Page 1,060«..1020..1,0591,0601,0611,062..1,0701,080..»

A New Leader in GPU Mining: Can KAS Redefine the PoW Narrative? – CoinCodex

After Ethereum shifted away from PoW through the Merge, for a while, GPU mining had become leaderless. While coins forked from Ethereum can still be mined with GPUs, most miners are skeptical about their future prospects. Following the Merge, the ETC hashrate only grew by 100 TH/s, while Ethereum boasted a network hashrate of 850 TH/s prior to the Merge. A significant portion of the GPU hashing power was lost.

Clearly, ETCs current narrative alone cannot sustain the whole GPU mining sector. Shortly after the Merge, Kaspa (KAS), an emerging player, surpassed ETC in terms of hashrate. In October 2022, the KAS hashrate reached nearly 300 TH/s, and the figure has continued to rise, consistently ranking No.1 among all GPU mineable cryptos. Right now, KAS maintains a stable hashrate of 1 PH/s, surpassing the pre-merge hashrate of Ethereum.

Hashrate often reflects miners expectations for a PoW coin and, to some extent, represents the level of community activity. The rapid growth of the KAS hashrate indicates extensive recognition of its future potential in the miner community, which can be attributed to the top-notch developer team and strong technical capacity of KAS.

Kaspa founder Yonatan Sompolinsky is a prominent figure in the blockchain industry, with notable achievements in academia. In 2013, Yonatan introduced the GHOST protocol, which was later adopted by Ethereum. As Yonatan continued to update GHOST, the protocol evolved into PHANTOM and GHOSTDAG, the latter of which is employed by Kaspa. The GHOSTDAG protocol allows Kaspa to offer both high TPS and robust security performance, making it the fastest and most scalable Layer 1 chain using the PoW consensus. With a block time of only 1 second, Kaspa outperforms all other public chains in the category.

Kaspas roadmap is a major reason why miners and communities are confident in the chains potential. In October 2022, Yonatan published a new paper introducing DAGKNIGHT, an improved version of the existing GHOSTDAG protocol. As part of the roadmap, Kaspa will first go through the RUST rewrite, launch the DAGKNIGHT upgrade, and then develop smart contracts. So far, the RUST rewrite has been completed as scheduled, and if everything goes according to the plan, the PoW space may witness the birth of a trending blockchain offering high TPS and scalability, which will allow miners to earn huge returns from their early investments.

Furthermore, since KAS was fair-launched with no pre-mine, zero pre-sales, and no coin allocations, many believe that the coin is more decentralized. In particular, fair mining means that project teams or institutional investors cannot manipulate the market by building a massive holding of low-cost coins. Instead, each KAS is mined by miners who bear the costs of electricity and mining machines.

At the moment, KAS mining is quite accessible, and most devices used for KAS mining are GPUs and ASIC miners.

Check out the KAS mining tutorial athttps://support.viabtc.com/hc/articles/19013252615065.

According to ViaBTCs Mining Profit Rankings, with an electricity price of $0.03/kWh, a common RTX 3080 8-GPU machine would yield an estimated daily profit of around $0.48; the specialized Antminer KS3, on the other hand, could generate an estimated daily profit of $2,593.18.

Source: ViaBTCs official website

According to miningpoolstats, among the top mining pools, only ViaBTC offers a zero-fee KAS pool (excluding solo pools), which helps miners make huge savings. Also, at the moment, ViaBTC is celebrating its seventh anniversary, and users can invite friends to mine KAS to potentially win the $7,777 grand prize.

Source: ViaBTCs official website

Kaspa caters to both long-term investors betting on the coins potential and miners seeking steady returns. As the No.1 GPU minable crypto, KAS will demonstrate a more apparent Matthew effect, as its ecosystem expands. Moving forward, the PoW category will no longer be criticized for its limited utility in mining, and the combination of enhanced security, high TPS, and mature smart contracts may become the new narrative of PoW.

Read more here:

A New Leader in GPU Mining: Can KAS Redefine the PoW Narrative? - CoinCodex

Read More..

LUCA: Native cryptocurrency of ATM – Crypto Mode

LUCA is a native cryptocurrency issued by the Autonomous Trust Momentum (ATM). It serves as a token that rewards users who establish Consensus Connections within the ATM meta-community. LUCA has a currency coefficient of 5 and aims to motivate users to build stable connections, contributing to the growth and development of the blockchain community. The value of the reward is determined by the parameters of the connection, allowing users to earn additional revenue while maintaining the original currency value. This mining of value from consensus connections is made possible through the implementation of PageRank, which gathers and connects ATMs relative consensus. LUCA aims to become one of the major currencies circulating within the ATM community and the broader economy. It emphasizes the concept of relative consensus, recognizing the strength in numbers, trust, and momentum.

LUCA Token Overview

Coinstore.com Listing

What are the utilities of tokens? The LUCA token has several utilities within the Autonomous Trust Momentum (ATM) ecosystem. Some of its key utilities include:

These are some of the utilities of the LUCA token within the ATM ecosystem. The token plays a vital role in incentivizing participation, promoting consensus connections, and facilitating the growth and development of the community.

Which infrastructure does the project ecosystem include? The project ecosystem of the Autonomous Trust Momentum (ATM) includes several key components:

These components work together to create a dynamic and interconnected ecosystem where users can earn rewards, contribute to consensus-building, and participate in the growth and development of the ATM community.

How to create consensus connections?

