Page 4,161«..1020..4,1604,1614,1624,163..4,1704,180..»

Morning Asian Altcoin Trading Roundup: the leader is Tron

Things are looking brighter during the Asian trading session this weekend. Bitcoin has done better than hold the pivotal $8k level, it has risen to just under $9,000. As usual the movements of Bitcoin are mirrored in the altcoin charts and most of them are trading higher this morning. The leading altcoin however is one that has taken a lot of flak recently. But with a 53% jump in less than 24 hours Tron is on a flyer at the moment.

Social media has been vicious to Tron and its founder. For some reason this altcoin has hit a nerve with the Facebook fanboys that have been bleating on about it for some weeks. It has probably suffered a greater FUD attack than any other cryptocurrency out there, with the possible exception of Verge, and this may be due to the huge attack of FOMO causing the coin to spike from virtually nothing to $0.25 on January 5.

Since then it has been on a downward slide with all other altcoins. Today however Tron is over 50% higher than its trading price the same time yesterday. Currently trading at $0.054 TRX has seen the largest upward movement in the top 25 altcoins this morning. Founder Justin Sun is very active on Twitter where he posts almost weekly updates about partnerships with small Chinese companies. The entertainments based altcoin could easily reach its previous all-time high if a bigger partnership gets announced.

TRX is predominantly traded on Binance which has over half the total volume. Its market cap is $3.6 billion which ranks it as the 16th most popular altcoin. $480 million has been traded in the past 24 hours, largely in South Korea. Other altcoins enjoying big jumps today are Ripple, Cardano, Stellar and Lisk.

More on Tron can be found here:https://tron.network/enindex.html

FOMO Moments is a section that takes a daily look at the top 25 altcoins during the Asian trading session and analyses the best performing one, looking for trends and fundamentals.

Southeast Asia based info-tech, cyber security, and cryptocurrency analyst with 15 years working in web technology and media. View all posts by Martin J. Young

See the original post:
Morning Asian Altcoin Trading Roundup: the leader is Tron

Read More..

Cryptosomniac | Cryptocurrency Price Tracker – Bitcoin & Eth …

1

Bitcoin

Ethereum

Ripple

Bitcoin Cash

Litecoin

Cardano

NEO

Stellar Lumens

EOS

MIOTA

Dash

Monero

Ethereum Classic

NEM

VeChain

TRON

Tether

Lisk

Bitcoin Gold

Qtum

OmiseGO

NANO

ICON

Zcash

Binance Coin

Steem

Verge

Bytecoin

Populous

DigixDAO

Stratis

Dogecoin

Siacoin

RChain

Waves

Status

Maker

BitShares

Walton

Aeternity

Decred

Augur

0x

Veritaseum

Electroneum

Hshare

ZClassic

Revain

Komodo

Ardor

Loopring

KuCoin Shares

Ark

Gas

Basic Attention Token

Zilliqa

Dragonchain

Bytom

MonaCoin

DigiByte

aelf

Syscoin

Polymath Network

ReddCoin

Dent

PIVX

QASH

Nebulas Token

Aion

Kyber Network

Dentacoin

Golem

Bitcore

Byteball Bytes

SALT

Cryptonex

Factom

GXShares

Ethos

IOStoken

FunFair

ChainLink

ZCoin

Power Ledger

Pillar

Kin

Cindicator

Nxt

Particl

Request Network

Bancor

SmartCash

Enigma Project

Neblio

MaidSafeCoin

Vertcoin

Ignis

Raiden Network Token

TenX

Here is the original post:
Cryptosomniac | Cryptocurrency Price Tracker - Bitcoin & Eth ...

Read More..

Cryptocurrencies News & Prices | Markets Insider

What is blockchain technology?

You've likely heard some of the following terms if you've paid attention to the world of finance: Cryptocurrency, Blockchain, Bitcoin, Bitcoin Cash, and Ethereum. But what do they mean? And why is cryptocurrency suddenly so hot?

First, we'll explain the blockchain basics.

As society become increasingly digital, financial services providers are looking to offer customers the same services to which they're accustomed, but in a more efficient, secure, and cost effective way.

Enter blockchain technology.

The origins of blockchain are a bit nebulous. A person or group of people known by the pseudonym Satoshi Nakomoto invented and released the tech in 2009 as a way to digitally and anonymously send payments between two parties without needing a third party to verify the transaction. It was initially designed to facilitate, authorize, and log the transfer of bitcoins and other cryptocurrencies.

