Page 2,309«..1020..2,3082,3092,3102,311..2,3202,330..»

Can you leave cryptocurrency to your heirs? Here’s how to do it safely – MarketWatch

This article is reprinted by permission from NerdWallet.

If youre merely dipping your toe incryptocurrency, it can be hard to imagine your crypto as something worth talking to an estate attorney about. But that $100 in fun money could grow to a significant percentage of your total investments, sometimes overnight. Sorry to be a downer, but YOLO so make a plan for your crypto in the event you die.

Crypto accountsarent like traditional investment accounts. They can be more vulnerable to security issues, and you generally cant name a beneficiary. For example, if you store your crypto on a physical device at home and a few friends know your key a password of sorts that grants access to a crypto wallet one of those so-called friends could wander into your house and steal your crypto as easily as they could walk off with your great-grandmothers diamond earrings. Or, if you shared the keys with no one, your crypto is lost forever.

Its important to understand how to safely store your crypto and communicate your wishes with your loved ones, just like you would with any other valuable asset.

You trade and store crypto in wallets, but not the leather kind.Crypto walletscan either be digital and managed on an app or website, or physical like a thumb drive. The kind you choose depends on what you intend to do with your crypto.

The hot wallet is like a checking account with money moving in and out while the cold wallet is more like a savings account, where you park money for a longer time. You can have both at the same time.

Whoever holds the keys that is, who maintains custody over a password of randomly generated numbers and letters has access to your crypto. It could be you, a third-party crypto exchange or a hybrid of both.

Dont keep more than youre willing to lose on a third-party exchange as a long-term solution, says Alex Mejias, founder and managing attorney at James River Law in Richmond, Virginia. You dont control the keys. They could freeze your funds or get attacked. Mejias recommends a self-custody or hybrid option as the value of your crypto grows.

Also see: A simple checklist to get your wishes met later in life

A cold wallet can be a small physical storage device thats easy to misplace. Your cold wallet requires a PIN code for access, plus you set up a recovery phrase as a backup in case you lose your key. According to Mejias, a fireproof safe at home or a safety deposit box at a bank is a must, but dont store your cold wallet in the same place as the note containing your key, PIN and recovery phrase. If someone finds all of those items together, its bye-bye bitcoin BTCUSD, +0.53%.

Above all, design a storage method that makes sense. Dont get so cute that you make some complicated system that you cant remember, Mejias says. Hes heard of people writing down their keys and cutting the paper into three pieces, hiding each piece in a separate location. It sounds like a good idea, but its a horrible idea. If you lose one of those three, its gone forever. Youve tripled your risk.

Related: The 5 most common questions about trusts

Name a beneficiary in your will and add a document to your estate plan that lists your crypto assets and any passwords, PINs, keys and instructions to find your cold wallet. If you have an account at a cryptocurrency exchange, your beneficiary can contact customer support to notify them of your death.

According to a Coinbase COIN, +1.29% representative, there is a process in place to guide next of kin, including one-on-one assistance from a Coinbase analyst. Gemini requires a death certificate and power of attorney to initiate a transfer out of a deceased persons account.

We hope to simplify this process in the future, so we are working to add account beneficiaries functionality to our platform, a Gemini representative said in an email.

Also see: Crypto reasonable to own as part of a diversified portfolio, but dont expect Apple to take bitcoin payment soon, says Tim Cook

Ensure that your assets will go to the right people by keeping your estate plan updated, especially after a life change like marriage or divorce. Provide up-to-date instructions so beneficiaries can access your assets. Cold wallets need maintenance, too, in the form of periodic firmware updates. This can help lessen the burden on your loved ones and hopefully prevent fights as they settle your estate after your death.

Crypto has the potential to be a very explosive thing because the value can be so huge so quickly, Mejias says. When you think about five, 10 years from now, were potentially talking about a whole lot of money.

This article provides information for educational purposes. NerdWallet does not offer advisory or brokerage services, nor does it recommend specific investments, including stocks, securities or cryptocurrencies.

More From NerdWallet

Sara Rathner writes for NerdWallet. Email: srathner@nerdwallet.com. Twitter: @sarakrathner.

Read the rest here:
Can you leave cryptocurrency to your heirs? Here's how to do it safely - MarketWatch

Read More..

New cryptocurrency firm used to be known as Mechanical Technology – Times Union

ALBANY The Capital Region is now home to a publicly traded cryptocurrency mining firm named Soluna Holdings (Nasdaq: SLNH).

But the company has actually been around a while, just operating under a different name and business strategy.

Until recently, Soluna was known as Mechanical Technology, a longtime publicly traded company that makes sophisticated test and measurement machines used in the aviation and semiconductor sectors.

But after a private equity firm known as Brookstone Partners invested several million dollars in Mechanical Technology back in 2016, the company began undergoing a significant transformation, including getting into the cryptocurrency market, using high-end computers to "mine" for cryptocurrency, or digital currency.