User A connects his/her wallet with ATM platform and sets up a consensus contract which initiates a request to establish a connection to user B. If B agrees, the contract will be executed, and the consensus connection will be successful. Both users need to confirm Locked Token, Investment Amount, and Lock-up Time. During this lock-up period the contract cannot be cancelled by User A or User B independently, but instead must be cancelled jointly. ATM believes that the network that will emerge from the technologies deployed by ATM will be the core of a new generation of decentralised economy.

Autonomous Trust Momentum ATM

ATM provides a smart contract known as a Consensus Connection, which allows users to connect with each other on the multiple public blockchains that support smart contracts. Through consensus connection, users can receive rewards according to their PR value. LUCA held on each public chain will be sent to a public deposit smart contract where users can withdraw at any time. Consensus Contracts are the underlying technical features of ATM. With the creation of the Consensus Contract the decision is removed from individuals and moved to the connections between them; Isolated Consensus becomes Related Consensus. As more and more consensus contracts are created, a relative consensus network will emerge- creating a more prosperous and sustainable place.

LUCA Official Media

For more information about LUCA, please visit:

About Coinstore.com

Accessibility. Security. Equity.

As a leading global platform for cryptocurrency and blockchain technology, Coinstore.com seeks to build an ecosystem that grants everyone access to digital assets and blockchain technology. With over 2.8 million users worldwide, Coinstore.com aims to become the preferred cryptocurrency trading platform and digital service provider worldwide.

Coinstore Media Contact

Yvonne Teo, Marketing Manager | yvonne@coinstore.com

Jennifer Lu, Co-Founder | Jennifer.lu@coinstore.com

Twitter | Discord | Facebook | Instagram | Youtube |Telegram Discussion | Telegram Announcement

None of the information on this website is investment or financial advice and does not necessarily reflect the views of CryptoMode or the author. CryptoMode is not responsible for any financial losses sustained by acting on information provided on this website by its authors or clients. Always conduct your research before making financial commitments, especially with third-party reviews, presales, and other opportunities.

View original post here:

LUCA: Native cryptocurrency of ATM - Crypto Mode

Read More..

How to Explore the Capabilities of Hyperledger Fabric and Sawtooth … – Cryptopolitan

Description

The world of blockchain technology is rapidly evolving, with various platforms and frameworks emerging to meet the diverse needs of organizations. In this deep dive into the Hyperledger Fabric and Sawtooth blockchains, we will explore the fundamental concepts, architectures, and features of these two prominent blockchain platforms. From Hyperledgers inception as a global enterprise blockchain Read more

The world of blockchain technology is rapidly evolving, with various platforms and frameworks emerging to meet the diverse needs of organizations. In this deep dive into the Hyperledger Fabric and Sawtooth blockchains, we will explore the fundamental concepts, architectures, and features of these two prominent blockchain platforms. From Hyperledgers inception as a global enterprise blockchain platform to the modular design and secure smart contract capabilities of Hyperledger Sawtooth, this Cryptopolitan guide provides valuable insights into the world of blockchain technology.

Hyperledger, a global enterprise blockchain platform, was established by The Linux Organization in December 2015. Initially comprising 30 participants, it has grown to encompass over 120 members. Hyperledger aims to create and maintain open-source blockchain networks and platforms for various organizations, providing the necessary infrastructure and protocols for the development of blockchain tools and networks. The collaboration fosters commercial blockchain initiatives by offering a set of principles, rules, and methods through the Hyperledger Greenhouse, which includes frameworks and tools supporting blockchain technology.

With a diverse range of leading organizations in finance, banking, IoT, supply chain management, manufacturing and production, and technology, Hyperledger boasts a notable membership base. Companies such as Bosch, Daimler, IBM, Samsung, Microsoft, Hitachi, American Express, JP Morgan, and Visa are actively involved in shaping the future of blockchain technology. Additionally, several blockchain-based companies like Blockforce and ConsenSys contribute to the Hyperledger project.

Within the Hyperledger ecosystem, various sub-projects operate to enhance the efficiency and quality of systems and services across a network of computers. These sub-projects include Hyperledger Fabric, Hyperledger Indy, Hyperledger Caliper, Hyperledger Burrow, Sawtooth, Composer, and Cello. Understanding the nuances and differences between these projects can be challenging, particularly for newcomers to the cryptocurrency space.

Hyperledger Fabric, an open-source initiative by the Hyperledger corporation, serves as a robust foundation for building modular applications and driving innovation in the realm of blockchain technology. Positioned as a blockchain platform, it empowers private enterprises to construct blockchain-based products and applications by leveraging plug-and-play components. Within the Hyperledger platform, ledgers, standards, protocols, and smart contracts work in harmony to enable efficient and secure blockchain solutions.

One of the key advantages of Hyperledger Fabric lies in its ability to facilitate data segregation and expedite transactions. As a private platform, it operates on the principle of access rights, ensuring that only authorized users can connect to the network. By restricting access to internal staff, businesses can fortify their infrastructure against unauthorized entities and establish an exclusive network system.

Hyperledger Fabric was specifically designed to overcome common limitations associated with traditional blockchain solutions, such as private exchanges and confidential contracts. It offers a flexible and secure platform for delivering industrial-grade blockchain services. The framework incorporates robust rules for storing information about network users and their access privileges, ensuring granular control over data points. In addition, Hyperledger Fabric supports permissioned membership, making it an ideal choice for sectors like finance, healthcare, and more, where privacy and regulatory compliance are critical considerations.