Blockchain tech is actually rather easy to understand at its core. Essentially, it's a shared database populated with entries that must be confirmed and encrypted. Think of it as a kind of highly encrypted and verified shared Google Document, in which each entry in the sheet depends on a logical relationship to all its predecessors. Blockchain tech offers a way to securely and efficiently create a tamper-proof log of sensitive activity (anything from international money transfers to shareholder records).

Blockchain's conceptual framework and underlying code is useful for a variety of financial processes because of the potential it has to give companies a secure, digital alternative to banking processes that are typically bureaucratic, time-consuming, paper-heavy, and expensive.

Cryptocurrencies are essentially just digital money, digital tools of exchange that use cryptography and the aforementioned blockchain technology to facilitate secure and anonymous transactions. There had been several iterations of cryptocurrency over the years, but Bitcoin truly thrust cryptocurrencies forward in the late 2000s. There are thousands of cryptocurrencies floating out on the market now, but Bitcoin is far and away the most popular.

Bitcoin, Litecoin, Ethereum, and other cryptocurrencies don't just fall out of the sky. Like any other form of money, it takes work to produce them. And that work comes in the form of mining.

But let's take a step back. Satoshi Nakamoto, the founder of Bitcoin, ensured that there would ever only be 21 million Bitcoins in existence. He (or they) reached that figure by calculating that people would discover, or "mine," a certain number of blocks of transactions each day.

Every four years, the number of Bitcoins released in relation to the previous cycle gets reduced by 50%, along with the reward to miners for discovering new blocks. At the moment, that reward is 12.5 Bitcoins. Therefore, the total number of Bitcoins in circulation will approach 21 million but never actually reach that figure. This means Bitcoin will never experience inflation. The downside here is that a hack or cyberattack could be a disaster because it could erase Bitcoin wallets with little hope of getting the value back.

As for mining Bitcoins, the process requires electrical energy. Miners solve complex mathematical problems, and the reward is more Bitcoins generated and awarded to them. Miners also verify transactions and prevent fraud, so more miners equals faster, more reliable, and more secure transactions.

Thanks to Satoshi Nakamoto's designs, Bitcoin mining becomes more difficult as more miners join the fray. In 2009, a miner could mine 200 Bitcoin in a matter of days. In 2014, it would take approximately 98 years to mine just one, according to 99Bitcoins.

Super powerful computers called Application Specific Integrated Circuit, or ASIC, were developed specifically to mine Bitcoins. But because so many miners have joined in the last few years, it remains difficult to mine loads. The solution is mining pools, groups of miners who band together and are paid relative to their share of the work.

Since its inception, Bitcoin has been rather volatile. But based on its recent boom and a forecast by Snapchat's first investor, Jeremy Liew, that it would hit $500,000 by 2030 and the prospect of grabbing a slice of the Bitcoin pie becomes far more attractive.

Bitcoin users expect 94% of all bitcoins to be released by 2024. As the number moves toward the ceiling of 21 million, many expect the profits miners once made from the creation of new blocks to become so low that they will become negligible. But as more bitcoins enter circulation, transaction fees could rise and offset this.

As for blockchain technology itself, it has numerous applications, from banking to the Internet of Things. It is expected that companies will flesh out their blockchain IoT solutions. Blockchain is a promising tool that will transform parts of the IoT and enable solutions that provide greater insight into assets, operations, and supply chains. It will also transform how health records and connected medical devices store and transmit data.

Blockchain wont be usable everywhere, but in many cases, it will be a part of the solution that makes the best use of the tools in the IoT arsenal. Blockchain can help to address particular problems, improve workflows, and reduce costs, which are the ultimate goals of any IoT project.

View post:
Cryptocurrencies News & Prices | Markets Insider

Read More..

I started cryptocurrency mining at the end of 2017 and was …

It depends but if you are filing a Schedule C and claiming this cryptocurrency mining as self-employment income, then you will be able to claim any "necessary" and "ordinary" expense as business expense include equipment used in your business.

If this is just considered investing activities, then you would not be able to claim any deduction for the cost of equipment.