It's not like mining for gold or silver. Cryptocurrency mining is the process by which a certain type of cryptocurrency is able to grow.

When a cryptocurrency is used to buy something, the underlying details of the transaction are then confirmed by miners or mining companies. This decentralized system of auditing cryptocurrency transactions is designed to prevent fraud. The miners, or mining companies, have to use computing power to solve complex mathematical problems in order to verify a transaction or a portion of a transaction.

But these miners or mining companies aren't paid in dollars. In fact, they may not get paid at all. The first miner to solve a certain transaction is then awarded newly issued cryptocurrency, the incentive that drives the industry in the first place and keeps it operating.

Earlier this month, Mechanical Technology acquired a company called Soluna Computing and then changed its own name to Soluna as part of its total transformation into a cryptocurrency mining company.

Soluna says that what sets it apart from other cryptocurrency companies is that it is addressing the biggest complaint about cryptominingcompanies, which is that they use too much electricity to power their data centers that mine for cryptocurrency.

Instead, Soluna buys "excess" electricity from renewable energy companies that operate wind or solar farms. Because these renewable energy sources can vary throughout the day and often face bottlenecks in the electrical transmission grid, they sometimes end up with excess power they cannot sell.

Soluna has vowed to power its data centers on this excess renewable energy, which is a novel idea.

The change in the company's strategy appears to be paying off. During the third quarter of 2021, Soluna's revenues increased 54 percent to $5.1 million, of which $3.1 million was from its growing cryptomining business.

Cryptominers measure their workload through what is known as hashes, which are produced when an encrypted file for a cryptocurrency transaction is verified.

The more computing power a cryptomining firm has, the more hashing it can do, and the more cryptocurrency it can earn.

Soluna wants to build up its computing power to be able to complete one quintillion hashes per second in the coming months, what is known in the industry as reaching 1 "exahash" of computing, a considerable milestone.

"Watch us scale," CEO Michael Toporek said in a statement issued Monday when the company released its quarterly financial results.

See the original post:
New cryptocurrency firm used to be known as Mechanical Technology - Times Union

Read More..

City of Williston introduces first cryptocurrency machine at Williston Basin Airport – Williston Daily Herald

