Page 4,512«..1020..4,5114,5124,5134,514..4,5204,530..»

cloud computing | computer science | Britannica.com

Cloud computing,Jos Vasconcelos Library: computer terminalsAPmethod of running application software and storing related data in central computer systems and providing customers or other users access to them through the Internet.

The origin of the expression cloud computing is obscure, but it appears to derive from the practice of using drawings of stylized clouds to denote networks in diagrams of computing and communications systems. The term came into popular use in 2008, though the practice of providing remote access to computing functions through networks dates back to the mainframe time-sharing systems of the 1960s and 1970s. In his 1966 book The Challenge of the Computer Utility, the Canadian electrical engineer Douglas F. Parkhill predicted that the computer industry would come to resemble a public utility in which many remotely located users are connected via communication links to a central computing facility.

For decades, efforts to create large-scale computer utilities were frustrated by constraints on the capacity of telecommunications networks such as the telephone system. It was cheaper and easier for companies and other organizations to store data and run applications on private computing systems maintained within their own facilities.

The constraints on network capacity began to be removed in the 1990s when telecommunications companies invested in high-capacity fibre-optic networks in response to the rapidly growing use of the Internet as a shared network for exchanging information. In the late 1990s, a number of companies, called application service providers (ASPs), were founded to supply computer applications to companies over the Internet. Most of the early ASPs failed, but their model of supplying applications remotely became popular a decade later, when it was renamed cloud computing.

Cloud computing encompasses a number of different services. One set of services, sometimes called software as a service (SaaS), involves the supply of a discrete application to outside users. The application can be geared either to business users (such as an accounting application) or to consumers (such as an application for storing and sharing personal photographs). Another set of services, variously called utility computing, grid computing, and hardware as a service (HaaS), involves the provision of computer processing and data storage to outside users, who are able to run their own applications and store their own data on the remote system. A third set of services, sometimes called platform as a service (PaaS), involves the supply of remote computing capacity along with a set of software-development tools for use by outside software programmers.

Early pioneers of cloud computing include Salesforce.com, which supplies a popular business application for managing sales and marketing efforts; Google, Inc., which in addition to its search engine supplies an array of applications, known as Google Apps, to consumers and businesses; and Amazon Web Services, a division of online retailer Amazon.com, which offers access to its computing system to Web-site developers and other companies and individuals. Cloud computing also underpins popular social networks and other online media sites such as Facebook, MySpace, and Twitter. Traditional software companies, including Microsoft Corporation, Apple Inc., Intuit Inc., and Oracle Corporation, have also introduced cloud applications.

Cloud-computing companies either charge users for their services, through subscriptions and usage fees, or provide free access to the services and charge companies for placing advertisements in the services. Because the profitability of cloud services tends to be much lower than the profitability of selling or licensing hardware components and software programs, it is viewed as a potential threat to the businesses of many traditional computing companies.

Construction of the large data centres that run cloud-computing services often requires investments of hundreds of millions of dollars. The centres typically contain thousands of server computers networked together into parallel-processing or grid-computing systems. The centres also often employ sophisticated virtualization technologies, which allow computer systems to be divided into many virtual machines that can be rented temporarily to customers. Because of their intensive use of electricity, the centres are often located near hydroelectric dams or other sources of cheap and plentiful electric power.

Because cloud computing involves the storage of often sensitive personal or commercial information in central database systems run by third parties, it raises concerns about data privacy and security as well as the transmission of data across national boundaries. It also stirs fears about the eventual creation of data monopolies or oligopolies. Some believe that cloud computing will, like other public utilities, come to be heavily regulated by governments.

More:
cloud computing | computer science | Britannica.com

Read More..

Verizon Cloud Computing for Businesses: Cloud Compute …

Cloud Portfolio

Solutions

Why Verizon

Support

Build and secure your IT initiatives on the only platform powered by Verizons global network.

Looking for Verizon Cloud for Mobile Devices? CLICK HERE

Research shows the cloud helps different departments work together more effectively, allowing you to get to market faster.

New Verizon report outlines practical scorecard-based approach to aligning your business applications to the right cloud.

Verizons second annual report reveals that 71 percent of businesses expect to deploy more than half their workloads in the cloud by 2017.

National DCP relies on Verizons IP network, data centers and cloud infrastructure to transform IT operations and efficiently service 7,000 Dunkin Brands franchisees.

Learn More

Leverage Verizons team of experts to help design your cloud and onboard efficiently.

Choose the right cloud solution that is uniquely designed for your industry or workload.

Tailor managed services and support levels to meet each applications needs.

You have big plans for your business. Verizon has the tools to help make it happen. Weve covered the bases, easing your move to the cloud and allowing you to pursue new possibilities faster than ever before. Verizon Cloud allows your enterprise to evolve continuously, focus on core business and remain at the forefront of industry.

Verizon knows that no one solution fits all. That's why we created a cloud that helps you do more.

Learn More

Plan, integrate, implement and manage a successful cloud strategy with Verizon. We'll help you choose from among our comprehensive suite of professional and managed services. And you'll gain from our expertise in enterprise-class cloud, global network and security services.

Take a closer look through the API documentation to see what you can do with Verizon Cloud.

Get all the specs for Verizon Cloud.

Reduce your risk in the cloud with Verizons proven security expertise and insight into an average of 500 million security incidents each year.

Learn More

Regardless of the workload, Verizon Cloud allows you to expand at a moments notice to grow your business with agility while reducing risk.

Learn More

Embrace the cloud with enterprise-class performance and the right amount of support and flexibility to help make you more competitive and successful, faster.

Learn More

In todays technology-based world, it all starts with the network. And when it comes to networks, Verizon has one of the most reliable and secure networks in the world.

Learn More

Sync and save your important photos, videos, contacts, music, call logs and even text messages with Verizon Cloud's secure storage.

2015 Verizon. All Rights Reserved.

Read more:
Verizon Cloud Computing for Businesses: Cloud Compute ...

Read More..

How the Bitcoin protocol actually works | DDI

Many thousands of articles have been written purporting to explain Bitcoin, the online, peer-to-peer currency. Most of those articles give a hand-wavy account of the underlying cryptographic protocol, omitting many details. Even those articles which delve deeper often gloss over crucial points. My aim in this post is to explain the major ideas behind the Bitcoin protocol in a clear, easily comprehensible way. Well start from first principles, build up to a broad theoretical understanding of how the protocol works, and then dig down into the nitty-gritty, examining the raw data in a Bitcoin transaction.

