dubai Government’s director of smart services-enablement department said the notable pivot was to increase the government’s effici

Blockchain Training

Image
Livewire Ramnagar Introduces Blockchain Training

QUIZGINEER-2K18

Image

Oracle and Intel are developing a Java API to add first-class vector

Image
Oracle and Intel are developing a Java API to add first-class vector, or SIMD (single instruction, multiple data), support to the platform, which could yield big performance gains.   Part of Project Panama, which focuses on interconnecting JVM and native code, the API aims to provide an initial iteration of an incubator module,  jdk.incubator.vector , to express vector computations that compile at runtime to optimal hardware instructions on supported CPU architectures. Plans call for support of the Graal compiler. Goals of the project include: source:Oracle Providing a clear and concise API, capable of expressing a wide range of vector computations. Source:Google Reliable runtime compilation and performance on x64 architectures. Architecture agnosticism. Graceful degradation, in which if a vector computation cannot be fully expressed at runtime as a sequence, either because an x64 architecture does not support some of the instructions or another CPU architecture is no

Use of data analytics helping government detect GST evasion, says top tax official

Image
The principal chief commissioner of central taxes (Bangalore zone) AK Jyotishi has warned dealers against GST evasion, saying that the department now has the technology backbone to detect such instances of tax evasion. The government is using data analytics, and the defaulters are being detected, he said, speaking at Workshop on GST: Practical Requirements and Challenges organised by Bangalore Chamber of Industry and Commerce (BCIC) here on Friday. source:India Tv There is an impression that tax assessees can get away by not complying with GST law believing that the GST authorities are still using manual methods. “But let me flag you, after the initial handholding and a go-slow attitude, which was deliberate, we now have all the wherewithal to track tax defaulters and will act with a stern hand, if tax payers continue to default,” he said. In Bengaluru, the commercial taxes department, on Thursday, arrested two businessmen on charges of committing serious fraud under the GST

Job Secured Courses @ Livewire

Image

Ransom Warrior Victims can now retrieve files for free

Image
Researchers at Check Point have figured out the encryption method used by RansomWarrior. The Ransomware was developed in India. The ransomware has targeted Windows users, the payload is delivered as an executable under file name “A Big Present.exe”  if the application is executed it will encrypt files with a .THBEC  extension. The victims are given a link to the dark web website that takes payments in Bitcoin. The Ransomware offers the victims to decrypt two files for free, however if the victims don’t pay the ransom they will not get the rest of their files back. The ransomware cheekily has a sentence saying that the police can’t help you. How Did The Researchers Break the Encryption? source img:https://www.pcrisk.com Researchers at Check Point found the malware was developed by some inexperienced hackers, the company was able to retrieve decryption keys from the malware. Check Point succeeded due to the weak encryption used by the ransomware. The Ransomware used only

Workshop On Python

Image
Workshop On Python Python workshop has been conducted at our center on Saturday. Our Faculty Ramkumar gave a demo class about Python and the scope of python developers in industries. Also students got a chance to try the code and check for the outcome.

Hackers Target Smartphones to Mine Cryptocurrencies

Image
This new type of cybe rattack is called "cryptojacking" by security experts. It "consists of entrapping an internet server, a personal computer or a smartphone to install malware to mine cryptocurrencies," said Gerome Billois, an expert at the IT service management company Wavestone. Mining is basically the process of helping verify and process transactions in a given virtual currency. In exchange miners are now and then rewarded with some of the currency themselves. Legitimate mining operations link thousands of processors together to increase the computing power available to earn cryptocurrencies. Mining bitcoin, ethereum, monero and other cryptocurrencies may be very profitable, but it does require considerable investments and generates huge electricity bills. But hackers have found a cheaper option: surreptitiously exploiting the processors in smartphones. To lure victims, hackers turn to the digital world's equivalent of the Trojan horse subterfuge of Gr

Employers want JavaScript, but developers want Python

Image
When it comes to which programming languages are in demand by employers, JavaScript, Java, Python, C++, and C—in that order—came out on top in a recent developer survey. Developers, however, want to learn languages like  Python, Go, and Kotlin . A survey of developers by  technical recruiter  Hacker Rank , conducted in October, found no gap between languages employers want and what developers actually  know ,  with JavaScript  barely edging out  Java . But as far as which languages developers  prefer , Python is the language developers most want to learn—and many already know it, Hacker Rank found. Hacker Rank also queried about which languages developers were planning to learn next. The top languages developers said they will learn were—in order—Go, Python, Scala, Kotlin, and  Ruby . https://pixabay.com HackerRank noted that language preference varies by industry. Java, for example, has been favored in financial services for years, while C dominates in hardware developm