Country

United States of AmericaUS Virgin IslandsUnited States Minor Outlying IslandsCanadaMexico, United Mexican StatesBahamas, Commonwealth of theCuba, Republic ofDominican RepublicHaiti, Republic ofJamaicaAfghanistanAlbania, People's Socialist Republic ofAlgeria, People's Democratic Republic ofAmerican SamoaAndorra, Principality ofAngola, Republic ofAnguillaAntarctica (the territory South of 60 deg S)Antigua and BarbudaArgentina, Argentine RepublicArmeniaArubaAustralia, Commonwealth ofAustria, Republic ofAzerbaijan, Republic ofBahrain, Kingdom ofBangladesh, People's Republic ofBarbadosBelarusBelgium, Kingdom ofBelizeBenin, People's Republic ofBermudaBhutan, Kingdom ofBolivia, Republic ofBosnia and HerzegovinaBotswana, Republic ofBouvet Island (Bouvetoya)Brazil, Federative Republic ofBritish Indian Ocean Territory (Chagos Archipelago)British Virgin IslandsBrunei DarussalamBulgaria, People's Republic ofBurkina FasoBurundi, Republic ofCambodia, Kingdom ofCameroon, United Republic ofCape Verde, Republic ofCayman IslandsCentral African RepublicChad, Republic ofChile, Republic ofChina, People's Republic ofChristmas IslandCocos (Keeling) IslandsColombia, Republic ofComoros, Union of theCongo, Democratic Republic ofCongo, People's Republic ofCook IslandsCosta Rica, Republic ofCote D'Ivoire, Ivory Coast, Republic of theCyprus, Republic ofCzech RepublicDenmark, Kingdom ofDjibouti, Republic ofDominica, Commonwealth ofEcuador, Republic ofEgypt, Arab Republic ofEl Salvador, Republic ofEquatorial Guinea, Republic ofEritreaEstoniaEthiopiaFaeroe IslandsFalkland Islands (Malvinas)Fiji, Republic of the Fiji IslandsFinland, Republic ofFrance, French RepublicFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabon, Gabonese RepublicGambia, Republic of theGeorgiaGermanyGhana, Republic ofGibraltarGreece, Hellenic RepublicGreenlandGrenadaGuadaloupeGuamGuatemala, Republic ofGuinea, RevolutionaryPeople's Rep'c ofGuinea-Bissau, Republic ofGuyana, Republic ofHeard and McDonald IslandsHoly See (Vatican City State)Honduras, Republic ofHong Kong, Special Administrative Region of ChinaHrvatska (Croatia)Hungary, Hungarian People's RepublicIceland, Republic ofIndia, Republic ofIndonesia, Republic ofIran, Islamic Republic ofIraq, Republic ofIrelandIsrael, State ofItaly, Italian RepublicJapanJordan, Hashemite Kingdom ofKazakhstan, Republic ofKenya, Republic ofKiribati, Republic ofKorea, Democratic People's Republic ofKorea, Republic ofKuwait, State ofKyrgyz RepublicLao People's Democratic RepublicLatviaLebanon, Lebanese RepublicLesotho, Kingdom ofLiberia, Republic ofLibyan Arab JamahiriyaLiechtenstein, Principality ofLithuaniaLuxembourg, Grand Duchy ofMacao, Special Administrative Region of ChinaMacedonia, the former Yugoslav Republic ofMadagascar, Republic ofMalawi, Republic ofMalaysiaMaldives, Republic ofMali, Republic ofMalta, Republic ofMarshall IslandsMartiniqueMauritania, Islamic Republic ofMauritiusMayotteMicronesia, Federated States ofMoldova, Republic ofMonaco, Principality ofMongolia, Mongolian People's RepublicMontserratMorocco, Kingdom ofMozambique, People's Republic ofMyanmarNamibiaNauru, Republic ofNepal, Kingdom ofNetherlands AntillesNetherlands, Kingdom of theNew CaledoniaNew ZealandNicaragua, Republic ofNiger, Republic of theNigeria, Federal Republic ofNiue, Republic ofNorfolk IslandNorthern Mariana IslandsNorway, Kingdom ofOman, Sultanate ofPakistan, Islamic Republic ofPalauPalestinian Territory, OccupiedPanama, Republic ofPapua New GuineaParaguay, Republic ofPeru, Republic ofPhilippines, Republic of thePitcairn IslandPoland, Polish People's RepublicPortugal, Portuguese RepublicPuerto RicoQatar, State ofReunionRomania, Socialist Republic ofRussian FederationRwanda, Rwandese RepublicSamoa, Independent State ofSan Marino, Republic ofSao Tome and Principe, Democratic Republic ofSaudi Arabia, Kingdom ofSenegal, Republic ofSerbia and MontenegroSeychelles, Republic ofSierra Leone, Republic ofSingapore, Republic ofSlovakia (Slovak Republic)SloveniaSolomon IslandsSomalia, Somali RepublicSouth Africa, Republic ofSouth Georgia and the South Sandwich IslandsSpain, Spanish StateSri Lanka, Democratic Socialist Republic ofSt. HelenaSt. Kitts and NevisSt. LuciaSt. Pierre and MiquelonSt. Vincent and the GrenadinesSudan, Democratic Republic of theSuriname, Republic ofSvalbard & Jan Mayen IslandsSwaziland, Kingdom ofSweden, Kingdom ofSwitzerland, Swiss ConfederationSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania, United Republic ofThailand, Kingdom ofTimor-Leste, Democratic Republic ofTogo, Togolese RepublicTokelau (Tokelau Islands)Tonga, Kingdom ofTrinidad and Tobago, Republic ofTunisia, Republic ofTurkey, Republic ofTurkmenistanTurks and Caicos IslandsTuvaluUganda, Republic ofUkraineUnited Arab EmiratesUnited Kingdom of Great Britain & N. IrelandUruguay, Eastern Republic ofUzbekistanVanuatuVenezuela, Bolivarian Republic ofViet Nam, Socialist Republic ofWallis and Futuna IslandsWestern SaharaYemenZambia, Republic ofZimbabwe

View original post here:
City of Williston introduces first cryptocurrency machine at Williston Basin Airport - Williston Daily Herald

Read More..

Sphynx Announces the All-in-One Cryptocurrency Platform – Yahoo Finance

Auckland, New Zealand--(Newsfile Corp. - November 16, 2021) - Sphynx announces a platform that offers trading, staking, farming, and a plethora of other utilities. Its native currency is $SPHYNX, which currently exists as a BEP-20 token.

Figure 1: Sphynx the all-in-one cryptocurrency platform for the ages

The user-interface was designed with user-friendliness and simplicity in mind, ensuring that both beginners and experts will be able to navigate the platform with ease. The main menu, underneath the consolidated wallet, is to the left of the platform when viewed on a computer. The positioning is the same on mobile devices, though users will have to click the three horizontal lines on the top-left to open the main menu. Within this menu are options such as "Swap", "Pools", "Farms", "Lottery", etc.

Beside the menu (when viewed on a computer) is the swap that users can utilize to trade tokens, and to the right of that is the integrated chart that investors can use to perform market analysis. On a mobile device, both of these tools are available on the center of your screen. Everything has been strategically placed to ensure investors never have to leave the confines of Sphynx.

The vast majority of new traders are not familiar with token tax, which applies to a vast majority of tokens that exist on the Binance Smart Chain and/or the Ethereum Network. Most investors run into issues purchasing such tokens because they are not familiar with how to configure slippage tolerance levels to accommodate that tax. Sphynx eliminates that issue with its "Auto Swap" feature, which automatically selects the optimal slippage for your token of choice.