The consensus layer ensures agreement on transaction order and validates the accuracy of the transaction database within a block. It communicates with clients and network peers through the communication layer. By adhering to approval and consensus policies, it confirms the correctness of transactions in a proposed block. It also collaborates with the smart contract layer to validate the accuracy of the ordered transaction database, contributing to data synchronization and transaction consistency across the network.

The smart contract layer validates transaction validity based on policies and contracts, ensuring only valid transactions are included in blocks. It comprises two types: installed smart contracts for pre-launch business logic and on-chain smart contracts for business rules implemented through committed transactions. In Hyperledger Fabric, smart contracts, called chaincode, are developed using languages like Go, JavaScript (Node.js), and potentially Java. Chaincode runs securely in a separate Docker container from the endorsing peer process.

The communication layer enables peer-to-peer message transfer among nodes in a shared ledger. It facilitates communication between the consensus layer, clients, and network peers. Transactions are executed atomically and sequentially, treating the system as a single node. Successful communication ensures all non-faulty nodes receive submitted transactions. Transport Layer Security (TLS) ensures secure communication in Hyperledger Fabric, supporting one-way and two-way authentication.

The data store abstraction allows modules to use different data stores. In Hyperledger Fabric, private data is stored in a dedicated database on authorized peer nodes, accessed through chaincode. A hash of the secret data is recorded in the ledgers of all channel peers. Hyperledger Fabric supports LevelDB and CouchDB as state databases. LevelDB stores chaincode data as key-value pairs, integrated into peer activity. CouchDB, an optional external database, enables rich JSON queries when chaincode data is represented in JSON format. Successful deployment installs the chaincode on the blockchain.

The crypto abstraction allows the use of different cryptographic techniques or modules without affecting other components. Hyperledger Fabric version 2.0 introduces Fabtoken, enabling the creation of native cryptocurrencies. Hyperledger Besu, based on Ethereum, is an open-source public Ethereum implementation compatible with permissionless platforms and the Ethereum network. Hyperledger Besu supports CPU and GPU mining, with Ethminer used for GPU mining testing. Its important to note that Hyperledger Fabric doesnt support cryptocurrencies like Bitcoin, but focuses on providing infrastructure and standards for industrial blockchain-based applications and systems.

The identity service establishes a trusted root, manages enrollment and registration of identities, and facilitates changes in a blockchain instance. It handles authentication, permission, and is utilized by the smart contract layer to authenticate and authorize entities during transaction processing. Hyperledger Fabric provides a personal identity service for managing user IDs and authenticating network participants, enabling permissioned networks. Access control lists add layers of permission by authorizing specific network actions. Certification Authorities (CAs), like Hyperledger Fabric CA, manage certificates.

The policy service manages system policies such as endorsements, consensus, and group management. It collaborates with other modules to enforce these policies effectively. In Hyperledger Fabric, policies govern the approval or rejection process for network changes, routes, and smart contracts. They are established during the initial channel setup and can be modified as the channel evolves. Policies distinguish Hyperledger Fabric by ensuring transactions are generated and confirmed by approved network nodes.

The API module enables client and application interaction with blockchains. It consists of three types of APIs in Hyperledger. The admin API manages operations like runtime installation, refreshment, and pinging. The common API accesses information about the connected Business Network and facilitates asset, participant, transaction, and event creation. The runtime API allows transaction functions to query, emit events, retrieve registries, access participant information, and serialize JavaScript objects. It also supports HTTP REST calls.

Interoperation enables communication and interaction between separate blockchain instances. It relies on comprehensive data and transaction standards to unlock the full potential of blockchain technology. Industries like food safety have leveraged data standards for enhanced product visibility. However, achieving interoperability and integration remains a significant challenge in the blockchain sector, necessitating ongoing efforts to establish seamless communication and collaboration among diverse blockchain networks.

Hyperledger Fabric offers a range of core features, including:

Hyperledger Sawtooth is an enterprise blockchain platform that facilitates the creation and operation of distributed ledger networks and applications. It prioritizes secure smart contracts for enterprise use cases and follows a blockchain-as-a-service (BaaS) model.

Hyperledger Sawtooth distinguishes itself through its modular design, allowing organizations and consortia to establish policies tailored to their specific domains. Applications can select transactional, permissioning, and consensus algorithms that align with their unique business requirements, enhancing flexibility compared to traditional blockchain systems where core and app functionalities reside on the same platform, potentially impacting security and performance.

As an open-source enterprise blockchain-as-a-service platform, Hyperledger Sawtooth enables the execution of customized smart contracts without the need for in-depth knowledge of the underlying core system design. It supports various consensus algorithms, including PBFT and PoET, and offers a user-friendly design optimized for enterprise usage. Additionally, Sawtooth ensures separate permissioning, ensuring confidentiality by eliminating centralized services that could expose sensitive information.

Functioning as a modular platform, Hyperledger Sawtooth empowers the development, deployment, and operation of distributed ledgers. It incorporates the innovative Proof of Elapsed Time (PoET) consensus algorithm, utilizing trusted execution environments (TEEs) for fair and efficient consensus. With its pluggable consensus algorithms and support for both permissioned and permissionless networks, Sawtooth provides a distributed ledger that logs transactions and smart contract execution across network nodes. Transactions are processed in parallel to enhance performance.

