Page 9«..891011..2030..»

Bitcoin USD – BTCUSD Overview – MarketWatch

Breaking Square earnings beat expectations, expected to top $1 billion in revenue in 2018

Square Inc. reported fourth-quarter earnings that beat expectations Tuesday, and projected that it will collect more than $1 billion in adjusted revenue in 2018 for the first time. The payments company reported a net loss of $16 million, or 4 cents a share, on net revenue of $616 million. After adjusting revenue for the costs of performing monetary transactions and earnings for stock-based compensation and other effects, Square claimed profit of 8 cents a share on revenue of $282.7 million. Analysts on average expected Square to report adjusted earnings of 7 cents a share on sales of $266.5 million, according to FactSet. In the same quarter a year ago, Square reported adjusted earnings of 5 cents a share on adjusted revenue of $191.9 million. Square also beat analysts’ expectations with its forecast, which called for the company’s first year topping $1 billion in adjusted revenue, after falling just short in 2017 with $984 million. The company expects adjusted profit of 43 cents to 47 cents a share on adjusted revenue of $1.3 billion to $1.33 billion in 2018; analysts were projecting adjusted earnings of 45 cents a share on adjusted revenue of $1.28 billion, according to FactSet. Despite the beat, Square shares bounced around in response to the report in after-hours trading Tuesday, trading between slight losses and gains.

More here:
Bitcoin USD – BTCUSD Overview – MarketWatch

Read More..

Buy Bitcoin IRA | Bitcoin IRA Investment & Retirement Account …

PLEASE READ THE IMPORTANT DISCLOSURES BELOW.

BitcoinIRA.com is a platform that connects consumers to qualified custodians, digital wallets and cryptocurrency exchanges. The company is not a custodian, is not a digital wallet and is not an exchange.

Self-directed investments processed through Bitcoin IRA have not been endorsed by the IRS or any government or regulatory agency. The IRS does not review, approve, or endorse any investments, including Bitcoins in an IRA.

BitcoinIRA.com facilitates the self-directed transfer from an existing IRA to Kingdom Trust. Kingdom Trust is a non-fiduciary trust company, registered and regulated in the state of South Dakota as a non-depository trust company. Kingdom Trust is a passive, non-discretionary custodian that does not provide, promote, endorse, or sell investment products and does not endorse or promote any individual investment advisor or investment sponsor. Kingdom Trust complies with IRS regulations regarding retirement accounts.

BitcoinIRA.com will attempt, but cannot guarantee, customers will receive tokens derived from hard forks.

*BitcoinIRA.com offers a $1 Million Consumer Protection insurance policy that covers consumers on the transactional side from any internal cases of fraud or theft. BitcoinIRA.com is not FDIC-insured and is not a bank.

Cryptocurrencies are very speculative investments and involve a high degree of risk. Investors must have the financial ability, sophistication/experience and willingness to bear the risks of an investment, and a potential total loss of their investment. See Risk Disclosures.

By using this website, you understand the information being presented is provided for informational purposes only and agree to our Terms of Use and Privacy Policy. BitcoinIRA.com relies on information from various sources, including clients and third parties, but cannot guarantee the accuracy and completeness of that information.

Originally posted here:
Buy Bitcoin IRA | Bitcoin IRA Investment & Retirement Account …

Read More..

Morning Asian Altcoin Trading Roundup: the leader is Tron

Things are looking brighter during the Asian trading session this weekend. Bitcoin has done better than hold the pivotal $8k level, it has risen to just under $9,000. As usual the movements of Bitcoin are mirrored in the altcoin charts and most of them are trading higher this morning. The leading altcoin however is one that has taken a lot of flak recently. But with a 53% jump in less than 24 hours Tron is on a flyer at the moment.

Social media has been vicious to Tron and its founder. For some reason this altcoin has hit a nerve with the Facebook fanboys that have been bleating on about it for some weeks. It has probably suffered a greater FUD attack than any other cryptocurrency out there, with the possible exception of Verge, and this may be due to the huge attack of FOMO causing the coin to spike from virtually nothing to $0.25 on January 5.