Sphynx has already made tremendous strides on the Binance Smart Chain. Its platform has been the topic of discussion for dozens of crypto influencers, all of whom have been moved by Sphynx's progress thus far. Not only this, but Sphynx, through its NFT line, the Sovereign Sphynx Council, has also been making waves on the Ethereum Network both by locking in partnerships with big-name influencers and through its massive giveaways for community members.

Story continues

Sphynx stands out from its competition because of how little it charges for trading fees. In comparison to the 0.25% (and higher) trading fees that big-name platforms charge, Sphynx charges only 0.1% for swap fees, and half of those fees go back towards the holders via Swap Fee Rewards. Furthermore, by staking $SPHYNX, investors can earn both from staking their tokens (in $SPHYNX) and from the $BNB rewards that will accumulate from swap fees.

CertiK is an internationally recognized security company that has audited the likes of Binance. What Sphynx has done is revolutionary as it has established a partnership with CertiK outside of being audited by them and commissioning their Skynet protection service. This partnership exists with Sphynx's upcoming Launchpad. So, for a brand-new project wishing to launch on SphynxSwap, they would first have to go through CertiK and clear an audit with them in order for them to be deemed a safe project to invest in. There will be different tiers for such launches, but a good standing with CertiK will ease the concerns of traders who have been the victims of projects launched by nefarious developers with ill-intent.

Sphynx is also planning to roll out its cross-chain bridge in the near future. This will allow users to be able to bridge over to other networks outside of the Binance Smart Chain, with the first cross-chain availability being the Ethereum Network. Furthermore, investors will be able to switch between networks on the Sphynx platform itself, and will be able to trade tokens that exist outside of the Binance Smart Chain.

The streaming platform that Sphynx is also working on (SphynxTV) is just another example of a utility that doesn't exist anywhere else. All in all, Sphynx provides more functionality to users than anything else that is available on the market today, and it is why Sphynx is the all-in-one cryptocurrency platform for the ages.

Media Contact:

Zaidoun 'lonzo' AlowbydiSupport@sphynxtoken.co

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/103809

Read the original post:
Sphynx Announces the All-in-One Cryptocurrency Platform - Yahoo Finance

Read More..

Brave embeds a cryptocurrency wallet right in the browser – PCWorld

Brave, the browser maker who pioneered the Brave Attention Token (BAT) as a way of paying you for your attention, has taken another unique step: The latest version of the browser has a cryptocurrency wallet built right into it.

Brave version 1.32 includes a dedicated wallet built right into the browser, in which users can store their private keys for various cryptocurrency holdings. (Read our review of Brave 1.0.) The company claims that the direct integration is more secure than a third-party browser plugin, but also allows users to connect with hardware wallet devices like Trezor and Ledger. Braves wallet also provides real-time market information as well as the ability to buy and pay via various cryptocurrencies.

The new Brave Wallet replaces the legacy crypto wallet found in earlier versions of the browser, Brave said. It can be accessed by clicking the small wallet icon in the upper right-hand corner of the browser itself. If you set up the new wallet, Brave will ask you to import a Metamask wallet or other soft custody wallet. When thats complete, Brave will send you a series of words, which youll then have to write down and store as an account recovery mechanism.

Brave lists the following features of the new wallet:

We asked Brave to explain why the Brave Wallet was superior to other solutions, and how the private keys were protected. Brian Bondy, the companys chief technical officer and co-founder, provided us with a statement in response.

The Brave Wallet, in the same way as hardware devices, implements its own BIP32 Hierarchical Deterministic (HD) wallet (BIP32 HD wallet). The funds are always stored on the blockchain, but the keys to unlock those funds are stored in the Brave Wallet.

Bondy also said that integrating the wallet into the browser prevents users from being tricked by spoofing attacksfor example, loading their private keys into a plugin which could have a hard-coded key that an attacker could also access, stealing the private keys and the funds that they connected to. Those plugins may also have code dependencies that could produce security audit errors, Bondy added.

Finally, extensions cannot paint on the full canvas of the browsers user interface, especially not the address bar or unspoofable toolbar, Bondy said. Brave Wallet can make full use of this user-interface area to help protect users from being tricked. In Brave, Dapp permissions tie into the same Chromium permission manager as other permissions such as geolocations; whereas extensions need to roll their own implementations.

As PCWorld's senior editor, Mark focuses on Microsoft news and chip technology, among other beats. He has formerly written for PCMag, BYTE, Slashdot, eWEEK, and ReadWrite.

Original post:
Brave embeds a cryptocurrency wallet right in the browser - PCWorld

Read More..

