Bitcoin Mining Pool Bitcoin.com

How EpiK Protocol “Saved the Miners” from Filecoin with the E2P Storage Model?

How EpiK Protocol “Saved the Miners” from Filecoin with the E2P Storage Model?

https://preview.redd.it/n5jzxozn27v51.png?width=2222&format=png&auto=webp&s=6cd6bd726582bbe2c595e1e467aeb3fc8aabe36f
On October 20, Eric Yao, Head of EpiK China, and Leo, Co-Founder & CTO of EpiK, visited Deep Chain Online Salon, and discussed “How EpiK saved the miners eliminated by Filecoin by launching E2P storage model”. ‘?” The following is a transcript of the sharing.
Sharing Session
Eric: Hello, everyone, I’m Eric, graduated from School of Information Science, Tsinghua University. My Master’s research was on data storage and big data computing, and I published a number of industry top conference papers.
Since 2013, I have invested in Bitcoin, Ethereum, Ripple, Dogcoin, EOS and other well-known blockchain projects, and have been settling in the chain circle as an early technology-based investor and industry observer with 2 years of blockchain experience. I am also a blockchain community initiator and technology evangelist
Leo: Hi, I’m Leo, I’m the CTO of EpiK. Before I got involved in founding EpiK, I spent 3 to 4 years working on blockchain, public chain, wallets, browsers, decentralized exchanges, task distribution platforms, smart contracts, etc., and I’ve made some great products. EpiK is an answer to the question we’ve been asking for years about how blockchain should be landed, and we hope that EpiK is fortunate enough to be an answer for you as well.
Q & A
Deep Chain Finance:
First of all, let me ask Eric, on October 15, Filecoin’s main website launched, which aroused everyone’s attention, but at the same time, the calls for fork within Filecoin never stopped. The EpiK protocol is one of them. What I want to know is, what kind of project is EpiK Protocol? For what reason did you choose to fork in the first place? What are the differences between the forked project and Filecoin itself?
Eric:
First of all, let me answer the first question, what kind of project is EpiK Protocol.
With the Fourth Industrial Revolution already upon us, comprehensive intelligence is one of the core goals of this stage, and the key to comprehensive intelligence is how to make machines understand what humans know and learn new knowledge based on what they already know. And the knowledge graph scale is a key step towards full intelligence.
In order to solve the many challenges of building large-scale knowledge graphs, the EpiK Protocol was born. EpiK Protocol is a decentralized, hyper-scale knowledge graph that organizes and incentivizes knowledge through decentralized storage technology, decentralized autonomous organizations, and generalized economic models. Members of the global community will expand the horizons of artificial intelligence into a smarter future by organizing all areas of human knowledge into a knowledge map that will be shared and continuously updated for the eternal knowledge vault of humanity
And then, for what reason was the fork chosen in the first place?
EpiK’s project founders are all senior blockchain industry practitioners and have been closely following the industry development and application scenarios, among which decentralized storage is a very fresh application scenario.
However, in the development process of Filecoin, the team found that due to some design mechanisms and historical reasons, the team found that Filecoin had some deviations from the original intention of the project at that time, such as the overly harsh penalty mechanism triggered by the threat to weaken security, and the emergence of the computing power competition leading to the emergence of computing power monopoly by large miners, thus monopolizing the packaging rights, which can be brushed with computing power by uploading useless data themselves.
The emergence of these problems will cause the data environment on Filecoin to get worse and worse, which will lead to the lack of real value of the data in the chain, high data redundancy, and the difficulty of commercializing the project to land.
After paying attention to the above problems, the project owner proposes to introduce multi-party roles and a decentralized collaboration platform DAO to ensure the high value of the data on the chain through a reasonable economic model and incentive mechanism, and store the high-value data: knowledge graph on the blockchain through decentralized storage, so that the lack of value of the data on the chain and the monopoly of large miners’ computing power can be solved to a large extent.
Finally, what differences exist between the forked project and Filecoin itself?
On the basis of the above-mentioned issues, EpiK’s design is very different from Filecoin, first of all, EpiK is more focused in terms of business model, and it faces a different market and track from the cloud storage market where Filecoin is located because decentralized storage has no advantage over professional centralized cloud storage in terms of storage cost and user experience.
EpiK focuses on building a decentralized knowledge graph, which reduces data redundancy and safeguards the value of data in the distributed storage chain while preventing the knowledge graph from being tampered with by a few people, thus making the commercialization of the entire project reasonable and feasible.
From the perspective of ecological construction, EpiK treats miners more friendly and solves the pain point of Filecoin to a large extent, firstly, it changes the storage collateral and commitment collateral of Filecoin to one-time collateral.
Miners participating in EpiK Protocol are only required to pledge 1000 EPK per miner, and only once before mining, not in each sector.
What is the concept of 1000 EPKs, you only need to participate in pre-mining for about 50 days to get this portion of the tokens used for pledging. The EPK pre-mining campaign is currently underway, and it runs from early September to December, with a daily release of 50,000 ERC-20 standard EPKs, and the pre-mining nodes whose applications are approved will divide these tokens according to the mining ratio of the day, and these tokens can be exchanged 1:1 directly after they are launched on the main network. This move will continue to expand the number of miners eligible to participate in EPK mining.
Secondly, EpiK has a more lenient penalty mechanism, which is different from Filecoin’s official consensus, storage and contract penalties, because the protocol can only be uploaded by field experts, which is the “Expert to Person” mode. Every miner needs to be backed up, which means that if one or more miners are offline in the network, it will not have much impact on the network, and the miner who fails to upload the proof of time and space in time due to being offline will only be forfeited by the authorities for the effective computing power of this sector, not forfeiting the pledged coins.
If the miner can re-submit the proof of time and space within 28 days, he will regain the power.
Unlike Filecoin’s 32GB sectors, EpiK’s encapsulated sectors are smaller, only 8M each, which will solve Filecoin’s sector space wastage problem to a great extent, and all miners have the opportunity to complete the fast encapsulation, which is very friendly to miners with small computing power.