Understanding the protocol in this detailed way is hard work. It is tempting instead to take Bitcoin as given, and to engage in speculation about how to get rich with Bitcoin, whether Bitcoin is a bubble, whether Bitcoin might one day mean the end of taxation, and so on. Thats fun, but severely limits your understanding. Understanding the details of the Bitcoin protocol opens up otherwise inaccessible vistas. In particular, its the basis for understanding Bitcoins built-in scripting language, which makes it possible to use Bitcoin to create new types of financial instruments, such as smart contracts. New financial instruments can, in turn, be used to create new markets and to enable new forms of collective human behaviour. Talk about fun!

Ill describe Bitcoin scripting and concepts such as smart contracts in future posts. This post concentrates on explaining the nuts-and-bolts of the Bitcoin protocol. To understand the post, you need to be comfortable with public key cryptography, and with the closely related idea of digital signatures. Ill also assume youre familiar with cryptographic hashing. None of this is especially difficult. The basic ideas can be taught in freshman university mathematics or computer science classes. The ideas are beautiful, so if youre not familiar with them, I recommend taking a few hours to get familiar.

It may seem surprising that Bitcoins basis is cryptography. Isnt Bitcoin a currency, not a way of sending secret messages? In fact, the problems Bitcoin needs to solve are largely about securing transactions making sure people cant steal from one another, or impersonate one another, and so on. In the world of atoms we achieve security with devices such as locks, safes, signatures, and bank vaults. In the world of bits we achieve this kind of security with cryptography. And thats why Bitcoin is at heart a cryptographic protocol.

My strategy in the post is to build Bitcoin up in stages. Ill begin by explaining a very simple digital currency, based on ideas that are almost obvious. Well call that currency Infocoin, to distinguish it from Bitcoin. Of course, our first version of Infocoin will have many deficiencies, and so well go through several iterations of Infocoin, with each iteration introducing just one or two simple new ideas. After several such iterations, well arrive at the full Bitcoin protocol. We will have reinvented Bitcoin!

This strategy is slower than if I explained the entire Bitcoin protocol in one shot. But while you can understand the mechanics of Bitcoin through such a one-shot explanation, it would be difficult to understand why Bitcoin is designed the way it is. The advantage of the slower iterative explanation is that it gives us a much sharper understanding of each element of Bitcoin.

Finally, I should mention that Im a relative newcomer to Bitcoin. Ive been following it loosely since 2011 (and cryptocurrencies since the late 1990s), but only got seriously into the details of the Bitcoin protocol earlier this year. So Id certainly appreciate corrections of any misapprehensions on my part. Also in the post Ive included a number of problems for the author notes to myself about questions that came up during the writing. You may find these interesting, but you can also skip them entirely without losing track of the main text.

So how can we design a digital currency?

On the face of it, a digital currency sounds impossible. Suppose some person lets call her Alice has some digital money which she wants to spend. If Alice can use a string of bits as money, how can we prevent her from using the same bit string over and over, thus minting an infinite supply of money? Or, if we can somehow solve that problem, how can we prevent someone else forging such a string of bits, and using that to steal from Alice?

These are just two of the many problems that must be overcome in order to use information as money.

As a first version of Infocoin, lets find a way that Alice can use a string of bits as a (very primitive and incomplete) form of money, in a way that gives her at least some protection against forgery. Suppose Alice wants to give another person, Bob, an infocoin. To do this, Alice writes down the message I, Alice, am giving Bob one infocoin. She then digitally signs the message using a private cryptographic key, and announces the signed string of bits to the entire world.

(By the way, Im using capitalized Infocoin to refer to the protocol and general concept, and lowercase infocoin to refer to specific denominations of the currency. A similar useage is common, though not universal, in the Bitcoin world.)

This isnt terribly impressive as a prototype digital currency! But it does have some virtues. Anyone in the world (including Bob) can use Alices public key to verify that Alice really was the person who signed the message I, Alice, am giving Bob one infocoin. No-one else could have created that bit string, and so Alice cant turn around and say No, I didnt mean to give Bob an infocoin. So the protocol establishes that Alice truly intends to give Bob one infocoin. The same fact no-one else could compose such a signed message also gives Alice some limited protection from forgery. Of course, after Alice has published her message its possible for other people to duplicate the message, so in that sense forgery is possible. But its not possible from scratch. These two properties establishment of intent on Alices part, and the limited protection from forgery are genuinely notable features of this protocol.

I havent (quite) said exactly what digital money is in this protocol. To make this explicit: its just the message itself, i.e., the string of bits representing the digitally signed message I, Alice, am giving Bob one infocoin. Later protocols will be similar, in that all our forms of digital money will be just more and more elaborate messages [1].

A problem with the first version of Infocoin is that Alice could keep sending Bob the same signed message over and over. Suppose Bob receives ten copies of the signed message I, Alice, am giving Bob one infocoin. Does that mean Alice sent Bob ten different infocoins? Was her message accidentally duplicated? Perhaps she was trying to trick Bob into believing that she had given him ten different infocoins, when the message only proves to the world that she intends to transfer one infocoin.

What wed like is a way of making infocoins unique. They need a label or serial number. Alice would sign the message I, Alice, am giving Bob one infocoin, with serial number 8740348. Then, later, Alice could sign the message I, Alice, am giving Bob one infocoin, with serial number 8770431, and Bob (and everyone else) would know that a different infocoin was being transferred.

To make this scheme work we need a trusted source of serial numbers for the infocoins. One way to create such a source is to introduce a bank. This bank would provide serial numbers for infocoins, keep track of who has which infocoins, and verify that transactions really are legitimate,

In more detail, lets suppose Alice goes into the bank, and says I want to withdraw one infocoin from my account. The bank reduces her account balance by one infocoin, and assigns her a new, never-before used serial number, lets say 1234567. Then, when Alice wants to transfer her infocoin to Bob, she signs the message I, Alice, am giving Bob one infocoin, with serial number 1234567. But Bob doesnt just accept the infocoin. Instead, he contacts the bank, and verifies that: (a) the infocoin with that serial number belongs to Alice; and (b) Alice hasnt already spent the infocoin. If both those things are true, then Bob tells the bank he wants to accept the infocoin, and the bank updates their records to show that the infocoin with that serial number is now in Bobs possession, and no longer belongs to Alice.