To streamline smart contract deployment and execution, Sawtooth offers the Sawtooth Lake smart contract engine. The platform provides a RESTful API for seamless interaction with the ledger and submission of transactions. Hyperledger Sawtooth boasts scalability, capable of supporting networks with thousands of nodes and processing millions of transactions per second.

Hyperledger Sawtooth is a flexible and powerful platform for building and deploying distributed ledgers. It caters to diverse applications such as supply chain management, digital asset tracking, and voting systems. By separating the core ledger system from application-specific environments, Sawtooth simplifies app development while maintaining system security. This approach allows developers to define business rules specific to their applications, enabling easy hosting, management, and usage in their preferred programming language, even outside the core blockchain network.

Lets take a detailed look at the architectural components and functions of Hyperledger Sawtooth:

Hyperledger Sawtooth Architecture Diagram (source sawtooth.hyperledger.org/docs/1.2/architecture/)

Hyperledger Sawtooth follows an asynchronous client/server pattern. Clients send requests to the server, and the server responds with zero or more replies. Clients can send multiple requests without waiting for replies, and servers can send multiple replies without waiting for new requests.

Hyperledger Sawtooth provides a pragmatic RESTish API that allows clients to interact with a validator using common JSON/HTTP standards. The REST API serves as a separate process for transaction submission and block reading with a language-neutral interface. It is extensively documented using the OpenAPI specification, ensuring clarity and accessibility for both machines and humans. The REST API supports common HTTP status codes for quality improvement, such as 404 for Not Found and 503 for Service Unavailable. It utilizes a JSON envelope to send metadata back to clients and provides error handling with code, title, and message properties. Query parameters are supported to specify request formation, and endpoints offer references to resources in the Sawtooth ledger, including blocks, transactions, and metadata.

Transaction processors validate and handle business logic for transactions, deciding whether to include them in the state. They apply transaction changes and add them to the next block. Validator nodes ensure the validity of transaction signatures. Additional logic can be added to transaction processors to meet specific requirements. Transaction handlers, added to process transactions, include apply and helper functions. The processor class, provided by the Software Development Kit (SDK), offers general-purpose functionality, while the handler class contains application-specific business logic. The transaction processor class connects with the validator and the handler class.

The consensus API has been redesigned and moved to a separate process called the consensus engine. It provides an interface for language-independent consensus algorithms, expanding the consensus options for Sawtooth. The consensus engine operates as a separate process alongside the REST API and transaction processors. It includes three processors: BlockPublisher for creating candidate blocks, BlockVerifier for verifying consensus rule compliance, and ForkResolver for selecting the next block to be the chain head.

In Hyperledger Sawtooth, authorized nodes validate blocks and batches similarly. Block validation includes checking on-chain transaction permissions and applying on-chain block validation rules. Batches are sent to the transaction scheduler. The network layer facilitates communication between validators, REST API, transaction processors, and clients. It handles peer discovery, transaction handling, block management, and supports consensus engines. Sawtooth supports both serial and parallel scheduling of transactions and efficiently handles transactions modifying the same state addresses. The validator process consists of the chain controller, responsible for maintaining the current chains last block and determining chain head updates, and the block manager and publisher, responsible for creating new candidate blocks and adding valid transactions to them.

Here are some of the unique features of Hyperledger Sawtooth:

As the adoption of blockchain technology continues to grow, platforms like Hyperledger Fabric and Hyperledger Sawtooth play a crucial role in enabling organizations to build secure and scalable blockchain-based solutions. Hyperledgers collaborative approach and extensive membership base contribute to the development and standardization of blockchain tools and networks. With their modular architectures, robust consensus mechanisms, and support for smart contracts, Hyperledger Fabric and Hyperledger Sawtooth provide a solid foundation for organizations looking to leverage the benefits of blockchain technology. As the blockchain landscape evolves, Hyperledger remains at the forefront, driving innovation and transforming industries across the globe.

Hyperledger is a global enterprise blockchain platform that provides infrastructure and protocols for the development of blockchain tools and networks, aiming to create and maintain open-source blockchain networks for organizations.

Hyperledger Fabric is a modular platform for private enterprises, offering flexible smart contract implementation and data privacy. Hyperledger Sawtooth is a modular enterprise platform that separates the application layer from the core system, emphasizing secure smart contracts.

Hyperledger Fabric supports permissioned membership, enforcing access rights and providing granular control over data points, making it suitable for industries like finance and healthcare.

The Rest API in Hyperledger Sawtooth serves as a separate process for clients to interact with a validator, enabling transaction submission and block reading with a user-friendly interface.

The consensus engine in Hyperledger Sawtooth operates independently and supports language-independent consensus algorithms. It includes processors like BlockPublisher, BlockVerifier, and ForkResolver, enabling a flexible and customizable consensus mechanism.

Read this article:

How to Explore the Capabilities of Hyperledger Fabric and Sawtooth ... - Cryptopolitan

Read More..

Understanding the Technology Behind Decentralized Exchanges – CityLife

Exploring the Mechanics of Decentralized Exchanges: A Comprehensive Guide

Decentralized exchanges (DEXs) have been gaining traction in the cryptocurrency world, as they offer a more secure and transparent way for users to trade digital assets. Unlike centralized exchanges, which are managed by a single entity, decentralized exchanges operate without a central authority, allowing users to trade directly with one another. This eliminates the need for intermediaries, such as banks or other financial institutions, which can be prone to hacks and other security breaches. In this comprehensive guide, we will explore the mechanics of decentralized exchanges and delve into the technology that powers them.