The data and quality constraints will also ensure that the effective computing power gap between large and small miners will not be closed.
Finally, unlike Filecoin’s P2P data uploading model, EpiK changes the data uploading and maintenance to E2P uploading, that is, field experts upload and ensure the quality and value of the data on the chain, and at the same time introduce the game relationship between data storage roles and data generation roles through a rational economic model to ensure the stability of the whole system and the continuous high-quality output of the data on the chain.
Deep Chain Finance:
Eric, on the eve of Filecoin’s mainline launch, issues such as Filecoin’s pre-collateral have aroused a lot of controversy among the miners. In your opinion, what kind of impact will Filecoin bring to itself and the whole distributed storage ecosystem after it launches? Do you think that the current confusing FIL prices are reasonable and what should be the normal price of FIL?
Eric:
Filecoin mainnet has launched and many potential problems have been exposed, such as the aforementioned high pre-security problem, the storage resource waste and computing power monopoly caused by unreasonable sector encapsulation, and the harsh penalty mechanism, etc. These problems are quite serious, and will greatly affect the development of Filecoin ecology.
These problems are relatively serious, and will greatly affect the development of Filecoin ecology, here are two examples to illustrate. For example, the problem of big miners computing power monopoly, now after the big miners have monopolized computing power, there will be a very delicate state — — the miners save a file data with ordinary users. There is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. And after the big miners have monopolized computing power, there will be a very delicate state — — the miners will save a file data with ordinary users, there is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. Because I can fake another identity to upload data for myself, but that leads to the fact that for any miner I go to choose which data to save. I have only one goal, and that is to brush my computing power and how fast I can brush my computing power.
There is no difference between saving other people’s data and saving my own data in the matter of computing power. When I save someone else’s data, I don’t know that data. Somewhere in the world, the bandwidth quality between me and him may not be good enough.
The best option is to store my own local data, which makes sense, and that results in no one being able to store data on the chain at all. They only store their own data, because it’s the most economical for them, and the network has essentially no storage utility, no one is providing storage for the masses of retail users.
The harsh penalty mechanism will also severely deplete the miner’s profits, because DDOS attacks are actually a very common attack technique for the attacker, and for a big miner, he can get a very high profit in a short period of time if he attacks other customers, and this thing is a profitable thing for all big miners.
Now as far as the status quo is concerned, the vast majority of miners are actually not very well maintained, so they are not very well protected against these low-DDOS attacks. So the penalty regime is grim for them.
The contradiction between the unreasonable system and the demand will inevitably lead to the evolution of the system in a more reasonable direction, so there will be many forked projects that are more reasonable in terms of mechanism, thus attracting Filecoin miners and a diversion of storage power.
Since each project is in the field of decentralized storage track, the demand for miners is similar or even compatible with each other, so miners will tend to fork the projects with better economic benefits and business scenarios, so as to filter out the projects with real value on the ground.
For the chaotic FIL price, because FIL is also a project that has gone through several years, carrying too many expectations, so it can only be said that the current situation has its own reasons for existence. As for the reasonable price of FIL there is no way to make a prediction because in the long run, it is necessary to consider the commercialization of the project to land and the value of the actual chain of data. In other words, we need to keep observing whether Filecoin will become a game of computing power or a real value carrier.
Deep Chain Finance:
Leo, we just mentioned that the pre-collateral issue of Filecoin caused the dissatisfaction of miners, and after Filecoin launches on the main website, the second round of space race test coins were directly turned into real coins, and the official selling of FIL hit the market phenomenon, so many miners said they were betrayed. What I want to know is, EpiK’s main motto is “save the miners eliminated by Filecoin”, how to deal with the various problems of Filecoin, and how will EpiK achieve “save”?
Leo:
Originally Filecoin’s tacit approval of the computing power makeup behavior was to declare that the official directly chose to abandon the small miners. And this test coin turned real coin also hurt the interests of the loyal big miners in one cut, we do not know why these low-level problems, we can only regret.
EpiK didn’t do it to fork Filecoin, but because EpiK to build a shared knowledge graph ecology, had to integrate decentralized storage in, so the most hardcore Filecoin’s PoRep and PoSt decentralized verification technology was chosen. In order to ensure the quality of knowledge graph data, EpiK only allows community-voted field experts to upload data, so EpiK naturally prevents miners from making up computing power, and there is no reason for the data that has no value to take up such an expensive decentralized storage resource.
With the inability to make up computing power, the difference between big miners and small miners is minimal when the amount of knowledge graph data is small.
We can’t say that we can save the big miners, but we are definitely the optimal choice for the small miners who are currently in the market to be eliminated by Filecoin.
Deep Chain Finance:
Let me ask Eric: According to EpiK protocol, EpiK adopts the E2P model, which allows only experts in the field who are voted to upload their data. This is very different from Filecoin’s P2P model, which allows individuals to upload data as they wish. In your opinion, what are the advantages of the E2P model? If only voted experts can upload data, does that mean that the EpiK protocol is not available to everyone?
Eric:
First, let me explain the advantages of the E2P model over the P2P model.
There are five roles in the DAO ecosystem: miner, coin holder, field expert, bounty hunter and gateway. These five roles allocate the EPKs generated every day when the main network is launched.
The miner owns 75% of the EPKs, the field expert owns 9% of the EPKs, and the voting user shares 1% of the EPKs.
The other 15% of the EPK will fluctuate based on the daily traffic to the network, and the 15% is partly a game between the miner and the field expert.
The first describes the relationship between the two roles.
The first group of field experts are selected by the Foundation, who cover different areas of knowledge (a wide range of knowledge here, including not only serious subjects, but also home, food, travel, etc.) This group of field experts can recommend the next group of field experts, and the recommended experts only need to get 100,000 EPK votes to become field experts.
The field expert’s role is to submit high-quality data to the miner, who is responsible for encapsulating this data into blocks.
Network activity is judged by the amount of EPKs pledged by the entire network for daily traffic (1 EPK = 10 MB/day), with a higher percentage indicating higher data demand, which requires the miner to increase bandwidth quality.