This last solution looks pretty promising. However, it turns out that we can do something much more ambitious. We can eliminate the bank entirely from the protocol. This changes the nature of the currency considerably. It means that there is no longer any single organization in charge of the currency. And when you think about the enormous power a central bank has control over the money supply thats a pretty huge change.

The idea is to make it so everyone (collectively) is the bank. In particular, well assume that everyone using Infocoin keeps a complete record of which infocoins belong to which person. You can think of this as a shared public ledger showing all Infocoin transactions. Well call this ledger the block chain, since thats what the complete record will be called in Bitcoin, once we get to it.

Now, suppose Alice wants to transfer an infocoin to Bob. She signs the message I, Alice, am giving Bob one infocoin, with serial number 1234567, and gives the signed message to Bob. Bob can use his copy of the block chain to check that, indeed, the infocoin is Alices to give. If that checks out then he broadcasts both Alices message and his acceptance of the transaction to the entire network, and everyone updates their copy of the block chain.

We still have the where do serial number come from problem, but that turns out to be pretty easy to solve, and so I will defer it to later, in the discussion of Bitcoin. A more challenging problem is that this protocol allows Alice to cheat by double spending her infocoin. She sends the signed message I, Alice, am giving Bob one infocoin, with serial number 1234567 to Bob, and the messageI, Alice, am giving Charlie one infocoin, with [the same] serial number 1234567 to Charlie. Both Bob and Charlie use their copy of the block chain to verify that the infocoin is Alices to spend. Provided they do this verification at nearly the same time (before theyve had a chance to hear from one another), both will find that, yes, the block chain shows the coin belongs to Alice. And so they will both accept the transaction, and also broadcast their acceptance of the transaction. Now theres a problem. How should other people update their block chains? There may be no easy way to achieve a consistent shared ledger of transactions. And even if everyone can agree on a consistent way to update their block chains, there is still the problem that either Bob or Charlie will be cheated.

At first glance double spending seems difficult for Alice to pull off. After all, if Alice sends the message first to Bob, then Bob can verify the message, and tell everyone else in the network (including Charlie) to update their block chain. Once that has happened, Charlie would no longer be fooled by Alice. So there is most likely only a brief period of time in which Alice can double spend. However, its obviously undesirable to have any such a period of time. Worse, there are techniques Alice could use to make that period longer. She could, for example, use network traffic analysis to find times when Bob and Charlie are likely to have a lot of latency in communication. Or perhaps she could do something to deliberately disrupt their communications. If she can slow communication even a little that makes her task of double spending much easier.

How can we address the problem of double spending? The obvious solution is that when Alice sends Bob an infocoin, Bob shouldnt try to verify the transaction alone. Rather, he should broadcast the possible transaction to the entire network of Infocoin users, and ask them to help determine whether the transaction is legitimate. If they collectively decide that the transaction is okay, then Bob can accept the infocoin, and everyone will update their block chain. This type of protocol can help prevent double spending, since if Alice tries to spend her infocoin with both Bob and Charlie, other people on the network will notice, and network users will tell both Bob and Charlie that there is a problem with the transaction, and the transaction shouldnt go through.

In more detail, lets suppose Alice wants to give Bob an infocoin. As before, she signs the message I, Alice, am giving Bob one infocoin, with serial number 1234567, and gives the signed message to Bob. Also as before, Bob does a sanity check, using his copy of the block chain to check that, indeed, the coin currently belongs to Alice. But at that point the protocol is modified. Bob doesnt just go ahead and accept the transaction. Instead, he broadcasts Alices message to the entire network. Other members of the network check to see whether Alice owns that infocoin. If so, they broadcast the message Yes, Alice owns infocoin 1234567, it can now be transferred to Bob. Once enough people have broadcast that message, everyone updates their block chain to show that infocoin 1234567 now belongs to Bob, and the transaction is complete.

This protocol has many imprecise elements at present. For instance, what does it mean to say once enough people have broadcast that message? What exactly does enough mean here? It cant mean everyone in the network, since we dont a priori know who is on the Infocoin network. For the same reason, it cant mean some fixed fraction of users in the network. We wont try to make these ideas precise right now. Instead, in the next section Ill point out a serious problem with the approach as described. Fixing that problem will at the same time have the pleasant side effect of making the ideas above much more precise.

Suppose Alice wants to double spend in the network-based protocol I just described. She could do this by taking over the Infocoin network. Lets suppose she uses an automated system to set up a large number of separate identities, lets say a billion, on the Infocoin network. As before, she tries to double spend the same infocoin with both Bob and Charlie. But when Bob and Charlie ask the network to validate their respective transactions, Alices sock puppet identities swamp the network, announcing to Bob that theyve validated his transaction, and to Charlie that theyve validated his transaction, possibly fooling one or both into accepting the transaction.

Theres a clever way of avoiding this problem, using an idea known as proof-of-work. The idea is counterintuitive and involves a combination of two ideas: (1) to (artificially) make it computationally costly for network users to validate transactions; and (2) to reward them for trying to help validate transactions. The reward is used so that people on the network will try to help validate transactions, even though thats now been made a computationally costly process. The benefit of making it costly to validate transactions is that validation can no longer be influenced by the number of network identities someone controls, but only by the total computational power they can bring to bear on validation. As well see, with some clever design we can make it so a cheater would need enormous computational resources to cheat, making it impractical.

Thats the gist of proof-of-work. But to really understand proof-of-work, we need to go through the details.

Suppose Alice broadcasts to the network the news that I, Alice, am giving Bob one infocoin, with serial number 1234567.

As other people on the network hear that message, each adds it to a queue of pending transactions that theyve been told about, but which havent yet been approved by the network. For instance, another network user named David might have the following queue of pending transactions:

I, Tom, am giving Sue one infocoin, with serial number 1201174.

I, Sydney, am giving Cynthia one infocoin, with serial number 1295618.

I, Alice, am giving Bob one infocoin, with serial number 1234567.

David checks his copy of the block chain, and can see that each transaction is valid. He would like to help out by broadcasting news of that validity to the entire network.

However, before doing that, as part of the validation protocol David is required to solve a hard computational puzzle the proof-of-work. Without the solution to that puzzle, the rest of the network wont accept his validation of the transaction.