Also, please be aware that you are claiming this equipment as a business expense, you would not be able to directly expense your business equipment unless under $2,500 and you are claiming theSafeHarbor Election. For equipment over this threshold, you will be able to claim it was a business assetand take deprecation (and could possibly be eligiblefor bonus depreciation or an IRC Section 179 deduction).

Just enter the asset under your business summary page.

Please refer to thisIRS link for more information about BusinessExpenses

To enter Businessincome and expense information in TurboTax, log into your tax return (forTurboTax Online sign-in, click Hereand click on "Take me to my return") type "Schedule c" inthe search bar then select "jump to Schedule c". TurboTax will guideyou in entering this information

Excerpt from:
I started cryptocurrency mining at the end of 2017 and was ...

Read More..

Cloud Servers | Cloud Hosting | Web Hosting – Cirrus Hosting

Our Canadian web hosting business opened its doors back in 1999, and were still going strong. With clients in Canada and around the world, we have hosted and supported hundreds of thousands of websites and applications.

Not to mention our A+ rating from the Better Business Bureau (BBB). Were not just some fly by night web host were here for you and your online presence, for the long haul.

At Cirrus, were big on dedicated servers and one of our main focuses is keeping our services as up to date and flexible as possible.

With a range of plans, software systems, and add-ons at your disposal, youre sure to find just the right dedicated hosting solution for your needs and your budget.

Our network core has one of the most rigorously redundant designs allowing us to offer our clients an enterprise class environment to host mission critical cloud infrastructures.

Cirrus Tech is taking advantage of industry leading local fiber optics networks which offer virtually unlimited data transfer capacity with the lowest latency.

Our Data Center is protected by uninterruptible backup batteries to guarantee an uninterrupted service! ClickHereto read more about data centers.

Read this article:
Cloud Servers | Cloud Hosting | Web Hosting - Cirrus Hosting

Read More..

Managed Dedicated, Cloud and Hosting Services

"Codero has been providing Shiekh Shoes with reliable hosting services for over 10 years. Codero support goes above and beyond, be it a routine change request or a critical issue. I would recommend Codero services to any business without hesitation."

- Denis Ivanov, Shiekh Shoes

"After 'kissing' a lot of frogs, Codero has been nothing short of a revelation."

- Jae Barclay, ejaeDesign LLC

"Coderos highly skilled and experienced staff, world class data center facilities, and reliable services have helped us grow for years. Custom solutions, flexible contracts, and highest level of PERSONAL customer service highlight our relationship."

- Kyle Heyward, ResultsPositive

"The support level of Cordero's team is exceptional; we really have peace of mind to focus on our core business and keep our customers satisfied."

- Carlos Barbaran, Nisira Systems S.A.C.

"When we wanted to install new custom software on our server, thanks to the Codero Rewards Program, it didnt cost a penny! Were here to stay."

- Jeff Carter, Rockbrook

Here is the original post:
Managed Dedicated, Cloud and Hosting Services

Read More..

Energy-efficient encryption for the internet of things | MIT News

Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key.

Public-key encryption protocols are complicated, and in computer networks, theyre executed by software. But that wont work in the internet of things, an envisioned network that would connect many different sensors embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags to online servers. Embedded sensors that need to maximize battery life cant afford the energy and memory space that software execution of encryption protocols would require.

MIT researchers have built a new chip, hardwired to perform public-key encryption, that consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster. The researchers describe the chip in a paper theyre presenting this week at the International Solid-State Circuits Conference.

Like most modern public-key encryption systems, the researchers chip uses a technique called elliptic-curve encryption. As its name suggests, elliptic-curve encryption relies on a type of mathematical function called an elliptic curve. In the past, researchers including the same MIT group that developed the new chip have built chips hardwired to handle specific elliptic curves or families of curves. What sets the new chip apart is that it is designed to handle any elliptic curve.

Cryptographers are coming up with curves with different properties, and they use different primes, says Utsav Banerjee, an MIT graduate student in electrical engineering and computer science and first author on the paper. There is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves. With this chip, we can support all of them, and hopefully, when new curves come along in the future, we can support them as well.

Joining Banerjee on the paper are his thesis advisor, Anantha Chandrakasan, dean of MITs School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Arvind, the Johnson Professor in Computer Science Engineering; and Andrew Wright and Chiraag Juvekar, both graduate students in electrical engineering and computer science.