If the data demand decreases, this requires field experts to provide higher quality data. This is similar to a library with more visitors needing more seats, i.e., paying the miner to upgrade the bandwidth.
When there are fewer visitors, more money is needed to buy better quality books to attract visitors, i.e., money for bounty hunters and field experts to generate more quality knowledge graph data. The game between miners and field experts is the most important game in the ecosystem, unlike the game between the authorities and big miners in the Filecoin ecosystem.
The game relationship between data producers and data storers and a more rational economic model will inevitably lead to an E2P model that generates stored on-chain data of much higher quality than the P2P model, and the quality of bandwidth for data access will be better than the P2P model, resulting in greater business value and better landing scenarios.
I will then answer the question of whether this means that the EpiK protocol will not be universally accessible to all.
The E2P model only qualifies the quality of the data generated and stored, not the roles in the ecosystem; on the contrary, with the introduction of the DAO model, the variety of roles introduced in the EpiK ecosystem (which includes the roles of ordinary people) is not limited. (Bounty hunters who can be competent in their tasks) gives roles and possibilities for how everyone can participate in the system in a more logical way.
For example, a miner with computing power can provide storage, a person with a certain domain knowledge can apply to become an expert (this includes history, technology, travel, comics, food, etc.), and a person willing to mark and correct data can become a bounty hunter.
The presence of various efficient support tools from the project owner will lower the barriers to entry for various roles, thus allowing different people to do their part in the system and together contribute to the ongoing generation of a high-quality decentralized knowledge graph.
Deep Chain Finance:
Leo, some time ago, EpiK released a white paper and an economy whitepaper, explaining the EpiK concept from the perspective of technology and economy model respectively. What I would like to ask is, what are the shortcomings of the current distributed storage projects, and how will EpiK protocol be improved?
Leo:
Distributed storage can easily be misunderstood as those of Ali’s OceanDB, but in the field of blockchain, we should focus on decentralized storage first.
There is a big problem with the decentralized storage on the market now, which is “why not eat meat porridge”.
How to understand it? Decentralized storage is cheaper than centralized storage because of its technical principle, and if it is, the centralized storage is too rubbish for comparison.
What incentive does the average user have to spend more money on decentralized storage to store data?
Is it safer?
Existence miners can shut down at any time on decentralized storage by no means save a share of security in Ariadne and Amazon each.
More private?
There’s no difference between encrypted presence on decentralized storage and encrypted presence on Amazon.
Faster?
The 10,000 gigabytes of bandwidth in decentralized storage simply doesn’t compare to the fiber in a centralized server room. This is the root problem of the business model, no one is using it, no one is buying it, so what’s the big vision.
The goal of EpiK is to guide all community participants in the co-construction and sharing of field knowledge graph data, which is the best way for robots to understand human knowledge, and the more knowledge graph data there is, the more knowledge a robot has, the more intelligent it is exponentially, i.e., EpiK uses decentralized storage technology. The value of exponentially growing data is captured with linearly growing hardware costs, and that’s where the buy-in for EPK comes in.
Organized data is worth a lot more than organized hard drives, and there is a demand for EPK when robots have the need for intelligence.
Deep Chain Finance:
Let me ask Leo, how many forked projects does Filecoin have so far, roughly? Do you think there will be more or less waves of fork after the mainnet launches? Have the requirements of the miners at large changed when it comes to participation?
Leo:
We don’t have specific statistics, now that the main network launches, we feel that forking projects will increase, there are so many restricted miners in the market that they need to be organized efficiently.
However, we currently see that most forked projects are simply modifying the parameters of Filecoin’s economy model, which is undesirable, and this level of modification can’t change the status quo of miners making up computing power, and the change to the market is just to make some of the big miners feel more comfortable digging up, which won’t help to promote the decentralized storage ecology to land.
We need more reasonable landing scenarios so that idle mining resources can be turned into effective productivity, pitching a 100x coin instead of committing to one Fomo sentiment after another.
Deep Chain Finance:
How far along is the EpiK Protocol project, Eric? What other big moves are coming in the near future?
Eric:
The development of the EpiK Protocol is divided into 5 major phases.
(a) Phase I testing of the network “Obelisk”.
Phase II Main Network 1.0 “Rosetta”.
Phase III Main Network 2.0 “Hammurabi”.
(a) The Phase IV Enrichment Knowledge Mapping Toolkit.
The fifth stage is to enrich the knowledge graph application ecology.
Currently in the first phase of testing network “Obelisk”, anyone can sign up to participate in the test network pre-mining test to obtain ERC20 EPK tokens, after the mainnet exchange on a one-to-one basis.
We have recently launched ERC20 EPK on Uniswap, you can buy and sell it freely on Uniswap or download our EpiK mobile wallet.
In addition, we will soon launch the EpiK Bounty platform, and welcome all community members to do tasks together to build the EpiK community. At the same time, we are also pushing forward the centralized exchange for token listing.
Users’ Questions
User 1:
Some KOLs said, Filecoin consumed its value in the next few years, so it will plunge, what do you think?
Eric:
First of all, the judgment of the market is to correspond to the cycle, not optimistic about the FIL first judgment to do is not optimistic about the economic model of the project, or not optimistic about the distributed storage track.
First of all, we are very confident in the distributed storage track and will certainly face a process of growth and decline, so as to make a choice for a better project.
Since the existing group of miners and the computing power already produced is fixed, and since EpiK miners and FIL miners are compatible, anytime miners will also make a choice for more promising and economically viable projects.
Filecoin consumes the value of the next few years this time, so it will plunge.
Regarding the market issues, the plunge is not a prediction, in the industry or to keep learning iteration and value judgment. Because up and down market sentiment is one aspect, there will be more very important factors. For example, the big washout in March this year, so it can only be said that it will slow down the development of the FIL community. But prices are indeed unpredictable.
User2:
Actually, in the end, if there are no applications and no one really uploads data, the market value will drop, so what are the landing applications of EpiK?
