QUESTS
0
the administration’s report has come under withering scrutiny from Dr. Theodore Postol, a professor emeritus of science, technology, and national-security policy at the Massachusetts Institute of Technology, who once served as a scientific adviser to the chief of naval operations at the Pentagon.
06/27/17
0
The Bitcoin Gold fork is projected to take place on October 23rd. Information about this fork has been limited and there are concerns about its security and stability. As a result, we do not believe it is safe to allow support for Bitcoin Gold at this time. If the blockchain proves to be secure and valuable, Coinbase may choose to support it.
10/30/17
PARENT
metamitya
metamitya
the problem is that the author lists many differences that are not obviously genetic and may very well be caused by culture.
0
metamitya
metamitya
it enforces a culture which in some ways pigeonholes women and then uses those pigeonholes as justification for continuing the culture.
08/05/17
PARENT
metamitya
metamitya
the tech industry is battling a workforce gender imbalance. google has 20% female tech employees. tech companies are working to improve this ratio.
0
metamitya
metamitya
there is evidence of this happening now in diversity and gender administration.
08/05/17
PARENT
metamitya
metamitya
Utility Tokens: fuel to access the capabilities of a network with a specific use case like a decentralized exchange or prediction market.
0
metamitya
metamitya
omise go
05/22/18
PARENT
metamitya
metamitya
@knovigator lets you remember what you learn online by saving the questions you have and the answers you find
0
metamitya
metamitya
search annotations are searches that you launch about something you've read, it's kinda like annotating the web with reddit threads
09/25/17
1
ranndino
ranndino
I also find it intellectually dishonest for Gizmodo to strip the memo of all the supporting graphs and links.
08/09/17
0
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers.
06/05/17
PARENT
cryptograf
cryptograf
community
0
cryptograf
cryptograf
how willing and able are they to entertain and effectively counter critiques?
04/18/18
PARENT
cryptograf
cryptograf
development
0
cryptograf
cryptograf
development schedule
05/08/18
0
cryptograf
cryptograf
amount of hashing power: indicates how expensive it would be to 51% attack the network
05/08/18