One of the key features of decentralized exchanges is the use of smart contracts, which are self-executing contracts with the terms of the agreement directly written into code. Smart contracts are stored on a blockchain, a decentralized digital ledger that records transactions across a network of computers. When a user initiates a trade on a decentralized exchange, a smart contract is created to facilitate the transaction. This ensures that the trade is executed automatically and securely, without the need for a third party to oversee the process.

Another important aspect of decentralized exchanges is the use of atomic swaps, which allow users to exchange different cryptocurrencies directly, without having to go through an intermediary. Atomic swaps utilize a technology called hash time-locked contracts (HTLCs), which ensure that both parties in a trade fulfill their obligations before the transaction is completed. In an atomic swap, each party submits their respective cryptocurrency to an HTLC, which holds the funds in escrow until both parties have met the agreed-upon conditions. Once the conditions are met, the funds are released and the swap is completed. This process ensures that users can trade cryptocurrencies securely and trustlessly, without having to rely on a centralized exchange.

Decentralized exchanges also employ various consensus mechanisms to maintain the integrity of the blockchain and ensure that transactions are secure and accurate. One such mechanism is proof-of-stake (PoS), which requires users to hold a certain amount of a cryptocurrency in their wallet in order to validate transactions. This differs from the more commonly known proof-of-work (PoW) mechanism, which requires users to solve complex mathematical problems in order to validate transactions and earn rewards. PoS is considered to be more energy-efficient and secure than PoW, as it reduces the risk of a single entity gaining control of the network.

Liquidity is another crucial factor in the success of decentralized exchanges. In order to facilitate trades, DEXs need to have a sufficient amount of assets available for users to buy and sell. To address this issue, many decentralized exchanges employ liquidity pools, which are pools of tokens that are locked into smart contracts. Users can contribute to these pools by providing their own tokens, and in return, they receive a portion of the trading fees generated by the exchange. This incentivizes users to contribute to the liquidity of the platform, ensuring that there are always enough assets available for trading.

In conclusion, decentralized exchanges offer a more secure and transparent alternative to traditional centralized exchanges, thanks to their use of blockchain technology, smart contracts, and consensus mechanisms. By eliminating the need for intermediaries and allowing users to trade directly with one another, DEXs have the potential to revolutionize the way we trade and exchange digital assets. As the technology continues to evolve and mature, it is likely that we will see an increasing number of users turning to decentralized exchanges for their trading needs.

More here:

Understanding the Technology Behind Decentralized Exchanges - CityLife

Read More..

The Role of Blockchain in Smart Grid Technology – CityLife

Exploring the Potential of Blockchain in Revolutionizing Smart Grid Technology

The role of blockchain in smart grid technology has been a topic of discussion among industry experts, as the potential for revolutionizing the way we manage and distribute energy becomes increasingly apparent. Blockchain, the decentralized digital ledger system that underpins cryptocurrencies like Bitcoin, has applications far beyond the world of finance. Its secure, transparent, and tamper-proof nature makes it an ideal solution for addressing the challenges faced by the energy sector, particularly in the context of smart grids.

Smart grids are an innovative approach to energy management that leverages digital technology to optimize the generation, distribution, and consumption of electricity. They enable a more efficient and flexible use of energy resources, integrating renewable energy sources and facilitating the transition to a low-carbon economy. However, smart grids also face significant challenges, such as the need for secure and reliable communication between various devices and systems, as well as the management of vast amounts of data generated by these interconnected networks.

This is where blockchain technology comes into play. By providing a secure and transparent platform for the exchange of information and value, blockchain can help address some of the key challenges faced by smart grids. For instance, it can enable secure peer-to-peer energy trading between consumers, allowing them to buy and sell excess energy directly with one another without the need for intermediaries. This not only reduces the cost of energy transactions but also encourages the adoption of renewable energy sources, as consumers can be rewarded for generating their own clean energy.

Moreover, blockchain can help improve the overall efficiency and resilience of smart grids by providing a decentralized and tamper-proof record of energy generation, consumption, and transactions. This can facilitate accurate and real-time monitoring of energy flows, enabling grid operators to optimize the use of resources and respond more effectively to changes in demand or supply. In addition, the use of smart contracts self-executing agreements encoded on the blockchain can automate various processes within the grid, such as billing and settlement, further enhancing efficiency and reducing the potential for errors or disputes.

Another key advantage of using blockchain in smart grid technology is its potential to enhance cybersecurity. The energy sector has become an increasingly attractive target for cyberattacks, with potentially devastating consequences for the stability and reliability of the grid. Blockchains decentralized and encrypted nature makes it inherently more secure than traditional centralized systems, as there is no single point of failure that can be exploited by hackers. Furthermore, the use of blockchain can help ensure the integrity and authenticity of data exchanged within the grid, making it more difficult for malicious actors to manipulate or tamper with this information.

While the potential benefits of blockchain in smart grid technology are clear, there are also challenges to be overcome before this vision can become a reality. For instance, the scalability of blockchain systems remains a concern, as the energy sector generates vast amounts of data that need to be processed and stored. Additionally, there are regulatory and legal hurdles to be addressed, as well as the need for greater collaboration and standardization among industry stakeholders.

Nevertheless, the potential of blockchain to revolutionize smart grid technology is undeniable. As pilot projects and research initiatives continue to explore the various applications of this innovative technology, it is becoming increasingly clear that blockchain has the potential to transform the way we manage and distribute energy, paving the way for a more efficient, secure, and sustainable energy future.