Since then it has been on a downward slide with all other altcoins. Today however Tron is over 50% higher than its trading price the same time yesterday. Currently trading at $0.054 TRX has seen the largest upward movement in the top 25 altcoins this morning. Founder Justin Sun is very active on Twitter where he posts almost weekly updates about partnerships with small Chinese companies. The entertainments based altcoin could easily reach its previous all-time high if a bigger partnership gets announced.

TRX is predominantly traded on Binance which has over half the total volume. Its market cap is $3.6 billion which ranks it as the 16th most popular altcoin. $480 million has been traded in the past 24 hours, largely in South Korea. Other altcoins enjoying big jumps today are Ripple, Cardano, Stellar and Lisk.

More on Tron can be found here:https://tron.network/enindex.html

FOMO Moments is a section that takes a daily look at the top 25 altcoins during the Asian trading session and analyses the best performing one, looking for trends and fundamentals.

Southeast Asia based info-tech, cyber security, and cryptocurrency analyst with 15 years working in web technology and media. View all posts by Martin J. Young

See the original post:
Morning Asian Altcoin Trading Roundup: the leader is Tron

Read More..

Cryptosomniac | Cryptocurrency Price Tracker – Bitcoin & Eth …

1

Bitcoin

Ethereum

Ripple

Bitcoin Cash

Litecoin

Cardano

NEO

Stellar Lumens

EOS

MIOTA

Dash

Monero

Ethereum Classic

NEM

VeChain

TRON

Tether

Lisk

Bitcoin Gold

Qtum

OmiseGO

NANO

ICON

Zcash

Binance Coin

Steem

Verge

Bytecoin

Populous

DigixDAO

Stratis

Dogecoin

Siacoin

RChain

Waves

Status

Maker

BitShares

Walton

Aeternity

Decred

Augur

0x

Veritaseum

Electroneum

Hshare

ZClassic

Revain

Komodo

Ardor

Loopring

KuCoin Shares

Ark

Gas

Basic Attention Token

Zilliqa

Dragonchain

Bytom

MonaCoin

DigiByte

aelf

Syscoin

Polymath Network

ReddCoin

Dent

PIVX

QASH

Nebulas Token

Aion

Kyber Network

Dentacoin

Golem

Bitcore

Byteball Bytes

SALT

Cryptonex

Factom

GXShares

Ethos

IOStoken

FunFair

ChainLink

ZCoin

Power Ledger

Pillar

Kin

Cindicator

Nxt

Particl

Request Network

Bancor

SmartCash

Enigma Project

Neblio

MaidSafeCoin

Vertcoin

Ignis

Raiden Network Token

TenX

Here is the original post:
Cryptosomniac | Cryptocurrency Price Tracker – Bitcoin & Eth …

Read More..

Cryptocurrencies News & Prices | Markets Insider

What is blockchain technology?

You’ve likely heard some of the following terms if you’ve paid attention to the world of finance: Cryptocurrency, Blockchain, Bitcoin, Bitcoin Cash, and Ethereum. But what do they mean? And why is cryptocurrency suddenly so hot?

First, we’ll explain the blockchain basics.

As society become increasingly digital, financial services providers are looking to offer customers the same services to which they’re accustomed, but in a more efficient, secure, and cost effective way.

Enter blockchain technology.

The origins of blockchain are a bit nebulous. A person or group of people known by the pseudonym Satoshi Nakomoto invented and released the tech in 2009 as a way to digitally and anonymously send payments between two parties without needing a third party to verify the transaction. It was initially designed to facilitate, authorize, and log the transfer of bitcoins and other cryptocurrencies.

Blockchain tech is actually rather easy to understand at its core. Essentially, it’s a shared database populated with entries that must be confirmed and encrypted. Think of it as a kind of highly encrypted and verified shared Google Document, in which each entry in the sheet depends on a logical relationship to all its predecessors. Blockchain tech offers a way to securely and efficiently create a tamper-proof log of sensitive activity (anything from international money transfers to shareholder records).

Blockchain’s conceptual framework and underlying code is useful for a variety of financial processes because of the potential it has to give companies a secure, digital alternative to banking processes that are typically bureaucratic, time-consuming, paper-heavy, and expensive.