What puzzle does David need to solve? To explain that, let be a fixed hash function known by everyone in the network its built into the protocol. Bitcoin uses the well-known SHA-256 hash function, but any cryptographically secure hash function will do. Lets give Davids queue of pending transactions a label, , just so its got a name we can refer to. Suppose David appends a number (called the nonce) to and hashes the combination. For example, if we use Hello, world! (obviously this is not a list of transactions, just a string used for illustrative purposes) and the nonce then (output is in hexadecimal)

The puzzle David has to solve the proof-of-work is to find a nonce such that when we append to and hash the combination the output hash begins with a long run of zeroes. The puzzle can be made more or less difficult by varying the number of zeroes required to solve the puzzle. A relatively simple proof-of-work puzzle might require just three or four zeroes at the start of the hash, while a more difficult proof-of-work puzzle might require a much longer run of zeros, say 15 consecutive zeroes. In either case, the above attempt to find a suitable nonce, with , is a failure, since the output doesnt begin with any zeroes at all. Trying doesnt work either:

We can keep trying different values for the nonce, . Finally, at we obtain:

This nonce gives us a string of four zeroes at the beginning of the output of the hash. This will be enough to solve a simple proof-of-work puzzle, but not enough to solve a more difficult proof-of-work puzzle.

What makes this puzzle hard to solve is the fact that the output from a cryptographic hash function behaves like a random number: change the input even a tiny bit and the output from the hash function changes completely, in a way thats hard to predict. So if we want the output hash value to begin with 10 zeroes, say, then David will need, on average, to try different values for before he finds a suitable nonce. Thats a pretty challenging task, requiring lots of computational power.

Obviously, its possible to make this puzzle more or less difficult to solve by requiring more or fewer zeroes in the output from the hash function. In fact, the Bitcoin protocol gets quite a fine level of control over the difficulty of the puzzle, by using a slight variation on the proof-of-work puzzle described above. Instead of requiring leading zeroes, the Bitcoin proof-of-work puzzle requires the hash of a blocks header to be lower than or equal to a number known as the target. This target is automatically adjusted to ensure that a Bitcoin block takes, on average, about ten minutes to validate.

(In practice there is a sizeable randomness in how long it takes to validate a block sometimes a new block is validated in just a minute or two, other times it may take 20 minutes or even longer. Its straightforward to modify the Bitcoin protocol so that the time to validation is much more sharply peaked around ten minutes. Instead of solving a single puzzle, we can require that multiple puzzles be solved; with some careful design it is possible to considerably reduce the variance in the time to validate a block of transactions.)

Alright, lets suppose David is lucky and finds a suitable nonce, . Celebration! (Hell be rewarded for finding the nonce, as described below). He broadcasts the block of transactions hes approving to the network, together with the value for . Other participants in the Infocoin network can verify that is a valid solution to the proof-of-work puzzle. And they then update their block chains to include the new block of transactions.

For the proof-of-work idea to have any chance of succeeding, network users need an incentive to help validate transactions. Without such an incentive, they have no reason to expend valuable computational power, merely to help validate other peoples transactions. And if network users are not willing to expend that power, then the whole system wont work. The solution to this problem is to reward people who help validate transactions. In particular, suppose we reward whoever successfully validates a block of transactions by crediting them with some infocoins. Provided the infocoin reward is large enough that will give them an incentive to participate in validation.

In the Bitcoin protocol, this validation process is called mining. For each block of transactions validated, the successful miner receives a bitcoin reward. Initially, this was set to be a 50 bitcoin reward. But for every 210,000 validated blocks (roughly, once every four years) the reward halves. This has happened just once, to date, and so the current reward for mining a block is 25 bitcoins. This halving in the rate will continue every four years until the year 2140 CE. At that point, the reward for mining will drop below bitcoins per block. bitcoins is actually the minimal unit of Bitcoin, and is known as a satoshi. So in 2140 CE the total supply of bitcoins will cease to increase. However, that wont eliminate the incentive to help validate transactions. Bitcoin also makes it possible to set aside some currency in a transaction as a transaction fee, which goes to the miner who helps validate it. In the early days of Bitcoin transaction fees were mostly set to zero, but as Bitcoin has gained in popularity, transaction fees have gradually risen, and are now a substantial additional incentive on top of the 25 bitcoin reward for mining a block.

You can think of proof-of-work as a competition to approve transactions. Each entry in the competition costs a little bit of computing power. A miners chance of winning the competition is (roughly, and with some caveats) equal to the proportion of the total computing power that they control. So, for instance, if a miner controls one percent of the computing power being used to validate Bitcoin transactions, then they have roughly a one percent chance of winning the competition. So provided a lot of computing power is being brought to bear on the competition, a dishonest miner is likely to have only a relatively small chance to corrupt the validation process, unless they expend a huge amount of computing resources.

Of course, while its encouraging that a dishonest party has only a relatively small chance to corrupt the block chain, thats not enough to give us confidence in the currency. In particular, we havent yet conclusively addressed the issue of double spending.

Ill analyse double spending shortly. Before doing that, I want to fill in an important detail in the description of Infocoin. Wed ideally like the Infocoin network to agree upon the order in which transactions have occurred. If we dont have such an ordering then at any given moment it may not be clear who owns which infocoins. To help do this well require that new blocks always include a pointer to the last block validated in the chain, in addition to the list of transactions in the block. (The pointer is actually just a hash of the previous block). So typically the block chain is just a linear chain of blocks of transactions, one after the other, with later blocks each containing a pointer to the immediately prior block:

Occasionally, a fork will appear in the block chain. This can happen, for instance, if by chance two miners happen to validate a block of transactions near-simultaneously both broadcast their newly-validated block out to the network, and some people update their block chain one way, and others update their block chain the other way:

This causes exactly the problem were trying to avoid its no longer clear in what order transactions have occurred, and it may not be clear who owns which infocoins. Fortunately, theres a simple idea that can be used to remove any forks. The rule is this: if a fork occurs, people on the network keep track of both forks. But at any given time, miners only work to extend whichever fork is longest in their copy of the block chain.