Invest in Sustainable Cryptocurrency Mining with BLOK – ETFdb.com

In the November newsletter for the Amplify Transformational Data Sharing ETF (BLOK), the co-portfolio managers mention participating in an IPO for a company called Stronghold Mining before moving on to discuss rebalancing of existing holdings. What seems like such an understated investment, however, is a direct reflection of how BLOK continues to remain on the forward edge of the blockchain industry.

Stronghold Digital Mining is a company that is both working to remediate centuries old, environmentally harmful coal byproducts in Pennsylvania while simultaneously fueling bitcoin mining from the energy produced. Pennsylvania is littered with over 800 different piles of coal refuse from active coal mining that happened in the region in the 19th and 20th centuries.

Coal refuse is a byproduct of coal mining and causes acid mine drainage (currently the single biggest source of water pollution in the state) and air pollution with pathogenic windblown particulates, is a fire hazard that releases toxic greenhouse gases if caught ablaze, and prevents the recovery and flourishing of ecosystems, according to the Stronghold website.

Stronghold comes in and removes the coal refuse and takes it to one of its two power plants to control burn it in a way that removes almost all of the harmful emissions, such as mercury, sulfur dioxide, nitrous oxides, and particulates. The controlled burning creates power that is then used for mining bitcoin by the company.

The ash that is created as a byproduct of the burning is classed as a fertilizer and is used to help coal refuse sites recover, as it is chemically a base that can help neutralize the lingering acidity. This allows vegetation to grow back and the local ecosystem to recover.

The land that Stronghold Digital Mining removes the coal refuse from is donated back to the local communities. Stronghold, in partnership with the Pennsylvania Department of Environmental Protection has already reclaimed roughly 1,000 acres of land that were previously unable to be used.

As coal refuse is classified as a Tier II alternative energy source, the company is simultaneously solving existing climate woes created from old, unsustainable practices, generating their own power from an alternative energy source, and restoring previously uninhabitable land to allow for growth. Its a multidimensional, revolutionary answer to the concerns of bitcoin mining emissions and the deep carbon footprint typically associated with cryptocurrency mining.

The Amplify Transformational Data Sharing ETF (BLOK), which now tops $1.7 billion in AUM and is the largest of the blockchain ETFs, is actively managed and invests in companies directly involved in developing and using blockchain technology. BLOK was also the first blockchain ETF approved by the SEC and launched in 2018.

The fund invests in companies partnered with or directly investing in companies utilizing and developing blockchain technologies. However, the fund does not invest directly in blockchain technology or cryptocurrencies.

BLOK spreads its holdings across the size spectrum, investing in all market caps. Within the blockchain industry, top allocations included transactional at 30.0%, crypto miners at 28.0%, and venture at 10%, as of the end of September. BLOK invests across the blockchain landscape, in miners, exchanges, and developers.

Top holdings includeSilvergate Cap Corp. (SI)at 5.64%, Galaxy Digital holdings Ltd at 5.41%, andCoinbase Global Inc. (COIN)at 4.87%.

Stronghold Digital Mining Inc (SDIG) is carried at a 0.54% weight in the fund.

BLOK has an expense ratio of 0.71% and currently has 49 holdings.

For more news, information, and strategy, visit the Crypto Channel.

Read more from the original source:
Invest in Sustainable Cryptocurrency Mining with BLOK - ETFdb.com

Read More..

Save 97% off a course bundle that covers all things computer science – BleepingComputer

By BleepingComputer Deals

There's no denying that computer science is an incredibly intimidating field. But at this point, computers run the world that it can be hard to ignore computer science as a whole altogether, even to the average person. In the digital age, mostif not allindustries rely on data, software, and hardware to survive.

Computer science and IT are pretty much embedded in everything we do, from transportation and communication to banking and health. Even the appliances you use at home involve computers.

This only means that there's a future in computer science, and immersing yourself in it is a surefire way to future-proof your career. The good news is you don't have to go back to school and incur debt to enter the field.

The 2022 Premium Computer Science Career Path Certification Bundle offers comprehensive computer science education without burning a hole in your pocket. Its courses cost $1,800 individually, but you can get them today for just $39.99.

This course collection features nine courses and 86 hours of expert-led content that explore various facets of computer science. All courses are available on both desktop and mobile, and you'll receive a certificate of completion once you finish each course, which you can then use to bolster your resume

There's a course on data science where you'll learn how to code frameworks and strengthen your hypotheses by supporting your claims with statistical evidence, as well as a course centered on the best cloud offering for high-end machine learning applications.

You'll also explore database fundamentals, JavaScript programming, building hardware using Raspberry Pi, and so much more.

Most courses are also beginner-friendly, so you won't feel too overwhelmed learning foreign concepts. Plus, since you're scoring lifetime access, you can learn them pretty much wherever and whenever you want, using any device.

Order today for only $39.99 to get lifetime access to all nine courses, normally worth $1,800.

Prices subject to change.