Modular reasoning

To create their general-purpose elliptic-curve chip, the researchers decomposed the cryptographic computation into its constituent parts. Elliptic-curve cryptography relies on modular arithmetic, meaning that the values of the numbers that figure into the computation are assigned a limit. If the result of some calculation exceeds that limit, its divided by the limit, and only the remainder is preserved. The secrecy of the limit helps ensure cryptographic security.

One of the computations to which the MIT chip devotes a special-purpose circuit is thus modular multiplication. But because elliptic-curve cryptography deals with large numbers, the chips modular multiplier is massive. Typically, a modular multiplier might be able to handle numbers with 16 or maybe 32 binary digits, or bits. For larger computations, the results of discrete 16- or 32-bit multiplications would be integrated by additional logic circuits.

The MIT chips modular multiplier can handle 256-bit numbers, however. Eliminating the extra circuitry for integrating smaller computations both reduces the chips energy consumption and increases its speed.

Another key operation in elliptic-curve cryptography is called inversion. Inversion is the calculation of a number that, when multiplied by a given number, will yield a modular product of 1. In previous chips dedicated to elliptic-curve cryptography, inversions were performed by the same circuits that did the modular multiplications, saving chip space. But the MIT researchers instead equipped their chip with a special-purpose inverter circuit. This increases the chips surface area by 10 percent, but it cuts the power consumption in half.

The most common encryption protocol to use elliptic-curve cryptography is called the datagram transport layer security protocol, which governs not only the elliptic-curve computations themselves but also the formatting, transmission, and handling of the encrypted data. In fact, the entire protocol is hardwired into the MIT researchers chip, which dramatically reduces the amount of memory required for its execution.

The chip also features a general-purpose processor that can be used in conjunction with the dedicated circuitry to execute other elliptic-curve-based security protocols. But it can be powered down when not in use, so it doesnt compromise the chips energy efficiency.

They move a certain amount of functionality that used to be in software into hardware, says Xiaolin Lu, director of the internet of things (IOT) lab at Texas Instruments. That has advantages that include power and cost. But from an industrial IOT perspective, its also a more user-friendly implementation. For whoever writes the software, its much simpler.

Original post:
Energy-efficient encryption for the internet of things | MIT News

Read More..

The Best Encryption Software – TopTenReviews

Key Features to Look for When Buying Encryption Software?

PerformanceIf your encryption software is difficult to use, you may not use it at all. The programs we reviewed are simple and intuitive, particularly Folder Lock and Secure IT they both guide you through the encryption and decryption processes step by step. Secure IT integrates with Windows, so all you have to do is right-click on a file and choose to encrypt it in the menu.

We found that programs typically compress files as they encrypt them, though only to a small degree for example, from 128MB down to 124MB. It can make a difference when you encrypt large data files, so programs that protect and compress are preferable.SecurityEncryption software uses different types of ciphers to scramble your data, and each has its own benefits. Advanced Encryption Standard, or 256-bit key AES, is used by the U.S. government, including the National Security Agency (NSA), and is one of the strongest ciphers available. Blowfish and Twofish, the latter being a newer version of the former, are encryption algorithms that use block ciphers they scramble blocks of text or several bits of information at once, rather than one bit at a time.

The main differences between these algorithms are performance and speed, and the average user wont notice those disparities. Although any of these ciphers could be broken given enough time and computing power, they are considered practically unbreakable. AES has long been recognized as the superior algorithm, so we preferred programs that use it.Version CompatibilityIf your computer runs an older version of Windows, such as Vista or XP, make sure the encryption program supports your operating system. On the flip side, you need to make sure you choose software that has changed with the times and supports the latest versions of Windows, like 7, 8 and 10.

While all the programs we tested are compatible with every version of Windows, we feel that SensiGuard is a good choice for older computers because it only has the most essential tools and wont bog down your PC. Plus, it is easy to move to a new computer if you choose to upgrade. However, it takes a while to encrypt and decrypt files.

If you have a Mac computer, you need a program that is designed specifically for that operating system none of the programs we tested are compatible with both Windows and Mac machines. We believe Concealer is the best option for Macs, but Espionage 3 is also a good choice.

Mac encryption software doesnt have as many extra security features as Windows programs. They typically lack virtual keyboards, self-extracting file creators and password recovery tools. Mac programs also take a lot more time to secure files compared to Windows software.