Suppose, for example, that we have a fork in which some miners receive block A first, and some miners receive block B first. Those miners who receive block A first will continue mining along that fork, while the others will mine along fork B. Lets suppose that the miners working on fork B are the next to successfully mine a block:

After they receive news that this has happened, the miners working on fork A will notice that fork B is now longer, and will switch to working on that fork. Presto, in short order work on fork A will cease, and everyone will be working on the same linear chain, and block A can be ignored. Of course, any still-pending transactions in A will still be pending in the queues of the miners working on fork B, and so all transactions will eventually be validated.

Likewise, it may be that the miners working on fork A are the first to extend their fork. In that case work on fork B will quickly cease, and again we have a single linear chain.

No matter what the outcome, this process ensures that the block chain has an agreed-upon time ordering of the blocks. In Bitcoin proper, a transaction is not considered confirmed until: (1) it is part of a block in the longest fork, and (2) at least 5 blocks follow it in the longest fork. In this case we say that the transaction has 6 confirmations. This gives the network time to come to an agreed-upon the ordering of the blocks. Well also use this strategy for Infocoin.

With the time-ordering now understood, lets return to think about what happens if a dishonest party tries to double spend. Suppose Alice tries to double spend with Bob and Charlie. One possible approach is for her to try to validate a block that includes both transactions. Assuming she has one percent of the computing power, she will occasionally get lucky and validate the block by solving the proof-of-work. Unfortunately for Alice, the double spending will be immediately spotted by other people in the Infocoin network and rejected, despite solving the proof-of-work problem. So thats not something we need to worry about.

A more serious problem occurs if she broadcasts two separate transactions in which she spends the same infocoin with Bob and Charlie, respectively. She might, for example, broadcast one transaction to a subset of the miners, and the other transaction to another set of miners, hoping to get both transactions validated in this way. Fortunately, in this case, as weve seen, the network will eventually confirm one of these transactions, but not both. So, for instance, Bobs transaction might ultimately be confirmed, in which case Bob can go ahead confidently. Meanwhile, Charlie will see that his transaction has not been confirmed, and so will decline Alices offer. So this isnt a problem either. In fact, knowing that this will be the case, there is little reason for Alice to try this in the first place.

An important variant on double spending is if Alice = Bob, i.e., Alice tries to spend a coin with Charlie which she is also spending with herself (i.e., giving back to herself). This sounds like it ought to be easy to detect and deal with, but, of course, its easy on a network to set up multiple identities associated with the same person or organization, so this possibility needs to be considered. In this case, Alices strategy is to wait until Charlie accepts the infocoin, which happens after the transaction has been confirmed 6 times in the longest chain. She will then attempt to fork the chain before the transaction with Charlie, adding a block which includes a transaction in which she pays herself:

Unfortunately for Alice, its now very difficult for her to catch up with the longer fork. Other miners wont want to help her out, since theyll be working on the longer fork. And unless Alice is able to solve the proof-of-work at least as fast as everyone else in the network combined roughly, that means controlling more than fifty percent of the computing power then she will just keep falling further and further behind. Of course, she might get lucky. We can, for example, imagine a scenario in which Alice controls one percent of the computing power, but happens to get lucky and finds six extra blocks in a row, before the rest of the network has found any extra blocks. In this case, she might be able to get ahead, and get control of the block chain. But this particular event will occur with probability . A more general analysis along these lines shows that Alices probability of ever catching up is infinitesimal, unless she is able to solve proof-of-work puzzles at a rate approaching all other miners combined.

Of course, this is not a rigorous security analysis showing that Alice cannot double spend. Its merely an informal plausibility argument. The original paper introducing Bitcoin did not, in fact, contain a rigorous security analysis, only informal arguments along the lines Ive presented here. The security community is still analysing Bitcoin, and trying to understand possible vulnerabilities. You can see some of this research listed here, and I mention a few related problems in the Problems for the author below. At this point I think its fair to say that the jury is still out on how secure Bitcoin is.

The proof-of-work and mining ideas give rise to many questions. How much reward is enough to persuade people to mine? How does the change in supply of infocoins affect the Infocoin economy? Will Infocoin mining end up concentrated in the hands of a few, or many? If its just a few, doesnt that endanger the security of the system? Presumably transaction fees will eventually equilibriate wont this introduce an unwanted source of friction, and make small transactions less desirable? These are all great questions, but beyond the scope of this post. I may come back to the questions (in the context of Bitcoin) in a future post. For now, well stick to our focus on understanding how the Bitcoin protocol works.

Lets move away from Infocoin, and describe the actual Bitcoin protocol. There are a few new ideas here, but with one exception (discussed below) theyre mostly obvious modifications to Infocoin.

To use Bitcoin in practice, you first install a wallet program on your computer. To give you a sense of what that means, heres a screenshot of a wallet called Multbit. You can see the Bitcoin balance on the left 0.06555555 Bitcoins, or about 70 dollars at the exchange rate on the day I took this screenshot and on the right two recent transactions, which deposited those 0.06555555 Bitcoins:

Suppose youre a merchant who has set up an online store, and youve decided to allow people to pay using Bitcoin. What you do is tell your wallet program to generate a Bitcoin address. In response, it will generate a public / private key pair, and then hash the public key to form your Bitcoin address:

You then send your Bitcoin address to the person who wants to buy from you. You could do this in email, or even put the address up publicly on a webpage. This is safe, since the address is merely a hash of your public key, which can safely be known by the world anyway. (Ill return later to the question of why the Bitcoin address is a hash, and not just the public key.)

The person who is going to pay you then generates a transaction. Lets take a look at the data from an actual transaction transferring bitcoins. Whats shown below is very nearly the raw data. Its changed in three ways: (1) the data has been deserialized; (2) line numbers have been added, for ease of reference; and (3) Ive abbreviated various hashes and public keys, just putting in the first six hexadecimal digits of each, when in reality they are much longer. Heres the data:

Lets go through this, line by line.

Line 1 contains the hash of the remainder of the transaction, 7c4025..., expressed in hexadecimal. This is used as an identifier for the transaction.

Line 2 tells us that this is a transaction in version 1 of the Bitcoin protocol.

Lines 3 and 4 tell us that the transaction has one input and one output, respectively. Ill talk below about transactions with more inputs and outputs, and why thats useful.

Line 5 contains the value for lock_time, which can be used to control when a transaction is finalized. For most Bitcoin transactions being carried out today the lock_time is set to 0, which means the transaction is finalized immediately.

Line 6 tells us the size (in bytes) of the transaction. Note that its not the monetary amount being transferred! That comes later.