Disclosure: This is a StackCommerce deal in partnership with BleepingComputer.com. In order to participate in this deal or giveaway you are required to register an account in our StackCommerce store. To learn more about how StackCommerce handles your registration information please see the StackCommerce Privacy Policy. Furthermore, BleepingComputer.com earns a commission for every sale made through StackCommerce.

Originally posted here:

Save 97% off a course bundle that covers all things computer science - BleepingComputer

Read More..

Cameron University’s CU in Computing presentation to focus on Computer Science and Information Technology degree programs – Duncan Banner

If youre considering a degree from Cameron Universitys Department of Computing and Technology but arent sure of the differences between the departments two undergraduate degree programs Computer Science and Information Technology -- the upcoming CU in Computing event has the answers. The free, virtual informational presentation will feature specifics about each degree program, including courses, options and undergraduate research opportunities. Career options will also be covered. CU in Computing will take place on Monday, Nov. 22, from 5:30 to 6:30 p.m.

According to the U.S. Bureau of Labor Statistics, employment in computer and information technology occupations is projected to grow 11 percent by 2029, much faster than the average for all occupations. These occupations are projected to add more than half a million new jobs.

The Bachelor of Science in Computer Science degree program focuses on the study of computing technologies, including hardware and software. It includes the systematic study of computing systems and computation. A student graduating with this degree can easily move into the industry or pursue graduate studies. Graduates of this program go on to various careers in video gaming, business, technology, government, and intelligence and law enforcement. Other career options include the manufacturing sector as software and web developers, database administrators, network engineers and administrators, data analysts, and more.

The Associate in Applied Science and Bachelor of Science in Information Technology degree programs prepare graduates for employment requiring expertise as an information technology specialist. Modern-day businesses and industries employ a wide variety of technologies, and these businesses and industries need technology specialists to develop, implement and maintain the technology. Therefore, the departments information technology curricula are flexible, with options in Cyber Security and Information Assurance, Management Information Systems, and Technology. Graduates of this program will be successful in obtaining a variety of positions in business, industry and government.

To register, go to https://www.cameron.edu/comptech/events. Registrants will receive a secure link to the presentation. For more information, contact Dr. Muhammad Javed, Chair, CU Department of Computing and Technology, at mjaved@cameron.edu or call 580-581-2335.

Continued here:

Cameron University's CU in Computing presentation to focus on Computer Science and Information Technology degree programs - Duncan Banner

Read More..

Bias in Algorithms | The Inference Project – Yale News

Artificial algorithms are increasingly being deployed to inform, endorse, and govern various aspects of todays society. Their reach includes the domains of hiring, lending, medicine, criminal justice, insurance, allocation of public services, social and business interactions, and the dissemination of information and news. Through a synthesis of computational and statistical models for representing concepts, human-generated datasets that provide examples for training, and powerful optimization algorithms that can efficientlynavigate through vast and complex landscapes to infer concepts that explain data, such algorithms have taken big strides towards mimicking various aspects of natural intelligence.

These algorithms have led to tremendous economic and social impact but have also been shown to be biased they candiscriminate, reinforce prejudices, polarize opinions, and influence political processes. How can subjective human or societal biases emerge in the objective world of artificial algorithms? And how can we design algorithms free from these limitations?

The search for answers to these questions also leads us to some understanding of the bias in human decision-making algorithms.

Professor AleksanderMdry, who will lead the post-talk discussion on Monday, November 22, is theCadence Design Systems Professor of Computingin theMITElectrical Engineering and Computer Science Departmentand a member of the Computer Science and Artifical Intelligence Lab at MIT. Hereceived his Ph.D. fromMITin 2011 and prior to joining the universitys faculty, he spent a year as a postdoctoral researcher at Microsoft Research New England. He also was on the faculty ofEPFLuntil early 2015. ProfessorMdry is currently serving as theDirector of theMIT Center for Deployable Machine Learningand is the Faculty Lead of theCSAIL-MSR Trustworthy and Robust AI Collaboration. Hisresearch spans machine learning, optimization, and algorithmic graph theory, and he has a strong interest in building on the existing machine learning techniques to forge a decision-making toolkit that is reliable and well-understood enough to be safely and responsibly deployed in the real world.

Registerin advance for this webinar and the post-talk conversation:

Original post:

Bias in Algorithms | The Inference Project - Yale News

Read More..

The tech behind popular cryptocurrencies, explained – Popular Science

Whether youre on the head or tail end of the cryptocurrency craze, one thing is for sure: These digital assets are hitting the mainstream hard, and dont seem to be going away anytime soon. Notably, the country of El Salvador recently adopted bitcoin as legal tender, and New Yorks incoming mayor Eric Adams is intent on transforming New York City into a hotspot for cryptocurrency.

Although only 16 percent of Americans say they invested, traded, or used cryptocurrency, almost 90 percent have heard about it, according to a recent Pew Research Center survey.

Advocates for cryptocurrency and decentralized finance (where people can make financial deals with one another without being moderated by a middleman or central authority like a bank) in general argue that these platforms are transparent and simultaneously anonymousboth good things.