Read the rest here:
The Best Encryption Software - TopTenReviews

Read More..

What is Cloud Hosting? | Web Hosting Sun

Last updated: February 11, 2018

Cloud hosting is in many ways a new offering in the web hosting industry. While cloud computing technology has been around for a number of years now, only recently has the technology developed to the point where it is affordable, easy to setup and deploy, and popular enoughto make those companies that dont offer it less competitive than those that do.

So just what, exactly, is cloud hosting?Before we can answer that question, we first need to know what cloud computing in general is.

At its most basic, cloud computing is a serviceprovided over the internet for the accomplishing of certain computing tasks. That is to say, rather than performing that task using your own software and hardware, whether at home or at work, you utilize the software or hardware of some company or organization that provides it to you as a service, somewhat like a utility. To take a simple example, suppose youdecide to write and store a document using Google Docs, rather than Microsoft Word. In such a case, you would be doing your word processing in the cloud, since youre using a browser to connect to a service that provides computing resources to you over the internet. Authoring a document in Microsoft Word, on the other hand, is done locally on your own computer.

Image courtesy of Centro Systems.

The cloud is, in many ways, just a buzzphrase for the internet itself. But the cloud services out therecan be much more complex than word processing. At the other end of the spectrum, a company might provide an underlying infrastructure of networked servers that allow you to easily create what are called virtual machines basically an emulation of computer hardware that you can access through a web interface. You might install an operating system and other software on those virtual machines in order to develop the latest phone app or to house databases that your company uses. Or you might set up a web server and start hosting websites.

What the cloud effectively provides is affordable, simple access to computer resources over the internet. Rather than spending thousands of dollars buying or building servers that you then have to not only place somewhere but alsopay the costs of electricity for, you can instead use a cloud computing service to easily createvirtualizations, or simulations, of that same hardware and use it like normal.

Because cloud computing services are a lot like utilities, youoften dont pay a fixed monthly price but rather pay according to what youve used. That can be anything from the amount of bandwidth to a number of CPU resources, to the number of virtual machines youve got running.

Cloud hosting tends to follow a general model. While all hosting plans provide a service that you use via the internet, and so are in asense also in the cloud, what makes cloud hosting unique is that the servers are invariably virtual, in the way described above, and the service itself often goes by apay-as-you-use-it model. With other hosting plans, your data is generally located on a single physical server that has a limited amount of physical resources installed. If you need more resources, you typically need to upgrade to another plan. But with virtual servers, those resources are also virtualized and can be quickly scaled up or down, often by the customer herself. If you need more hard drive space, or more bandwidth, or more RAM, you simply change the numbers.

Cloud hosting does have apotential drawback that customers ought to be aware of. With regular hosting, youre often allotted a certain amount of resources, which is typically very large, and you pay a fixed price for those resources whether you use them all or not.Most peoples resource usage is nowhere close to the limit, and it could be more cost-effective to move over to cloud hosting. But some customers, especially those with heavily trafficked sites, could end up paying more by switching to cloud hosting. Of course, switching over may give a performance boost to websites, since you can increase or decrease a number of resources dedicated to your site at will.

Be sure to check out our web hosting reviews to helpyou decide which option is the best for you.

Read the original post:
What is Cloud Hosting? | Web Hosting Sun

Read More..

Webinar: Bitcoin Overshadowed by Altcoin Surge – Nasdaq.com

DailyFX.com -

On December 22, 2017 the cryptocurrency market lost in excess of $200 billion to just over $420 billion while Bitcoin (BTC) traded below $11,000 as sellers hammered the market. Now two weeks later the cryptocurrency market has hit a new all-time high in excess of $700 billion, driven primarily by surging altcoins with Ripple (XRP) leading the charge.

Other topics covered in this week's Bitcoin and Cryptocurrency webinar include -

If you missed this webinar and would like to know about future events, see the full DailyFX webinar schedule here.

--- Written by Nick Cawley , Analyst

To contact Nick , email him at nicholas.cawley@ig.com

Follow Nick on Twitter @ nickcawley1

DailyFX provides forex news and technical analysis on the trends that influence the global currency markets. Learn forex trading with a free practice account and trading charts from IG .

The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.

See original here:
Webinar: Bitcoin Overshadowed by Altcoin Surge - Nasdaq.com

Read More..