Lines 7 through 11 define the input to the transaction. In particular, lines 8 through 10 tell us that the input is to be taken from the output from an earlier transaction, with the given hash, which is expressed in hexadecimal as 2007ae.... The n=0 tells us its to be the first output from that transaction; well see soon how multiple outputs (and inputs) from a transaction work, so dont worry too much about this for now. Line 11 contains the signature of the person sending the money, 304502..., followed by a space, and then the corresponding public key, 04b2d.... Again, these are both in hexadecimal.

One thing to note about the input is that theres nothing explicitly specifying how many bitcoins from the previous transaction should be spent in this transaction. In fact, all the bitcoins from the n=0th output of the previous transaction are spent. So, for example, if the n=0th output of the earlier transaction was 2 bitcoins, then 2 bitcoins will be spent in this transaction. This seems like an inconvenient restriction like trying to buy bread with a 20 dollar note, and not being able to break the note down. The solution, of course, is to have a mechanism for providing change. This can be done using transactions with multiple inputs and outputs, which well discuss in the next section.

Lines 12 through 14 define the output from the transaction. In particular, line 13 tells us the value of the output, 0.319 bitcoins. Line 14 is somewhat complicated. The main thing to note is that the string a7db6f... is the Bitcoin address of the intended recipient of the funds (written in hexadecimal). In fact, Line 14 is actually an expression in Bitcoins scripting language. Im not going to describe that language in detail in this post, the important thing to take away now is just that a7db6f... is the Bitcoin address.

You can now see, by the way, how Bitcoin addresses the question I swept under the rug in the last section: where do Bitcoin serial numbers come from? In fact, the role of the serial number is played by transaction hashes. In the transaction above, for example, the recipient is receiving 0.319 Bitcoins, which come out of the first output of an earlier transaction with hash 2007ae... (line 9). If you go and look in the block chain for that transaction, youd see that its output comes from a still earlier transaction. And so on.

There are two clever things about using transaction hashes instead of serial numbers. First, in Bitcoin theres not really any separate, persistent coins at all, just a long series of transactions in the block chain. Its a clever idea to realize that you dont need persistent coins, and can just get by with a ledger of transactions. Second, by operating in this way we remove the need for any central authority issuing serial numbers. Instead, the serial numbers can be self-generated, merely by hashing the transaction.

In fact, its possible to keep following the chain of transactions further back in history. Ultimately, this process must terminate. This can happen in one of two ways. The first possibilitty is that youll arrive at the very first Bitcoin transaction, contained in the so-called Genesis block. This is a special transaction, having no inputs, but a 50 Bitcoin output. In other words, this transaction establishes an initial money supply. The Genesis block is treated separately by Bitcoin clients, and I wont get into the details here, although its along similar lines to the transaction above. You can see the deserialized raw data here, and read about the Genesis block here.

The second possibility when you follow a chain of transactions back in time is that eventually youll arrive at a so-called coinbase transaction. With the exception of the Genesis block, every block of transactions in the block chain starts with a special coinbase transaction. This is the transaction rewarding the miner who validated that block of transactions. It uses a similar but not identical format to the transaction above. I wont go through the format in detail, but if you want to see an example, see here. You can read a little more about coinbase transactions here.

Something I havent been precise about above is what exactly is being signed by the digital signature in line 11. The obvious thing to do is for the payer to sign the whole transaction (apart from the transaction hash, which, of course, must be generated later). Currently, this is not what is done some pieces of the transaction are omitted. This makes some pieces of the transaction malleable, i.e., they can be changed later. However, this malleability does not include the amounts being paid out, senders and recipients, which cant be changed later. I must admit I havent dug down into the details here. I gather that this malleability is under discussion in the Bitcoin developer community, and there are efforts afoot to reduce or eliminate this malleability.

In the last section I described how a transaction with a single input and a single output works. In practice, its often extremely convenient to create Bitcoin transactions with multiple inputs or multiple outputs. Ill talk below about why this can be useful. But first lets take a look at the data from an actual transaction:

Lets go through the data, line by line. Its very similar to the single-input-single-output transaction, so Ill do this pretty quickly.

Line 1 contains the hash of the remainder of the transaction. This is used as an identifier for the transaction.

Line 2 tells us that this is a transaction in version 1 of the Bitcoin protocol.

Lines 3 and 4 tell us that the transaction has three inputs and two outputs, respectively.

Line 5 contains the lock_time. As in the single-input-single-output case this is set to 0, which means the transaction is finalized immediately.

Line 6 tells us the size of the transaction in bytes.

Lines 7 through 19 define a list of the inputs to the transaction. Each corresponds to an output from a previous Bitcoin transaction.

The first input is defined in lines 8 through 11.

In particular, lines 8 through 10 tell us that the input is to be taken from the n=0th output from the transaction with hash 3beabc.... Line 11 contains the signature, followed by a space, and then the public key of the person sending the bitcoins.

Lines 12 through 15 define the second input, with a similar format to lines 8 through 11. And lines 16 through 19 define the third input.

Lines 20 through 24 define a list containing the two outputs from the transaction.

The first output is defined in lines 21 and 22. Line 21 tells us the value of the output, 0.01068000 bitcoins. As before, line 22 is an expression in Bitcoins scripting language. The main thing to take away here is that the string e8c30622... is the Bitcoin address of the intended recipient of the funds.

The second output is defined lines 23 and 24, with a similar format to the first output.

Go here to see the original:
How the Bitcoin protocol actually works | DDI

Read More..

mining – Is there an altcoin that is only feasible to mine …

Either you had a very good idea, some years behind, or you read about Litecoin and wanted to be answered with its name 🙂

In principle it's impossible to design an algorithm that can only be run on a generalistic CPU installed in a normal computer - you can always design purpose-specific hardware for whatever application though normally this is limited by cost-benefit reasons.

Litecoin's designers' decision to use scrypt rather than SHA-256 was precisely because they wanted mining not to be over-taken by GPUs. In the end this was a partial defeat, since GPUs do can be used to mine scrypt-based crypto-currencies, albeit the efficiencies vs. CPUs are not as enormous as with SHA-256: a GPU is between some dozens to a hundred times more efficient than a CPU, rather than several thousands more efficient.

The reason is scrypt forces you to either have large amounts of memory or be able to re-compute previous values of the hash function rapidly, thus making GPUs way less efficient for this and complicating the design of an ASIC.