Leo: The best and most direct application of EpiK’s knowledge graph is the question and answer system, which can be an intelligent legal advisor, an intelligent medical advisor, an intelligent chef, an intelligent tour guide, an intelligent game strategy, and so on.
submitted by EpiK-Protocol to u/EpiK-Protocol [link] [comments]

‘Boring’ Bitcoin Market Sends Miners’ Fee Earnings to 3-Month Low

‘Boring’ Bitcoin Market Sends Miners’ Fee Earnings to 3-Month Low

Image: Andre Francois Mckenzie - Unsplash
Bitcoin’s (BTC) on-chain transaction activity has cooled amid the recent lull in price action, and that’s hurting miners’ earnings.
The cryptocurrency's blockchain processed 231,437 transactions on Oct. 18, the lowest since May 24, according to data provided by blockchain analytics firm Glassnode.
That means the daily transaction count was down nearly 40% from a peak of 382,408 observed on July 1.
With network processing far fewer transactions currently, the percentage of miners' revenue derived from fees also dropped to a three-month low of 3.49% over the weekend.
Last week, CoinDesk reported bitcoin's hashrate had hit a new high as a record amount of computing power was applied to mining on the network.
The slide in the tally of transactions is the result of the cryptocurrency's low-volatility trading of late, and may have bullish implications for price, according to analysts.
Continue reading for charts and graphs
Originally published by Omkar Godbole | October 19, 2020 Coindesk
submitted by kjonesatjaagnet to JAAGNet [link] [comments]

In Light of CipherTrace, Let's Talk Opsec

So I was very skeptical at first, but Dave maybe convinced me about 10% that they have some level of capability in the direction they're suggesting. The techniques are stuff we've known, and it would require large computational resources, combined with loads of offchain data, but maybe they have taken efforts to the next level. It's my belief that govts and banks really dislike Monero. So with that in mind lets give them some small benefit of the doubt and take some creative license:
Again, they would need some serious computational power and off-chain data feeds. I also imagine that their models suffer from time-decay, especially without a constant stream of hueristic data. Notice at the end he emphasized opsec. Here, I really do believe him. So finally, lets talk opsec.
I have mixed feelings on this. One of our selling points is default privacy made easy. A lot of what I wrote above doesn't exactly sound simple. On the other hand, crypto is about self responsibility and knowledge. Most people ought to have been adhering to at least the basics (ToVPN, new subaddresses, run your own node). But even if we give CT the benefit of the doubt, the following is still true:
Newb use of Monero is far more private than ninja use of Bitcoin.
submitted by bawdyanarchist to Monero [link] [comments]

[SHARE] Fulfilled Request Megathread 4 FREE DOWNLOAD

Download any of these for free at https://oppfiles.com/585933
DM me if you have any requests for anything not on the list.
Please subscribe the sub to find all the eBook releases. Enjoy!
[BOOK] 'The macabresque : human violation and hate in genocide, mass atrocity and enemy-making' Edward Weisband, Oxford University Press 2018(self) 1 [BOOK] Scotland After the Ice Age Environment, Archaeology and History 8000 BC - AD 1000(self) 1 [Book] Ethics of Captivity edited by Lori Gruen(self) 1 [Book] Aspects of American History By Simon Henderson(self) 1 [Book] The Soviet Colossus History and Aftermath By Michael G. Kort(self) 1 [BOOK] Challenges to Political Decision-making Dealing with Information Overload, Ignorance and Contested Knowledge(self) 5 [Article] The EU Competition Law Fining System: A Reassessment, Damien Geradin(self) 1 [Book] Russia and the USSR, 1855–1991 Autocracy and Dictatorship ByStephen J. Lee(self) 1 [Book] Søren Kierkegaard: Epistemology and psychology : Kierkegaard and the recoil from freedom - Daniel W. Conway, K. E. Gover(self) 4 [ARTICLE] 'A History of Reason in the Age of Insanity: The Deconstruction of Foucault in Hegel’s Phenomenology' The Owl of Minerva, Volume 25, Issue 1, Fall 1993, Andrew Cutrofello Pages 15-21(self) 1 [BOOK] Mere Civility by Teresa M. Bejan(self) 2 [book] The Philosophy Shop by Peter Worley(self) 1 [BOOK] Sentenciando Trafico - Marcelo Semer(self) 1 [Article] GENETIC INSTABILITY ASSOCIATED WITH BREAK-INDUCED REPLICATION(self) 1 [Article] Properties of elastic bodies in contact - J. Dundurs 1975(self) 2 [Article] Transition alumina phases induced by heat treatment of boehmite: An X-ray diffraction and infrared spectroscopy study(self) 1 [Book] Russian Companion by James Cooper(self) 1 [Book] Model Stock Purchase Agreement with Commentary, by American Bar Association(self) 1 [Book] A History of Modern France By Jeremy D. Popkin(self) 1 [Book] Mathematical Notation: A Guide for Engineers and Scientists(self) 1 [Book] The Epistemological Significance of the Interrogative by James Somerville(self) 1 [Book] Looking for Managing Human Resources 11e. by Cascio, Wayne F.(self) 4 [Article] XVIII. The arrangement of atoms in crystals(self) 4 [Article] I am looking for "The Myth of Cartesian Privacy"(self) 5 [Book] Litigating morality : American legal thought and its English roots(self) 4 [Article] Child-on-child sexual abuse: An investigation of behavioral and emotional sequelae(self) 1 [Book] La proyección del neoliberalismo: Las transformaciones del cine mexicano (1988–2012)(self) 1 [Book] Handbook of Research on Online Discussion-Based Teaching Methods - Lesley Wilton and Clare Brett(self) 2 [Article] Turning up the Lights on Gaslighting by Kate Abramson in Philosophical Perspectives, 2014.