See the article here:

The Role of Blockchain in Smart Grid Technology - CityLife

Read More..

Illusions are in the eye, not the mind – Science Daily

Numerous visual illusions are caused by limits in the way our eyes and visual neurones work -- rather than more complex psychological processes, new research shows.

Researchers examined illusions in which an object's surroundings affect the way we see its colour or pattern.

Scientists and philosophers have long debated whether these illusions are caused by neural processing in the eye and low-level visual centres in the brain, or involve higher-level mental processes such as context and prior knowledge.

In the new study Dr Jolyon Troscianko, from the University of Exeter, co-developed a model that suggests simple limits to neural responses -- not deeper psychological processes -- explain these illusions.

"Our eyes send messages to the brain by making neurones fire faster or slower," said Dr Troscianko, from the Centre for Ecology and Conservation on Exeter's Penryn Campus in Cornwall.

"However, there's a limit to how quickly they can fire, and previous research hasn't considered how the limit might affect the ways we see colour."

The model combines this "limited bandwidth" with information on how humans perceive patterns at different scales, together with an assumption that our vision performs best when we are looking at natural scenes.

The model was developed by researchers from the Universities of Exeter and Sussex to predict how animals see colour, but it was also found to correctly predict many visual illusions seen by humans.

"This throws into the air a lot of long-held assumptions about how visual illusions work," Dr Troscianko said.

He said the findings also shed light on the popularity of high-definition televisions.

"Modern high dynamic range televisions create bright white regions that are over 10,000 times brighter than their darkest black, approaching the contrast levels of natural scenes," Dr Troscianko added.

"How our eyes and brains can handle this contrast is a puzzle because tests show that the highest contrasts we humans can see at a single spatial scale is around 200:1.

"Even more confusingly, the neurones connecting our eyes to our brains can only handle contrasts of about 10:1.

"Our model shows how neurones with such limited contrast bandwidth can combine their signals to allow us to see these enormous contrasts, but the information is 'compressed' -- resulting in visual illusions.

"The model shows how our neurones are precisely evolved to use of every bit of capacity.

"For example, some neurones are sensitive to very tiny differences in grey levels at medium-sized scales, but are easily overwhelmed by high contrasts.

"Meanwhile, neurones coding for contrasts at larger or smaller scales are much less sensitive, but can work over a much wider range of contrasts, giving deep black-and-white differences.

"Ultimately this shows how a system with a severely limited neural bandwidth and sensitivity can perceive contrasts larger than 10,000:1."

The paper, published in the journal PLOS Computational Biology, is entitled: "A model of colour appearance based on efficient coding of natural images."

Read more:
Illusions are in the eye, not the mind - Science Daily

Read More..

Good News! China and the US Are Talking About AI Dangers – WIRED

Sam Altman, the CEO ofOpenAI, recently said that Chinashould play a key role in shaping the guardrails that are placed around the technology.

China has some of the best AI talent in the world, Altmansaid during a talk at theBeijing Academy of Artificial Intelligence (BAAI) last week. Solving alignment for advanced AI systems requires some of the best minds from around the worldand so I really hope that Chinese AI researchers will make great contributions here.

Altman is in a good position to opine on these issues. His company is behindChatGPT, the chatbot thats shown the world how rapidly AI capabilities are progressing. Such advances have led scientists and technologists to call for limits on the technology. In March, many expertssigned an open letter calling for a six-month pause on the development of AI algorithms more powerful than those behind ChatGPT. Last month, executives including Altman and Demis Hassabis, CEO of Google DeepMind, signed a statementwarning that AI might someday pose an existential risk comparable to nuclear war or pandemics.

Such statements, often signed by executives working on the very technology they are warning could kill us, can feel hollow. For some, they also miss the point. Many AI experts say it is more important to focus on the harms AI can already cause byamplifying societal biases and facilitating thespread of misinformation.

BAAI chair Zhang Hongjiang told me that AI researchers in China are also deeply concerned about new capabilities emerging in AI.I really think that [Altman] is doing humankind a service by making this tour, by talking to various governments and institutions, he said.

Zhang said that a number of Chinese scientists, including the director of the BAAI, had signed the letter calling for a pause in the development of more powerful AI systems, but he pointed out that the BAAI has long been focused onmore immediate AI risks. New developments in AI mean we will definitely have more efforts working on AI alignment,Zhang said. But he added that the issue is tricky because smarter models can actually make things safer.

Altman was not the only Western AI expert to attend the BAAI conference.

Excerpt from:
Good News! China and the US Are Talking About AI Dangers - WIRED

Read More..

Louis Vuitton Dives Deep With Its New High Jewellery Collection – British Vogue

Francesca Amfitheatrof does not concern herself with the small things in life, the mere fripperies that might occupy the imaginations of some jewellers. Not for her an entire collection devoted to flowers, or the curves of the female form. The artistic director of Louis Vuitton Watches and Jewellery wants to grapple with lifes big subjects: the formation of the earth, the explosive rumble of the volcano, the irrepressible surge of the tsunami. These mind-blowing, life-changing elemental forces have inspired Deep Time, Amfitheatrofs fifth high jewellery collection for the Parisian house, and one that marks a maturation of her unapologetically bold style.