Cryptocurrencies are essentially just digital money, digital tools of exchange that use cryptography and the aforementioned blockchain technology to facilitate secure and anonymous transactions. There had been several iterations of cryptocurrency over the years, but Bitcoin truly thrust cryptocurrencies forward in the late 2000s. There are thousands of cryptocurrencies floating out on the market now, but Bitcoin is far and away the most popular.

Bitcoin, Litecoin, Ethereum, and other cryptocurrencies don’t just fall out of the sky. Like any other form of money, it takes work to produce them. And that work comes in the form of mining.

But let’s take a step back. Satoshi Nakamoto, the founder of Bitcoin, ensured that there would ever only be 21 million Bitcoins in existence. He (or they) reached that figure by calculating that people would discover, or “mine,” a certain number of blocks of transactions each day.

Every four years, the number of Bitcoins released in relation to the previous cycle gets reduced by 50%, along with the reward to miners for discovering new blocks. At the moment, that reward is 12.5 Bitcoins. Therefore, the total number of Bitcoins in circulation will approach 21 million but never actually reach that figure. This means Bitcoin will never experience inflation. The downside here is that a hack or cyberattack could be a disaster because it could erase Bitcoin wallets with little hope of getting the value back.

As for mining Bitcoins, the process requires electrical energy. Miners solve complex mathematical problems, and the reward is more Bitcoins generated and awarded to them. Miners also verify transactions and prevent fraud, so more miners equals faster, more reliable, and more secure transactions.

Thanks to Satoshi Nakamoto’s designs, Bitcoin mining becomes more difficult as more miners join the fray. In 2009, a miner could mine 200 Bitcoin in a matter of days. In 2014, it would take approximately 98 years to mine just one, according to 99Bitcoins.

Super powerful computers called Application Specific Integrated Circuit, or ASIC, were developed specifically to mine Bitcoins. But because so many miners have joined in the last few years, it remains difficult to mine loads. The solution is mining pools, groups of miners who band together and are paid relative to their share of the work.

Since its inception, Bitcoin has been rather volatile. But based on its recent boom and a forecast by Snapchat’s first investor, Jeremy Liew, that it would hit $500,000 by 2030 and the prospect of grabbing a slice of the Bitcoin pie becomes far more attractive.

Bitcoin users expect 94% of all bitcoins to be released by 2024. As the number moves toward the ceiling of 21 million, many expect the profits miners once made from the creation of new blocks to become so low that they will become negligible. But as more bitcoins enter circulation, transaction fees could rise and offset this.

As for blockchain technology itself, it has numerous applications, from banking to the Internet of Things. It is expected that companies will flesh out their blockchain IoT solutions. Blockchain is a promising tool that will transform parts of the IoT and enable solutions that provide greater insight into assets, operations, and supply chains. It will also transform how health records and connected medical devices store and transmit data.

Blockchain wont be usable everywhere, but in many cases, it will be a part of the solution that makes the best use of the tools in the IoT arsenal. Blockchain can help to address particular problems, improve workflows, and reduce costs, which are the ultimate goals of any IoT project.

View post:
Cryptocurrencies News & Prices | Markets Insider

Read More..

I started cryptocurrency mining at the end of 2017 and was …

It depends but if you are filing a Schedule C and claiming this cryptocurrency mining as self-employment income, then you will be able to claim any “necessary” and “ordinary” expense as business expense include equipment used in your business.

If this is just considered investing activities, then you would not be able to claim any deduction for the cost of equipment.

Also, please be aware that you are claiming this equipment as a business expense, you would not be able to directly expense your business equipment unless under $2,500 and you are claiming theSafeHarbor Election. For equipment over this threshold, you will be able to claim it was a business assetand take deprecation (and could possibly be eligiblefor bonus depreciation or an IRC Section 179 deduction).

Just enter the asset under your business summary page.

Please refer to thisIRS link for more information about BusinessExpenses

To enter Businessincome and expense information in TurboTax, log into your tax return (forTurboTax Online sign-in, click Hereand click on “Take me to my return”) type “Schedule c” inthe search bar then select “jump to Schedule c”. TurboTax will guideyou in entering this information

Excerpt from:
I started cryptocurrency mining at the end of 2017 and was …

Read More..