(self) 8 [Book] Punishment and Social Structure by Rusche and Kirchheimer(self) 3 [Article] A Strong Leader for A Time of Crisis: Xi Jinping’s Strongman Politics as A Collective Response to Regime Weakness(self) 1 [Book] Nünning, Ansgar and Carola Surkamp - Englische Literatur unterrichten I: Grundlagen und Methoden(self) 2 [Article] Multicultural attitudes and cultural intelligence of preschool teachers, by Çağrı Peköz, Ayşe Işık Gürşimşek , 2020(self) 4 [Book] Statistics for Business and Economics, 4th Edition, 2017, David Anderson, Dennis Sweeney, Thomas Williams, Jim Freeman, Eddie Shoesmith(self) 4 [Article] Evaluation of Occupant Loading in Low- to Moderate-Speed Frontal and Rear-End Motor Vehicle Collisions(self) 1 [Book] Theories of Multiculturalism by George Crowder(self) 6 [BOOK] A Dictionary of Critical Theory (2nd Ed.) by Ian Buchanan(self) 0 "The People’s Charter and the Enigmatic Mr. Maltman Barry", by Paul Martinez (1980) [Article](self) 4 [Book] Rössner, Philipp (ed) 2015 On Commerce and Usury (1524) by Martin Luther. Anthem Press.(self)NSFW 4 [Article] Electronic documents give reproducible research a new meaning(self) 1 [ARTICLE] A Three Square Geometry Problem by Charles Trigg(self) 1 [BOOK] Structure And Mechanism In Protein Science: A Guide To Enzyme Catalysis And Protein Folding (Structural Biology) Reprint Edition(self) 1 [BOOK] Genetic Analysis: Genes, Genomes, and Networks in Eukaryotes 2nd Edition by Philip Meneely(self) 2 [Article] Ultimate Strength Design of Reinforced Concrete Chimmneys. Rumman, W.S., and Sun, R. Y.,1977(self) 1 [book] Signs of civilisation : the characters that changed Europe(self) 1 [Book] Social Class : How Does It Work? by Annette Lareau; Dalton Conley(self) 1 [book] Garner's Dictionary of Legal Usage Third Edition(self) 1 [book] The Integration of MILLION into the English System of Number Words(self) 1 [Book] Connected Speech: The Interaction of Syntax and Phonology - Ellen Kaisse(self) 2 [BOOK] Statistics Using R: An Integrative Approach(self) 4 [Article] Rethinking International Institutionalisation through Treaty Organs by Gloria Fernández Arribas(self) 1 [Book] Parasitic Gaps - Peter W. Culicover and Paul M. Postal(self) 4 [Book] The Global Economy A Concise History Edited By Franco Amatori, Andrea Colli(self) 7 [Article] "Sorting out the ethics of propaganda", Stanley Cunningham(self) 1 [Book] Diet, Life-Style, and Mortality in China: A Study of the Characteristics of 65 Chinese Counties(self) 2 [Article] “Some Degenerate Entrepreneur Fleeing From a Medicine Show”: Judge Holden in The Age of P.T. Barnum(self) 4 [Article] Christoph Witzel and Matteo Toscani, "How to make a #theDress," J. Opt. Soc. Am. A 37, A202-A211 (2020)(self) 4 [Article] [Heinonline] The Emergence and Fallacy of 'China's Debt-Trap Diplomacy' Narrative(self) 5 [Article] [Heinonline] US-Philippines Defense Cooperation during the Duterte Administration: Adjustments and Limitations(self) 8 [Supplement] Polariton Z Topological Insulator, A. V. Nalitov, D. D. Solnyshkov, and G. Malpuech(self) 4 [BOOK] HILL, Christopher. Intellectual Origins of the English Revolution - Revisited.(self) 11 [Article] Post-National Citizenship in Europe: The EU as a Welfare Rights Generator, by Marlene Wind.(self)NSFW 4 [Chapter] The Russian and Chinese Revolutions Compared S. A. Smith from The Oxford Handbook of Modern Russian History(self) 2 [Book] Beyond the Annual Budget: Global Experience with Medium Term Expenditure Frameworks(self) 1 [Book] How Art Can Be Thought: A Handbook for Change - Allan deSouza(self) 1 [Article] Surgical treatment of neuromuscular scoliosis: current techniques(self) 5 [Chapter] Desire, Mimetic Theory, and Original Sin(self) 1 [Book] Dayen, David 2020 Monopolized Life: in the Age of Corporate Power. The New Press.(self) 1 [book] Penetrating Language A Critical Discourse Analysis of Pornography(self) 1 [book] Presentation in Language: Rethinking Speech and Writing(self) 4 [Article] Can someone find the full article for me?(self) 1 [BOOK] Genera Palmarum: the evolution and classification of palms by John Dransfield and Natalie W. Uhl(self) 1 [book] Orthography, Variation, and the Creation of Meaning in Written Japanese(self) 4 [Chapter] The Relative Cycle in Hungarian Declaratives, Julia Bacskai-Atkari(self) 1 [Article] Involvement of MicroRNA Mir15a in Control of Human Ovarian Granulosa Cell Proliferation, Apoptosis, Steroidogenesis, and Response to FSH(self) 1 [Chapter], in Violence in War and Peace: An Anthology by Nancy Scheper-Hughes & Philippe Bourgois (Editors)(self) 1 [Chatper], in Violence in War and Peace: An Anthology by Nancy Scheper-Hughes & Philippe Bourgois (Editors)(self) 1 [book] Oxford Dictionary of Proverbs (6 ed.)