View more

Adam Katz Sinding

At Louis Vuitton, we are as ever adventurers, travelling to extraordinary, unexpected places, says Amfitheatrof. Indeed, the collections unveiling earlier this week took top clients and press from around the world on a whistle-stop Grecian odyssey that took in the luxurious environs of the Amanzoe resort on the Peloponnese coast, the island of Hydra and finally Athens.

The Odeon of Herodes Atticus, the citys vast Roman theatre in the shadow of the Acropolis, was the dramatic setting for a performance directed by esteemed Greek choreographer Dimitris Papaioannou to a score by Renaud Capuon. Models wearing jewels that would have provided perfect armour for the Amazons, those fierce female warriors of Greek myth, paraded under the piercing spotlight of mysterious, masked male dancers.

Amfitheatrofs preoccupation with natural history in the collections 170 pieces extends to the choice of gemstones, those miracles of nature formed by geological forces billions of years ago. One magnificent rising wave of a tsunami-inspired necklace envelops the neck in diamonds, punctuated by a 40-carat velvety blue Sri Lankan sapphire that was formed underground by the passage of ancient rivers and rainfall. In another set inspired by the fiery eruption of a volcano, tourmalines and mandarin garnets, which were themselves formed in lava, are set in a signature Louis Vuitton V among vertical channels of diamonds and gold.

The second chapter of the collection takes in life on earth. The essence of life itself, the spindly, twisting form of DNA, is evoked in a necklace that spirals its way around the neck in diamond-tipped bars of white gold. As ever with Louis Vuitton, however, rich colour contrasts are the predominant theme. In one set, the natural beauty of flora is evoked in the fierce orange of spessartite garnets and juicy cabochons of deep pink rubellites. In another, sun and sea come together in a breastplate-style bib of yellow sapphires and giant aquamarines.

The presentation, attended by friends of the house including La Seydoux and Ana de Armas, culminated in Aphrodite emerging from a nautilus shell in the style of Botticellis Venus. Played by dancer Breanna OMara, she was then bedecked in pearlescent armour of her own. Like the future owners of Amfitheatrofs designs, she was ready to face the world.

Go here to see the original:
Louis Vuitton Dives Deep With Its New High Jewellery Collection - British Vogue

Read More..

Forget about the AI apocalypse. The real dangers are already here – Yahoo Finance

Two weeks after members of Congress questioned OpenAI CEO Sam Altman about the potential for artificial intelligence tools to spread misinformation, disrupt elections and displace jobs, he and others in the industry went public with a much more frightening possibility: an AI apocalypse.

Altman, whose company is behind the viral chatbot tool ChatGPT, joined Google DeepMind CEO Demis Hassabis, Microsofts CTO Kevin Scott and dozens of other AI researchers and business leaders in signing a one-sentence letter last month stating: Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.

The stark warning was widely covered in the press, with some suggesting it showed the need to take such apocalyptic scenarios more seriously. But it also highlights an important dynamic in Silicon Valley right now: Top executives at some of the biggest tech companies are simultaneously telling the public that AI has the potential to bring about human extinction while also racing to invest in and deploy this technology into products that reach billions of people.

The dynamic has played out elsewhere recently, too. Tesla CEO Elon Musk, for example, said in a TV interview in April that AI could lead to civilization destruction. But he still remains deeply involved in the technology through investments across his sprawling business empire and has said he wants to create a rival to the AI offerings by Microsoft and Google.

Left to right: Microsoft's CTO Kevin Scott, OpenAI CEO Sam Altman, Google DeepMind CEO Demis Hassabis. - Joy Malone/David Ryder/Bloomberg/Joel Saget/AFP/Getty Images

Some AI industry experts say that focusing attention on far-off scenarios may distract from the more immediate harms that a new generation of powerful AI tools can cause to people and communities, including spreading misinformation, perpetuating biases and enabling discrimination in various services.

Story continues

Motives seemed to be mixed, Gary Marcus, an AI researcher and New York University professor emeritus who testified before lawmakers alongside Altman last month, told CNN. Some of the execs are likely genuinely worried about what they have unleashed, he said, but others may be trying to focus attention on abstract possibilities to detract from the more immediate possibilities.

Representatives for Google and OpenAI did not immediately respond to a request for comment. In a statement, a Microsoft spokesperson said: We are optimistic about the future of AI, and we think AI advances will solve many more challenges than they present, but we have also been consistent in our belief that when you create technologies that can change the world, you must also ensure that the technology is used responsibly.

For Marcus, a self-described critic of AI hype, the biggest immediate threat from AI is the threat to democracy from the wholesale production of compelling misinformation.

Generative AI tools like OpenAIs ChatGPT and Dall-E are trained on vast troves of data online to create compelling written work and images in response to user prompts. With these tools, for example, one could quickly mimic the style or likeness of public figures in an attempt to create disinformation campaigns.

In his testimony before Congress, Altman also said the potential for AI to be used to manipulate voters and target disinformation were among my areas of greatest concern.

Even in more ordinary use cases, however, there are concerns. The same tools have been called out for offering wrong answers to user prompts, outright hallucinating responses and potentially perpetuating racial and gender biases.

Gary Marcus, professor emeritus at New York University, right, listens to Sam Altman, chief executive officer and co-founder of OpenAI, speak during a Senate Judiciary Subcommittee hearing in Washington, DC, US, on Tuesday, May 16, 2023. Congress is debating the potential and pitfalls of artificial intelligence as products like ChatGPT raise questions about the future of creative industries and the ability to tell fact from fiction. - Eric Lee/Bloomberg/Getty Images

Emily Bender, a professor at the University of Washington and director of its Computational Linguistics Laboratory, told CNN said some companies may want to divert attention from the bias baked into their data and also from concerning claims about how their systems are trained.