Cloud Servers | Cloud Hosting | Web Hosting – Cirrus Hosting

Our Canadian web hosting business opened its doors back in 1999, and were still going strong. With clients in Canada and around the world, we have hosted and supported hundreds of thousands of websites and applications.

Not to mention our A+ rating from the Better Business Bureau (BBB). Were not just some fly by night web host were here for you and your online presence, for the long haul.

At Cirrus, were big on dedicated servers and one of our main focuses is keeping our services as up to date and flexible as possible.

With a range of plans, software systems, and add-ons at your disposal, youre sure to find just the right dedicated hosting solution for your needs and your budget.

Our network core has one of the most rigorously redundant designs allowing us to offer our clients an enterprise class environment to host mission critical cloud infrastructures.

Cirrus Tech is taking advantage of industry leading local fiber optics networks which offer virtually unlimited data transfer capacity with the lowest latency.

Our Data Center is protected by uninterruptible backup batteries to guarantee an uninterrupted service! ClickHereto read more about data centers.

Read this article:
Cloud Servers | Cloud Hosting | Web Hosting – Cirrus Hosting

Read More..

Managed Dedicated, Cloud and Hosting Services

“Codero has been providing Shiekh Shoes with reliable hosting services for over 10 years. Codero support goes above and beyond, be it a routine change request or a critical issue. I would recommend Codero services to any business without hesitation.”

– Denis Ivanov, Shiekh Shoes

“After ‘kissing’ a lot of frogs, Codero has been nothing short of a revelation.”

– Jae Barclay, ejaeDesign LLC

“Coderos highly skilled and experienced staff, world class data center facilities, and reliable services have helped us grow for years. Custom solutions, flexible contracts, and highest level of PERSONAL customer service highlight our relationship.”

– Kyle Heyward, ResultsPositive

“The support level of Cordero’s team is exceptional; we really have peace of mind to focus on our core business and keep our customers satisfied.”

– Carlos Barbaran, Nisira Systems S.A.C.

“When we wanted to install new custom software on our server, thanks to the Codero Rewards Program, it didnt cost a penny! Were here to stay.”

– Jeff Carter, Rockbrook

Here is the original post:
Managed Dedicated, Cloud and Hosting Services

Read More..

Energy-efficient encryption for the internet of things | MIT News

Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key.

Public-key encryption protocols are complicated, and in computer networks, theyre executed by software. But that wont work in the internet of things, an envisioned network that would connect many different sensors embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags to online servers. Embedded sensors that need to maximize battery life cant afford the energy and memory space that software execution of encryption protocols would require.

MIT researchers have built a new chip, hardwired to perform public-key encryption, that consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster. The researchers describe the chip in a paper theyre presenting this week at the International Solid-State Circuits Conference.

Like most modern public-key encryption systems, the researchers chip uses a technique called elliptic-curve encryption. As its name suggests, elliptic-curve encryption relies on a type of mathematical function called an elliptic curve. In the past, researchers including the same MIT group that developed the new chip have built chips hardwired to handle specific elliptic curves or families of curves. What sets the new chip apart is that it is designed to handle any elliptic curve.

Cryptographers are coming up with curves with different properties, and they use different primes, says Utsav Banerjee, an MIT graduate student in electrical engineering and computer science and first author on the paper. There is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves. With this chip, we can support all of them, and hopefully, when new curves come along in the future, we can support them as well.

Joining Banerjee on the paper are his thesis advisor, Anantha Chandrakasan, dean of MITs School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Arvind, the Johnson Professor in Computer Science Engineering; and Andrew Wright and Chiraag Juvekar, both graduate students in electrical engineering and computer science.

Modular reasoning

To create their general-purpose elliptic-curve chip, the researchers decomposed the cryptographic computation into its constituent parts. Elliptic-curve cryptography relies on modular arithmetic, meaning that the values of the numbers that figure into the computation are assigned a limit. If the result of some calculation exceeds that limit, its divided by the limit, and only the remainder is preserved. The secrecy of the limit helps ensure cryptographic security.