(self) 1 [Book] The Origins of the First World War ByJames Joll, Gordon Martel(self) 4 [Chapter] The Feminist Standpoint Theory Reader: Intellectual and Political Controversies(self) 4 [BOOK] Early Events in Monocot Evolution by Paul Wilkin and Simon J. Mayo(self) 5 [Book] BRIGGS, Robin. "Communities of Belief: Cultural and Social Tensions in Early Modern France"(self) 2 [Article] Transgenerational Epigenetics: A Window into Paternal Health Influences on Offspring(self) 3 [Thesis] Earthquake risk assessment of building structures(self) 1 [Article] Factors associated with women achieving and maintaining abstinence from alcohol: a rapid evidence assessment(self) 1 [Thesis/Article] Earthquake risk assessment of building structures(self) 1 [BOOK] Censorship and Propaganda in World War I, 2019(self) 3 [article] A new device producing ambulatory intermittent pneumatic compression suitable for the treatment of lower limb oedema: A preliminary report(self) 1 [Article] Kinetic Modeling and Optimization of the Release Mechanism of Curcumin from Folate Conjugated Hybrid BSA Nanocarrier(self) 1 [Article] Lawrence Transfer Factor: Transference of Specific Immune Memory by Dialyzable Leukocyte Extract from a CD8+ T Cell Line(self) 1 [Book] he Origins of the First World War William Mulligan(self) 1 2 [Article] Biteye: A System for Tracking Bitcoin Transactions(self) 1 [BOOK] A Photographic Atlas of Developmental Biology. 2005. Shirley J. Wright. Morton.(self) 4 [Other] Philippine Daily Inquirer July 16, 2020(self) 1 [BOOK] Letters on Familiar Matters, Volume 1 by Francesco Petrarch(self) 2 [Article] Optical fiber micro-devices made with femtosecond laser by Kaiming Zhou, Fangcheng Shen, Guolu Yin, and Lin Zhang(self) 3 [BOOK] Need a book from Oxford Scholarship online: The Oxford Francis Bacon Vol. 6(self) 1 [BOOK] I need OBSERVATIONAL ASTRONOMY by D. Scott Birney(self) 4 [Article] Homeostatic Plasticity Shapes the Retinal Response to Photoreceptor Degeneration by Shen, Wang, Soto and Kerchensteiner.(self) 1 [Artikel] Homeostatic Plasticity Shapes the Retinal Response to Photoreceptor Degeneration by Shen, Wang, Soto and Kerchensteiner(self) 3 [Article][Request] Anyone have access to this article?(self) 7 [Article] The idea that everything from spoons to stones is conscious is gaining academic credibility (Quartz)(self) 2 [Article](self) 1 [BOOK] Need a german book from JSTOR, "Politisches Skandalmanagement: Strategien der Selbstverteidigung in politischen Affären der Bundesrepublik Deutschland "(self) 1 [BOOK] The Oxford Handbook of Ethics of AI(self) 1 [ARTICLE] Are natural scientists more masculine than humanists? The association patterns between 2D:4D ratio and field of study by Kainz, Sarah; Weitzer, Jakob; Zingale, Stefania; Köllner, Johanna; Albrecht, Cornelia; Gaidora, Angelika; Rudorfer, Marie-Theres; Nürnberger, Anna; Kirchengast, Sylvia(self) 1 [Book] The Crisis of Criticism - Maurice Berger (editor)(self) 2 [Book] Handbook of Nonprescription Drugs: An Interactive Approach to Self-Care, 19th Edition(self) 1 [Book] 'Le discours pornographique' Marie-Anne Paveau, La Musardine, 2014(self) 8 [Article] Allocation and Operation of A Hydropneumatic Energy Storage with Building Microgrid(self) 1 [ARTICLE] L'information internationale en Amérique du Sud: les agences et les réseaux, circa 1874-1919, 2013(self) 1 [Book] The Beaultiful Fall: Fashion, Genius and Glorious Excess in 1970s Paris, Alicia Drake(self) 4 [BOOK] 'Sociology and the Sacred: An Introduction to Philip Rieff's Theory of Culture' Antonius A.W. Zondervan, University of Toronto Press, 2005(self) 1 [Article] Flavell, J. (1987). Speculations about the nature and development of metacognition. In F. Weinert & R. Kluwe (Ed.), Metacognition, motivation, and understanding (p. 21-29). Hillsdale, NJ: Lawrence Erlbaum.(self) 1 [Book] Health Policy Management: A Case Approach 1st Edition(self) 3 [BOOK] Visions and Ideas of Europe during the First World War, 2019(self) 4 [Article] Opioids After Surgery in the United States Versus the Rest of the World The International Patterns of Opioid Prescribing (iPOP) Multicenter Study by Kaafarani, Haytham M. A. MD, MPH*; Han, Kelsey BSc*; El Moheb, Mohamad MD et al(self) 1 [ARTICLE] "Who Is This?" Narration of the Divine Identity of Jesus in Matthew 21:10—17, Andrew E. Nelson(self) 2 [Book] Origins of value: The financial innovations that created modern capital markets(self) 1 [Article] Automation of in-hospital pharmacy dispensing: a systematic review by Sarah Batson, Ana Herranz, Nicolas Rohrbach, Michela Canobbio, Stephen A Mitchell, Pascal Bonnabry(self) 1 [Book] Manual of Pediatric Balance Disorders - Robert C. O'Reilly(self) 1 [Article] Primary adrenal failure and central nervous system lesions: a rare case report of primary adrenal lymphoma by Cristina P. Correia, José G. Freitas, António Martins, Jorge Oliveira(self) 1 [Book] Portable Literature: Reading, Reacting, Writing(self) 5 [BOOK] Lawfare: Law as a Weapon of War - Orde F. Kittrie(self) 3 [Article] Dismantling Restrictive Gender Norms: Can Better Designed Paternal Leave Policies Help? by Negar Omidakhsh, Aleta Sprague, & Jody Heymann(self) 1 [BOOK] Modernization from the Other Shore: American Intellectuals and the Romance of Russian Development by David Engerman(self) 1 [Article] Torsional Response of Reinforced Fibrous Concrete Beams(self) 1 [Book] Language change by Joan Bybee(self) 1 [Book] [Taylor and Francis] The Routledge Handbook of North American Languages(self) 3 [Thesis] "Gas-Surface Desorption and Scattering Processes: Development and Application of the Random Corrugation Model"(self) 1 [Book] Reinventing the Museum: The Evolving Conversation on the Paradigm Shift (2nd Edition)(self) 1 [BOOK] When Police Kill - Franklin Zimring(self) 1 [article] DNA Vaccine Delivery and Improved Immunogenicity Kevin R. Porter and Kanakatte Raviprakash(self) 