Bender cited intellectual property concerns with some of the data these systems are trained on as well as allegations of companies outsourcing the work of going through some of the worst parts of the training data to low-paid workers abroad.

If the public and the regulators can be focused on these imaginary science fiction scenarios, then maybe these companies can get away with the data theft and exploitative practices for longer, Bender told CNN.

Regulators may be the real intended audience for the tech industrys doomsday messaging.

As Bender puts it, execs are essentially saying: This stuff is very, very dangerous, and were the only ones who understand how to rein it in.

Judging from Altmans appearance before Congress, this strategy might work. Altman appeared to win over Washington by echoing lawmakers concerns about AI a technology that many in Congress are still trying to understand and offering suggestions for how to address it.

This approach to regulation would be hugely problematic, Bender said. It could give the industry influence over the regulators tasked with holding it accountable and also leave out the voices and input of other people and communities experiencing negative impacts of this technology.

If the regulators kind of orient towards the people who are building and selling the technology as the only ones who could possibly understand this, and therefore can possibly inform how regulation should work, were really going to miss out, Bender said.

Bender said she tries, at every opportunity, to tell people these things seem much smarter than they are. As she put it, this is because we are as smart as we are and the way that we make sense of language, including responses from AI, is actually by imagining a mind behind it.

Ultimately, Bender put forward a simple question for the tech industry on AI: If they honestly believe that this could be bringing about human extinction, then why not just stop?

For more CNN news and newsletters create an account at CNN.com

See the original post:
Forget about the AI apocalypse. The real dangers are already here - Yahoo Finance

Read More..

Water Research Goes Deep with Rafting Trip to Utah | Newsroom – University of California, Merced

The USDA-funded Secure Water Future (SWF) team at UC Merced believes that to fully understand water, you must do more than just study this vital resource. You must immerse yourself in it - sometimes, literally.

A recent trip to Utah that culminated in rafting The Gates of Lodore on the Green River allowed student participants to both learn about and experience water, in all its forms. This was the second year for this trip, and thanks to this winter's heavy and lengthy snowfall, students got to see the solid form of water, as well.

"We were able to both snowshoe and raft, giving us a really interesting perspective," said Sarah Naumes, managing director of SWF.

Students, who came from UC Merced, UC Davis, UC Berkeley, Utah State University and New Mexico State University, learned from subject experts and mentors who attended parts of the trip. They observed a new irrigation system at a Utah farm. And, of course, they rafted down the Green River for four days. Thirteen graduate students and one undergraduate student intern took part.

"I had a lot of opportunity to learn and talk about my research, which is such good training in scientific communication," said UC Merced student Liying Li. She added that she was surprised by the quality of the trip, as well as "the power of returning to nature and thinking to ourselves, and the inspiration from communicating with mentors and peers of different backgrounds."

UC Davis student Yara Pasner also took part.

"It was a fantastic trip," Pasner said. "I learned a lot about the Green River, the Great Salt Lake, and about Utah agriculture and water management. It was an incredibly diverse group of students, and the programming was educational, inclusive, positive and seamless."

UC Merced postdoctoral fellowEmily Waring was impressed with the variety of topics covered.

"The trip was FULL of activities and bonding," she said. "Everyone learned so much about rivers and also from the participants and mentors, who were from many disciplines."

Waring she said she was surprised to learn how differently water is managed in Utah compared to California.

According to its website, the SWF team's mission is "to understand, enable, and envision water management strategies, empowered through data-enabled decision-making, for agricultural and ecological systems. The transdisciplinary team works with growers, irrigation districts, and ecosystem managers to adopt and adapt climate resilience strategies, train the next generation of transdisciplinary practitioners, and produce an online dashboard for data-driven decision-making."

Events like this Climate Adaptation Science Academy Experiential Learning Expedition (CASA ELE) equip student researchers to meet that mission both through the information provided and the opportunity to connect with other researchers doing similar work. This kind of research can be isolating, and those who joined in the expedition formed relationships with their peers that likely will be long-lasting and fruitful, organizers said.

Li said the trip was well-organized and "created a culture for everyone to support and help each other."

Pasner said she was surprised at how "emotionally intelligent" the experience was.

"The mentors were open to any question, personal or professional," she said. "I was able to ask top-level Utah water administrators and professors how they deal with sexism in the workplace as a woman - and I got real answers. The psychologist on the trip (David Meyer) provided invaluable mentorship on how to allow this trip to fill my emotional battery, and how to spread that sense of peace into the rest of the world. The trip challenged me as a person to use my heart and mind to consider water challenges and solutions with expertise and empathy."

Naumes said the feedback received so far has been overwhelmingly positive.

"Students said they felt reinvigorated, and reconnected with what they are studying."

Pasner echoed that sentiment.

"This trip is a unicorn," she said. "I've come away from this trip with newfound optimism about working in academics. This trip treated us like future leaders. I feel empowered and proud to be part of the Secure Water Future community."

Secure Water Future will host a UC Water Academy on wildfire and water in August for UC graduate students. Next year, CASA ELE will travel to New Mexico.

Excerpt from:
Water Research Goes Deep with Rafting Trip to Utah | Newsroom - University of California, Merced

Read More..