data.plus (54)in DLIKE • 3 years agoCoin Bureau: Cosmos Network Is One of The Most Important Crypto Project – Fintechs.fiOur observations and notesThe exchange of data and value between blockchains in a secure and scalable environment is…data.plus (54)in DLIKE • 3 years agoEU Going Blockchain: IOTA Among the Chosen to Develop EBSI Infrastructure — DailyCoinOur Observations and NotesUnlike other blockchain projects, IOTA uses a unique form of Distributed Ledger Technology…data.plus (54)in Ask Steem Anything • 3 years agoWhy is that some religions are slowly becoming moribund in some parts of the world?Screen Shot of is a Crown Copyright ; License: Open Government License This open-ended question was…data.plus (54)in DLIKE • 3 years agoU.K. Post Office Now Allows Users Purchase Bitcoin Through Its AppOur observationThe UK post office with the help of its app is facilitating the buying and selling of crypto through a…data.plus (54)in DLIKE • 3 years agoDigital Identity Around the World: Why Some Countries are Embracing Self Sovereign Identity Quicker | Hacker NoonOur observationsThis article discusses the adoption of Self Sovereign Identity by the public sector around the world.…data.plus (54)in DLIKE • 3 years agoCrypto Needs Regulation If It’s Going To Survive, Says SEC BossOur take on this article:One of the pillars of cryptocurrencies is trustless transactions. That means the transacting…data.plus (54)in DLIKE • 3 years agoBenefits, Use Cases, and Implementations of Blockchain in Real Estate | Hacker NoonOur observations and notes;Every industry is poised to be disrupted to a large or smaller extent by blockchain and…data.plus (54)in DLIKE • 3 years agoMotor Vehicle Hacking: How Cybercriminals Hack Your Car | Hacker NoonOur observations and commentsConnected motor vehicles carry the same amount of security risks as your computers or…data.plus (54)in DLIKE • 3 years agoMiners and Nodes - What's the difference? - CoinBTWOur notes: It is quite common to see these two words, miners and node, being used interchangeably in blog articles…data.plus (54)in DLIKE • 3 years agoZero Trust security | What is a Zero Trust network?Our synopsis and notes: This article discusses Zero Trust Security, which is a IT model that implements strict…data.plus (54)in DLIKE • 3 years agoA Notorious Hacker Gang Claims to Be Selling Data on 70 Million AT&T SubscribersOur synopsis: This may appear to be a bad news to many. But is it really so? Do you think the business community would…data.plus (54)in DLIKE • 3 years agoWhat Personal Details Are You Sharing Without Knowing? | Hacker NoonOur observations and notes: This is a must read for perhaps 75% of the internet users. The author of the article has…data.plus (54)in DLIKE • 3 years agoSecond largest US mortgage lender will accept crypto payments this yearOur observations: Whilst real estate transactions using crypto has taken place much earlier, mortgage payments using…data.plus (54)in DLIKE • 3 years agoEthereum’s rise to No. 1 crypto ‘seems unstoppable,’ says deVere Group CEOOur synopsis: Ethereum is bound to overtake Bitcoin sooner or later. While this may sound exciting for Ethereum fans…data.plus (54)in Ask Steem Anything • 3 years agoHow badly would you be affected if you lost your smart phone? Discuss.Image by Anastasia Gepp from Pixabay We rely on our smart phone for practically everything and we store most of our…data.plus (54)in DLIKE • 3 years agoHow blockchain could have saved the Library of AlexandriaOur observations: Yes, blockchain could have saved the great library of Alexandria in Egypt and even the then popular…data.plus (54)in DLIKE • 3 years agoOutwitting crypto criminals: Why exchanges have to go the extra mileOur observations: Here is an article on cyber security from Mark Taylor who has had hands-on experience in…data.plus (54)in DLIKE • 3 years agoKYC Will Not Protect Us, Bitcoin And Encryption WillOur synopsis: Very little has been written about the ill effects of the AML and CFT regulations and the consequent KYC…data.plus (54)in DLIKE • 3 years agoSecurity concern is a top barrier to AI implementation | Hacker NoonOur observations and notes: Data is the backbone of AI. Without data there is no AI. What if data is corrupt? The…data.plus (54)in DLIKE • 3 years agoWhy Biometrics and Alternative Authentication Are ImportantOur observations and notes: Key TakeawaysBiometrics are quickly becoming a preferred method of authentication because…