7 [BOOK] 'The Triumph of the Therapeutic: Uses of Faith after Freud', Philip Rieff, 1973(self) 1 [book] Verbs, Clauses and Constructions: Functional and Typological Approaches(self) 6 [Book] Special Duty: A History of the Japanese Intelligence Community by Richard J. Samuels(self) 7 [BOOK] The Right to Know: Transparency of an Open World by Ann Florini(self) 4 [BOOK] At Home in Two Countries: The Past and Future of Dual Citizenship by Peter J Spiro(self) 1 [BOOK] 'Mesolithic Europe' Geoff Bailey & Penny Spikins, 2008/2010(self) 7 [BOOK] 'Nietzsche and the Clinic: Psychoanalysis, Philosophy, Metaphysics' Jared Russell, 2017(self) 1 [book] Lexical Properties of Selected Non-native Morphemes of English(self) 4 [BOOK] 'Wild Things: Recent advances in Palaeolithic and Mesolithic research' Frederick W. F. Foulds, 2014(self) 2 [Article] Thoracoabdominal Aneurysm Surgery(self) 1 [BOOK] Research handbook on climate governance(self) 2 [Book] High-Performance Compilers for Parallel Computing by Michael Wolfe(self) 3 [Article] Cosmic Cinema: On the Philosophical Films of Terrence Malick(self) 3 [Book] Critical thinking about research.(self) 6 [Supplement] Transposable elements in mammals promote regulatory variation and diversification of genes with specialized functions, Louie N.van de Lagemaat Josette-RenéeLandry Dixie L.MagerPatrikMedstrand(self) 1 [BOOK] Crisis Elections, New Contenders and Government Formation. Breaking the Mould in Southern Europe - Anna Bosco & Susannah Verney(self) 4 [Article] Legal and Ethical Imperatives for Using Certified Sign Language Interpreters in Health Care Settings(self) 5 [Article] Bottles and Bricks: Rethinking the Prohibition against Violent Political Protest by Jennifer Kling & Megan Mitchell(self) 6 [Book] Corruption in International Investment Arbitration - Aloysius Llamzon(self) 5 [Article] Sports prediction and betting models in the machine learning age: The case of Tennis, Wilkes 2019.(self) 1 [chapter] Handwriting Recognition Systems and Applications(self) 3 [Article] Designing robust policies under deep uncertainty for mitigating epidemics, Siddhartha Paul, Jayendran Venkateswaran(self) 4 [ARTICLE] IJSSSP: TLS Certificates of the Tor Network and Their Distinctive Features(self) 1 [Book] Methods in Yeast Genetics and Genomics, 2015 Edition: A CSHL Course Manual(self) 3 [Article] Optically improved mitochondrial function redeems aged human visual decline(self) 4 [ARTICLE] Getting Involved with Time: Notes on the Analysis of a Schizoid Man (PROQUEST)(self) 7 [Book] URGENT If you have access to Project MUSE please help me with finding the pdf of "Where is Ana Mendieta"(self) 4 [Book] Rites, rights and rhythms: a genealogy of musical meaning in Colombia's black pacific by Michael Birenbaum Quintero(self) 1 [BOOK] Corrupt Research: The Case for Reconceptualizing Empirical Management and Social Science by Raymond Hubbard(self) 4 [Thesis] Protecting education from attack: Humanitarian agencies and the implementation of a new global norm in the case of Palestine (Proquest)(self)NSFW 3 [Chapter] from A History of the Soviet Union From the Beginning to Its Legacy By Peter Kenez chapter 11,12,13(self) 2 [Article] The effects of NBPTS‐certified teachers on student achievement + Douglas N. Harris Tim R. Sass(self) 5 [Book] Nietzsche and Contemporary Ethics - Simon Robertson(self) 1 [Book] Smolensk Under the Nazis: Everyday Life in Occupied Russia(self) 1 [Article] [Ingenta] A Study on the Complementary Economy of China and the Philippines Under the New Normal Situation (2010-2016) by Zhu Bin and Jing Lei(self) 4 [Article] Weavers, Merchants and Company: The Handloom Industry in Southeastern India 1750-1790 by S. Arasaratnam(self) 1 [BOOK] Legacies of the Left Turn in Latin America: The Promise of Inclusive Citizenship - Manuel Balán & Françoise Montambeault(self) 6 [Article] Autonomous industrial mobile manipulation (AIMM): past, present and future. Author: Mads Hvilshøj, Simon Bøgh, Oluf Skov Nielsen, Ole Madsen.(self) 1 Removed: Pending moderation REQUEST [eBook] The Assessment Book – Physiotutors Guide to Orthopedic Physical Assessment(self) 1 [Article] [Brill] The Tragedy of Small Power Politics: The Philippines in the South China Sea by Charmaine Misalucha-Willoughby and Robert Joseph Medillo(self) 1 [BOOK] Echo and Reverb: Fabricating Space in Popular Music Recording, 1900-1960(self) 5 [Article] EFFECTS OF HIGH CONCENTRATIONS OF PLANT OILS AND FATTY ACIDS FOR MYCELIAL GROWTH AND PINHEAD FORMATION OF HERICIUM ERINACEUM(self) 1 [Article] [HeinOnline] "Disposable Deontology: The Death Penalty" by Tung Yin(self) 2 [Article] Efficient conversion of pretreated brewer’s spent grain and wheat bran by submerged cultivation of Hericium erinaceus(self) 1 [Chapter] The Imperial Institute: The state and the development of the natural resources of the Colonial Empire, 1887–1923(self) 1 [Book] Pieter Steyn - Zapuphizo: Voice of the Nagas(self) 3 [Article] Critical Constructivism and Postphenomenology: Ethics, Politics, and the Empirical(self) 5 [BOOK] Political Populism: A Handbook - Reinhard C. Heinisch, Christina Holtz-Bacha, Oscar Mazzoleni (Ed.)