One of the computations to which the MIT chip devotes a special-purpose circuit is thus modular multiplication. But because elliptic-curve cryptography deals with large numbers, the chips modular multiplier is massive. Typically, a modular multiplier might be able to handle numbers with 16 or maybe 32 binary digits, or bits. For larger computations, the results of discrete 16- or 32-bit multiplications would be integrated by additional logic circuits.

The MIT chips modular multiplier can handle 256-bit numbers, however. Eliminating the extra circuitry for integrating smaller computations both reduces the chips energy consumption and increases its speed.

Another key operation in elliptic-curve cryptography is called inversion. Inversion is the calculation of a number that, when multiplied by a given number, will yield a modular product of 1. In previous chips dedicated to elliptic-curve cryptography, inversions were performed by the same circuits that did the modular multiplications, saving chip space. But the MIT researchers instead equipped their chip with a special-purpose inverter circuit. This increases the chips surface area by 10 percent, but it cuts the power consumption in half.

The most common encryption protocol to use elliptic-curve cryptography is called the datagram transport layer security protocol, which governs not only the elliptic-curve computations themselves but also the formatting, transmission, and handling of the encrypted data. In fact, the entire protocol is hardwired into the MIT researchers chip, which dramatically reduces the amount of memory required for its execution.

The chip also features a general-purpose processor that can be used in conjunction with the dedicated circuitry to execute other elliptic-curve-based security protocols. But it can be powered down when not in use, so it doesnt compromise the chips energy efficiency.

They move a certain amount of functionality that used to be in software into hardware, says Xiaolin Lu, director of the internet of things (IOT) lab at Texas Instruments. That has advantages that include power and cost. But from an industrial IOT perspective, its also a more user-friendly implementation. For whoever writes the software, its much simpler.

Original post:
Energy-efficient encryption for the internet of things | MIT News

Read More..

The Best Encryption Software – TopTenReviews

Key Features to Look for When Buying Encryption Software?

PerformanceIf your encryption software is difficult to use, you may not use it at all. The programs we reviewed are simple and intuitive, particularly Folder Lock and Secure IT they both guide you through the encryption and decryption processes step by step. Secure IT integrates with Windows, so all you have to do is right-click on a file and choose to encrypt it in the menu.

We found that programs typically compress files as they encrypt them, though only to a small degree for example, from 128MB down to 124MB. It can make a difference when you encrypt large data files, so programs that protect and compress are preferable.SecurityEncryption software uses different types of ciphers to scramble your data, and each has its own benefits. Advanced Encryption Standard, or 256-bit key AES, is used by the U.S. government, including the National Security Agency (NSA), and is one of the strongest ciphers available. Blowfish and Twofish, the latter being a newer version of the former, are encryption algorithms that use block ciphers they scramble blocks of text or several bits of information at once, rather than one bit at a time.

The main differences between these algorithms are performance and speed, and the average user wont notice those disparities. Although any of these ciphers could be broken given enough time and computing power, they are considered practically unbreakable. AES has long been recognized as the superior algorithm, so we preferred programs that use it.Version CompatibilityIf your computer runs an older version of Windows, such as Vista or XP, make sure the encryption program supports your operating system. On the flip side, you need to make sure you choose software that has changed with the times and supports the latest versions of Windows, like 7, 8 and 10.

While all the programs we tested are compatible with every version of Windows, we feel that SensiGuard is a good choice for older computers because it only has the most essential tools and wont bog down your PC. Plus, it is easy to move to a new computer if you choose to upgrade. However, it takes a while to encrypt and decrypt files.

If you have a Mac computer, you need a program that is designed specifically for that operating system none of the programs we tested are compatible with both Windows and Mac machines. We believe Concealer is the best option for Macs, but Espionage 3 is also a good choice.

Mac encryption software doesnt have as many extra security features as Windows programs. They typically lack virtual keyboards, self-extracting file creators and password recovery tools. Mac programs also take a lot more time to secure files compared to Windows software.

Read the rest here:
The Best Encryption Software – TopTenReviews

Read More..