The key to this vision lies in a digital technology called the blockchain, which undergirds all cryptocurrencies. The blockchain serves as a virtual hall of records, or a public ledger, that records every transaction, detailing the amount as well as the sender and receivers wallet addresses.

Yet, critics and regulatory bodies are worried about the potential for harm from cryptocurrencies, such as people using them for scams, money laundering, or funding illegal activities (not to mention the enormous carbon footprint that some of these cryptocurrencies have). And experts have raised concerns about the strength of cryptocurrency networks against attacks, and whether the design of some systems have warped over time to become centralized or inherently allow the rich to get richer.

[Related: Cryptocurrency scammers are mining dating sites for victims]

For those who are just wading into the crypto territory, heres a basic explainer on how the computer science behind these systems work.

To start at the front end, this is what happens when you send and receive cryptocurrency. Keep in mind that all cryptocurrencies are just based on computer programs, bitcoin included, and that these coins are not actually money, but clippings of computer code that transfer value from one user to another. To become a part of this process, first you have to create a digital wallet. Bitcoin and Ethereum both have recommendations on what wallet works best with their cryptocurrency, and specialty exchanges like Coinbase and Gemini also offer wallets.

Whenever you create a new wallet, the algorithm running that cryptocurrency will generate a paired private key and public key associated with it. You can think of the public key as like an address or bank account number, and the private key proves your ownership. These keys are a long string of characters that identify where the crypto should go. Usually, the addresses only accept the type of cryptocurrency theyre affiliated with (although something called cross-chain bridges and exchanges can help link up different cryptocurrencies).

[Related: 6 apps to get you started on crypto]

You do not have bitcoins in your possessionyou have proof that somebody in the past sent you those bitcoins, says Nicolas Christin, an associate professor of computer science, engineering, and public policy at Carnegie Mellon University.

You can then tap some of the unspent value in your wallet, and send it to someone elses public key. When you sign to verify that you want to send the bitcoins, you generate a small personalized piece of code attached to the transaction, and the system creates a mathematical puzzle that locks up that value and scrambles the code. When the recipient is ready to spend the money, they will put a corresponding piece of code into the transaction. Everybody in the network can verify that the two pieces of code fit together (through a process called transaction confirmation, also known as miningmore on that later). This entire operation is called signature verification.

[Related: Bitcoin is having a bumpy rollout as an official currency in El Salvador]

Its impossible for someone to find a missing piece if they dont have the right information, but its super easy for anybody to verify that two pieces fit, Christin explains. Bitcoin has very little additional computational abilities beyond signature verification. Satoshi Nakamotos [the pseudonym of the alleged creator of Bitcoin] vision was to have programmable money, initially. The problem is Bitcoin became very popular very quickly and the developers decided to freeze the features where they were.

However, a new upgrade released last week could open up the possibility for supporting expanded functions beyond signature verification.

Many modern cryptocurrencies derive from the Bitcoin model. For example, Litecoin is in many respects similar to Bitcoin, but the puzzle component was slightly altered. They replaced the mining algorithm (called SHA-256) thats used in Bitcoin with a function called Scrypt, which they claim takes less energy to run. On the other hand, the creators of Bitcoin Cash branched off from a team that was working on Bitcoin to make a Bitcoin-esque cryptocurrency that can process more transactions per second.

Ethereum, however, takes a different approach. Its blockchain has an added feature called loops, which allows it to repeatedly run a piece of code, and engineers can program on top of it. Ethereum uses a mechanism called a gas that charges the person who initiated the transaction a fee to run a programming instruction. The program burns up the gas as it runs, and when its out of gas, the program either completes or terminates.

[Related: NFTs are blowing up the digital art and collectibles worlds. Heres how they work.]

Developers can build a cryptocurrency on top of Ethereum (like the stablecoin DAI), create mortgages, or unique non-fungible tokens, since theyre all pieces of code. All of those are pieces of code that are extensions of Ethereum transactions, says Christin.

Ethereum is also credited with the nifty innovation of integrating smart contracts onto their blockchain. Ethereums developers describe these as code scripts that performs some actions or computation if certain conditions are satisfied, comparing the logic of the code to how a vending machine works. If a digital art NFT lives inside a smart contract, for example, the artist can create a royalty schedule that accrues a fee every time the art is transferred on the blockchain.

Or, as another example, imagine walking into a bank and asking to borrow $10 million for the day without telling anyone your name. Somebodys going to be reaching for a red button under a desk somewhere, says Ari Juels, a professor of computer science at Cornell Tech. But you can actually do something like this on a blockchain.

You would borrow money using a smart contract, and you use it to do whatever you want to do. Typically, its used for arbitrage, where you buy and sell tokens at profit. Then, you pay back the loan, and all of that is contained in a single transaction. The way that blockchains work, if you fail to pay back the loan, the whole transaction can just be aborted, Juels says, which means that its as though you never borrowed the money to begin with.