Primecoin's algorithm (looking for Cullingham chains of prime-numbers) can only be done right now by a CPU. Should this ber-neue crypto-currency rise as sharply in value as Bitcoin, you could see a new generation of purpose-specific chips designed solely to look for prime numbers (or to test the primality of one), which would mean the end of CPU-mining for it as well as have a deep impact both on scientific and security computing (for the good and bad, respectively).

Go here to see the original:
mining - Is there an altcoin that is only feasible to mine ...

Read More..

The Altcoin Guys – Cryptocurrency Development

We are The Altcoin Guys and we offer a range of cryptocurrency development services.

We offer a range of coin packages allowing you to create your own cryptocurrency. We offer a range of Algorithims including X15 and Scrypt as well as options regarding Proof of Work(Pow) and Proof of Stake(Pos). All our coin packages come with source code, GUI (Qt) wallets and free basic website. Also, we can easily customize any package to meet your requirements.

We are proud to offer a great block explorer solution. As standard all our block explorers come with a extensive searching function, rich list, coin type detection (Pow,Pos etc.) , Transaction and Difficulty Charts and Exchange price extraction. The Block explorer is hosted on our servers and everything setup by us. All you need to do is provide us with your source code and basic info regarding your coin.

We have an Android wallet and Web wallet creation service. Each service customizes the code to suite your coin in-order to create a ready-to-use Android or Web wallet. All are very well designed and will be much used by your community.

Our coin customization service helps you add new features to existing cryptocurrencies. We offer a range of services including adding anonymous transactions and custom wallet GUIs. Even if your looking for a customization not listed still message us.

For a very affordable price we will run a Node on our high performance VPS , 24/7 . Your community will be able to establish a connection with your altcoin network at all times. We also handle all the setup , all we need is a link to your coins source code.

View post:
The Altcoin Guys - Cryptocurrency Development

Read More..

Cloud Computing – Houston, Sugar Land, Pasadena | Truewater

Cloud Computing Services from Truewater allows you to take advantage of a powerful enterprise class networking infrastructure. Formerly this type of computing power was financially beyond the reach of small and medium sized companies. But today, Truewaters cloud computing gives you many advantages over traditional on-site servers.

It can be tempting to put off replacing aging hardware because of the expensive outlay of capital. In traditional computing, server and computer equipment upgrades can take a sizeable chunk out of cash flow. But with Truewaters cloud alternative, not only will you get far superior equipment; you can do it without the capital outlay. So now you dont need to put off server upgrades. When you delay replacing old servers, you increase the risk of server crashes.

Cloud computing can allow users to access data from home or on the road giving your staff greater mobility and productivity. During natural disasters, this mobility can keep your company functioning. Because you will be accessing data over the Internet, fast and redundant Internet connections streamline cloud computing. In the Houston market fast Internet access is usually readily available.

With traditional on-site servers, you must know what your computing requirements will be for the next three to five years. If you over estimate your growth, you end up spending too much, but if you under estimate, you end up with inadequate computing power. Scalability is one of the great advantages of cloud computing. As your staff grows or shrinks, you can add or decrease your computer usage.

Surprisingly we have found that electricity is not a constant in many Houston office buildings or business complexes. Server reboots and outages from power fluctuations and surges are common. Additionally, keeping server equipment at the ideal temperature can be challenging in office environments. These challenges disappear with cloud computing because your data will be located in highly secure first class data centers.

Truewater cloud computing services will give you higher availability and redundancy than you have ever experienced with traditional on-site network infrastructure. You wont need to spend additional money on IT support because all the IT services you need can be provided with your cloud computing.

Contact Truewater today to find out more about cloud computing services for your Houston company. (713) 869-0001 Ext. 5

We provide a range of Computer Support, Network Services and IT Consulting in Houston, Sugar Land, Pasadena, Baytown, Spring, Kingwood, The Woodlands, Pearland and Bellaire.

Excerpt from:
Cloud Computing - Houston, Sugar Land, Pasadena | Truewater

Read More..

Data Center | Cloud Computing | Colocation

The Meriplex data centers in Houston, Austin, Chicago and Las Vegas offer a suite of complete solutions for colocation and disaster recovery for businesses seeking to locate vital infrastructure within a secure data center. Our state-of-the-art proven technologies, extend our customers a high level of comfort knowing their equipment is stored in the best possible environment.

To provide business enterprises with a professional, reliable and safe environment, our colocations are efficient and acutely technologically advanced. With a demonstrated record for providing the highest quality of housing for IT equipment to its customers, the data centers are SSAE 16 Audited.

Meriplex understands that housing critical infrastructure in a tough, durable, robust, secure environment is an absolute must in todays business climate. Our data centers are located in carrier buildings with physically diverse dual power grid feeds paired with dual generator backups and redundant air conditioning. The Meriplex data centers in Houston, Austin, Chicago and Las Vegas are the market leaders in collocation, with state-of-the art raised floors, FM-200/dry-pipe pre-action water based fire protection with a redundant water supply, and SSAE 16 audited certification. With 24/7 staff ready to provide service to any customer needing remote assistance and additional security, Meriplex provides a 99.999% uptime SLA ensuring our customers peace of mind that their data is secure.

Our wide-ranging colocation services 24/7/365 offerings include:

When customers couple Meriplex colocation services with our MCS Mission Critical Surveillance Support System they are provided with network monitoring and computer network support from our Houston network operations center while their entire voice, data, internet and networking operations are being managed and monitored 24/7/365.

Link:
Data Center | Cloud Computing | Colocation

Read More..

Beginner’s Guide to Mining Bitcoin

One of the biggest problems I ran into when I was looking to start mining Bitcoin for investment and profit was most of the sites were written for the advanced user. I am not a professional coder, I have no experience with Ubuntu, Linux and minimal experience with Mac. So, this is for the individual or group that wants to get started the easy way.