Now, to peel back the curtains some more: To keep any cryptocurrency system running, there has to be a way to release new coins into the network, along with a way of maintaining the public ledger that tracks where all the new coins come from and where they go.

But since these cryptocurrencies are all meant to be peer-to-peer, theres no one entity that does all this, the way a traditional bank does. Instead, the responsibility of running the system falls to the whole network of participants, which is why they have to come to a form of consensus about whether transactions are valid or invalid. Each transaction made on the blockchain needs to be verified. A batch of transactions make up a block, and several blocks make up a chain.

The blockchain provides you with a different trust model, says Juels. The rules are very well defined and transactions can be executed in a rigorous, programmatic way.

[Related: What exactly is a digital dollar, and how would it work?]

There are a variety of methods used by different cryptocurrencies to accomplish those two standard tasks. Proof-of-work is the process used by most cryptocurrencies, including Bitcoin and Ethereum, to do this. Although all users get to check if the transaction was good in the end, only one user can be elected to lead the validation, add the transaction to the blockchain, and receive a reward. These rewards are how new currencies get released into the system. This operation is also known as mining. But first, the users, called miners, have to compete against each other to solve a cryptographic puzzle whose difficulty is proportional to the number of people trying to solve the puzzle. The puzzle is created by an algorithm. The only way to solve it is to try many different numbers, and powerful computers or processors can try more numbers quicker so are more likely to get the correct answer.

With Bitcoin, there is a limited amount of bitcoins in the system (21 million) and the rewards for mining decrease over time, although miners are still incentivized because they can receive a portion of the transaction as a fee. The ideal goal of Bitcoin was one vote per CPU. That has ultimately been subverted, says Juels. People are using specialized mining hardware to participate in the system. As bitcoin mining heated up, people developed and burned through specialty hardware, guzzling up electricity and creating tons of waste.

Proof-of-work still functions according to the original principle of requiring an investment of resources in order to participate in the system to mine blocks, Juels notes.

Meanwhile, in proof-of-stake systems, you pay to play, and have to stake tokens as a resource investment to participate, like putting in a security deposit that you get back once the transactions you added to the blockchain are approved by the network. The system chooses a staker who is online at the time randomly and they get to validate the transactions and receive the rewards. Because it doesnt require solving puzzles, in theory, it should use less energy.

[Related: Renewable energy cant cure Bitcoins environmental woes]

In Bitcoin, your participation in the system is proportional to the amount of computation you do, says Juels. In a proof-of-stake system, its proportional to the amount of cryptocurrency you hold in the system.

Typically the way that [both proof-of-work and proof-of-stake] systems work is that the rights to create the next block is determined randomly in a kind of lottery where your chances of winning the lottery are proportional to your resources, he adds.

While Ethereum said that it was transitioning to a proof-of-stake system, that jump has not yet happened. The existing cryptocurrency projects that use proof-of-stake have their own variations of it. For example, Cardano uses a proof-of-stake system called Ouroboros that incorporates stake delegation and stake pools. And Solana, a blockchain that you can also build smart contract programs and other decentralized apps on, combines proof-of-stake with another consensus algorithm called proof-of-history to incorporate timestamps on transactions.

Despite proof-of-stake being faster and more energy efficient, many experts have concerns about its stability and the barriers to entry. In Bitcoin, you can just start mining, in principle, with your laptop. You wouldnt do very well, but you can join the system without any type of previous investment of resources, says Juels. In the case of these proof-of-stake systems, you need to go buy some coins to participate, or be assigned the coins at the outset of the protocol. There are some people who object to the need to obtain coins in order to participate to begin with, but that is a necessity.

Alternatively, a cryptocurrency project called the XRP ledger uses a consensus protocol unlike proof-of-stake or proof-of-work thats almost democraticbut validators do not receive any rewards.

Theres another concept to know, too. Proof-of-storage (otherwise known as proof-of-space) is where youre committing an amount of space for storage in the network. The idea initially was digital preservationwe want to record everything, so at least we can use the disk space for a good purpose. It turns out its less needed than we thought, says Christin. Theres a need for digital preservation but it doesnt scale as quickly as a currency would. Juels proposes that these systems could potentially be useful for storing data from NFTs. One project testing out this concept is Filecoin.

Ultimately, despite gaining ground with large finance platforms like PayPal, Mastercard, and Robinhood, the future of cryptocurrency is still uncertainlooming federal regulations could dramatically reshape the community and the ecosystem. And the value of currencies like bitcoin remain volatile and represent risky investments. Wherever the next chapter of cryptocurrency leads, its indisputable that the popularity of this new wave of technology has already forced large financial institutions to evolve their thinking on how people want to interact with money, and with each other using money.

More:

The tech behind popular cryptocurrencies, explained - Popular Science

Read More..