First thing you need to do is get a Bitcoin Wallet. Because Bitcoin is an internet based currency, you need a place to keep your Bitcoins. Got to http://www.bitcoin.org and download the Bitcoin client for your Operating System. Install it the client will begin to download the blockchain. Downloading the blockchain can take a long time and will be over 6GB of data. If you have data caps, I would recommend ordering a copy of the blockchain on DVD to keep from going over as it is growing exponentially. Click to order the bitcoin blockchain by mail. Once the client is up to date, click New to get your wallet address. It will be a long sequence of letters and numbers. One of most important things you can do is make sure you have a copy of the wallet.dat file on a thumb drive and print a copy out and keep it in a safe location. You can view a tutorial on how to create a secure wallet by clicking the link on the top of the page. The reason is that if you computer crashes and you do not have a copy of your wallet.dat file, you will lose all of your Bitcoins. They wont go to someone else, they will disappear forever. It is like burning cash.

Now that you have a wallet and the client, you are probably roaring to go, but if you actually want to make Bitcoin (money), you probably need to join a pool. A pool is a group that combines their computing power to make more Bitcoins. The reason you shouldnt go it alone is that Bitcoins are awarded in blocks, usually 50 at a time, and unless you get extremely lucky, you will not be getting any of those coins. In a pool, you are given smaller and easier algorithms to solve and all of your combined work will make you more likely to solve the bigger algorithm and earn Bitcoins that are spread out throughout the pool based on your contribution. Basically, you will make a more consistent amount of Bitcoins and will be more likely to receive a good return on your investment.

The pool that Im involved in is called Slushs Pool so I will be giving instructions on how to join there but feel free to look at other options. Follow the link to go to their site and click the Sign up here link at the top of their site and follow their step by step instructions. After you have your account set up, you will need to add a Worker. Basically, for every miner that you have running, you will need to have a worker ID so the pool can keep track of your contributions.

If you are mining with an ASIC, please go to our Mining with ASICs page. The following will only pertain to GPU miners.

Most of the mining programs out there are pretty complicated to setup and will frustrate your average user. Recently a great program has come out to get the most basic of users started. The program is called GUIMiner. Click the link and download the program (Be careful, some of the ads are set up to look like the file download). Install and run the program and add in your information from Slushs Pool. Remember that the user name is actually the worker name. The worker name will be your user name, dot, worker ID (username.worker ID) and the password from that worker ID.

Mac users should look into using Astroid

Now that you are set up, you can start mining. If you feel like you want to make more Bitcoins, you might want to invest in mining hardware.

To see how much your current hardware will earn mining Bitcoins, head over to the Bitcoin Profitability Calculator.

If you found this information helpful, please donate to 1G1ehppEgjiFTUSHFz2xs9KLSQuWLPYF2o

See original here:
Beginner's Guide to Mining Bitcoin

Read More..

Fundraising Script,Crowd Funding Script,Crowdfunding …

What is fundraising?

Fundraising has been typically associated with the non-profit organizations; it is an act of collecting money for various non-profit organizations that serve different purposes and help the society. However, today, it has a new definition. Fundraising is not only limited for social services or causes. Even for business purposes, fundraising can be a great idea for the improvement and betterment of new business plans and functions.

Why us?

Rockers Technologies has already created the solution for fundraising. Anyone intends to raise funds for any cause can buy this solution from us to see rocketing change in incoming funds. One can directly start own website with this solution. More than 2 years of experience in this segment and pool of experienced and skillful developers help us to bring changes in the fundraising script in case client needs some updates. We understand that each client has different objectives so we offer customized solution. You tell us your objectives, and we will come up with modified script that suits your requirements.

See the article here:
Fundraising Script,Crowd Funding Script,Crowdfunding ...

Read More..

Ripple, a Cryptocurrency Company, Wants to Rewire Bank …

A digital-currency company thinks it can protect the personal information used to perform identity checks in the financial industry.

Companies built around Bitcoin and other digital currencies mostly focus on storing and transferring money. But at least one company is trying to prove that some of the underlying technology can have a much wider impact on the financial industry.

That startup, Ripple Labs, has already had some success persuading banks to use its Bitcoin-inspired protocol to speed up money transfers made in any currency, especially across borders (see 50 Smartest Companies 2014: Ripple Labs). Now it is building a system that uses some similar cryptographic tricks to improve the way financial companies check the identity of their customers. The system could also provide a more secure way to log in to other online services.

Verifying identity is a constant, expensive headache for financial institutions, which are bound by strict regulations designed to curtail money laundering and support for blacklisted organizations such as terrorist groups. Most banks turn to one of a handful of large data brokers, such as Experian or Acxiom, to power their ID checks. When you open a new account, a bank gathers key personal information and sends it to its broker to verify your identity, and to confirm that you arent on any block list.

Under Ripples system, the same basic process would take place. However, your personal information would be used to generate a unique cryptographic token. A bank could send the token to a data broker that has its own token, made using your personal information at an earlier time. The math underpinning Ripples system would allow the broker to confirm that the data you had given the bank was correct, without either the bank or the broker ever revealing the data itself.

Apples mobile payment technology uses similar technology to protect credit card numbers (see 10 Breakthrough Technologies 2015: Apple Pay). When you use Apple Pay, only a cryptographic token representing your credit card number is transferred to the merchant. That token can be used to charge your card, but it wont reveal anything to anyone who manages to steal it, and it cannot be reused.

Stefan Thomas, chief technology officer of Ripple, says its ID verification system should reduce the risk that personal data will be stolen or accidentally leaked and should also be faster than the systems used today, which have developed gradually over decades and still use outdated technology. He says Ripple decided to develop the technology after it became clear that the financial system needed more than just new ways to transfer money.

Thomas adds that by cutting costs and security risks, Ripples system might allow cheaper data brokers to emerge. It could also make it easier for banks to operate in poorer parts of the world, where verification systems can be particularly expensive to operate, even for U.S. banks, he says. And Ripples engineers are also working on ways their protocol can be used to log in to online services.

Sarah Jane Hughes, a law professor at Indiana University who specializes in payment systems, says Ripple has identified a legitimate opportunity. Companies spend a lot on complying with identity verification rules, and mistakes are expensive, she says. For example, PayPal agreed to pay $7.7 million to the U.S. Treasury last week for failing to block just under 500 transactions involving people subject to U.S. sanctions. If you could do verification more rapidly and with a greater degree of certainty, it would be hugely valuable, says Hughes.

However, Hughes says, switching to a new system would not be easy for most financial institutions. They would probably have to retain the old system for some time for compatibility reasons. That means Ripples idea would have to deliver significant benefits to gain traction.

View original post here:
Ripple, a Cryptocurrency Company, Wants to Rewire Bank ...

Read More..