(self) 1 [BOOK] Effective Strategies for Protecting Human Rights(self) 4 [BOOK] The Unprovability of Consistency - George Boolos(self) 1 [BOOK] 'The Unity of Hegel's Phenomenology of Spirit: A Systematic Interpretation' Jon Stewart, Northwestern University Press (2000)(self) 1 [Book] Campus Wars by Kenneth J Heineman(self) 3 [Article] Circuit Theory for Waveguiding, Robert E. Collin(self) 1 [Other] [UpToDate] Attention deficit hyperactivity disorder in adults: Epidemiology, pathogenesis, clinical features, course, assessment, and diagnosis(self) 2 [BOOK] Quark-Gluon Plasma: From Big Bang to Little Bang(self) 10 [Book] The Representation of (in)definiteness - It's on archive.org but I can't seem to be able to download it(self) 1 [Book] Aginid bayok sa atong tawarik(self) 1 [Book] Political Economy In Macro Economics By Allan Drazen and Political Control of the Economy By Edward R. Tufte(self) 4 [Book] The Routledge Companion to Animal-Human History(self) 4 [Article] Inventing Brands: Opportunities at the Nexus of Semiotics and Intellectual Property by Conley, J. G.(self) 6 [Chapter] MULTICULTURALISM, OR, THE CULTURAL LOGIC OF MULTINATIONAL CAPITALISM by Slavoj Zizek(self) 5 [Article] Value articulation : A framework for the strategic manage- ment of intellectual property by Conley, James G., Peter M.Bican, and Holger Ernst(self) 3 [Book](JSTOR)Why We Believe: Evolution and the Human Way of Being by Agustin Fuentes(self) 1 [Book](self) 1 [Book] Ottoman Explorations of the Nile: Evliya Çelebi’s Map of the Nile and The Nile Journeys in the Book of Travels (Seyahatname) - Dankoff, Tezcan & Sheridan(self) 1 [Article] The Jewels of Adad by FNH Al-Rawi, JA Black(self) 1 [article] A measurement of collective learning effects in Italian high-tech milieux(self) 1 [Article] Parasympathetic activity is reduced during slow-wave sleep, but not resting wakefulness, in patients with chronic fatigue syndrome - Fatt et al., 2020(self) 1 [Book] Linked Data for Libraries, Archives, and Museums, by Seth van Hooland and Ruben Verborgh(self) 4 [Book] The Oxford Handbook of Well-Being and Public Policy - Edited by Matthew D. Adler and Marc Fleurbaey(self) 4 [Book] The Ostrich Communal Nesting System(self) 1 [Article] Protracted Effects of Ketamine Require Immediate Kappa Opioid Receptor Activation and Long‐Lasting Desensitization - Jacobson et al., 2020(self) 1 [Book] The Routledge Handbook to the Political Economy and Governance of the Americas by Olaf Kaltmeier et al.(self) 1 [Article] Dispute Resolution Provisions of the Energy Charter by Philippe Pinsolle(self) 1 [Book] Regional Development and Planning for the 21st Century New Priorities, New Philosophies(self) 4 [BOOK] Need a book from Oxford Scholarship online on International law subject.(self) 1 [Book] Prehispanic Settlement Patterns in the Upper Mantaro and Tarma Drainages, Junín, Peru: Volume 2, The Wanka Region(self) 4 [Book] Varieties of Virtue Ethics - David Carr, James Arthur, Kristján Kristjánsson(self) 4 [Article] Combustion Characteristics of a Swirled Burner Fueled With Waste Cooking Oil(self) 1 [BOOK] 'Beyond pleasure : Freud, Lacan, Barthes' by Margaret Iversen(self) 5 [Article] Empirical Studies of Adolescent Sexual Behavior: A Critical Review(self) 3 [Article]The sexual attitudes, behavior, and relationships of women with histrionic personality disorder(self) 2 Midsommar: Thing Theory [Article](self) 6 [Article] Microdosing psychedelics as cognitive and emotional enhancers.(self) 1 [Book] (Taylor&Francis) Human Evolution An Introduction to Man's Adaptations by Bernard Campbell(self) 1 [Article] Changing settlement patterns in the upper Mantaro Valley, Peru(self) 1 [BOOK] Fighting for Abortion Rights in Latin America Social Movements, State Allies and Institutions - Cora Fernández Anderson(self) 1 [Chapter] from the book The Crimean War: 1853–1856 Winfried Baumgart chapter 1 , 3 ,18(self) 1 [Book] Models of Integrity: Art and Law in Post-Sixties America -Joan Kee(self) 3 [Article] Forensic medical evaluation of children who present with suspected sexual abuse: How do we know what we know? by Grace Wong(self) 4 [book] Grammatical Voice — Fernando Zúñiga and Seppo Kittilä(self) 2 [Article]Naturally occurring 5′ preS1 deletions markedly enhance replication and infectivity of HBV genotype B and genotype C (supplementary materials)(self) 1 [Book] Commercial Real Estate Analysis and Investments (International) 3rd Edition(self) 2 [Book] Best Practices Guide to Residential Construction: Materials, Finishes, and Details by Steven Bliss(self) 2 [Book] Green Logistics: Improving the Environmental Sustainability of Logistics(self) 1 [Article] Black Codes and Slave Codes by Nakia D. Parker(self) 1 [Book] Marsh's Becoming a Teacher(self) 4 [Book] Germans Against Nazism: Nonconformity, Opposition and Resistance in the Third Reich: Essays in Honour of Peter Hoffmann by Francis R. Nicosia and Lawrence D. Stokes(self) 4 [Chapter] The Standard Story and Its Rivals(self) 1 [BOOK]Agrarian and Other Histories Essays for Binay Bhushan Chaudhuri - Edited by Shubhra Chakrabarti and Utsa Patnaik(self) 1 [Book] Regional modernities : the cultural politics of development in India. Ed. K. Sivaramakrishnan; Arun Agrawal(self) 1 [Chapter] Damping in Structures(self) 1 [Book] Gerontología y geriatría: valoración e intervención. Editorial Médica Panamericana. José Carlos Millán-Calentí(self) 1 [Book] Lotman's Cultural Semiotics and the Political - Makarychev & Yatsyk (2017)(self) 2 [Book] (Brill) The Handbook of Austroasiatic Languages (2 vols)(self) 1 [Book] Indian Films in Soviet Cinemas: The Culture of Movie-going After Stalin by Sudha Rajagopalan(self) 4 [BOOK] Decolonizing Theory: Thinking across Traditions by Aditya Nigam (1st edition, Bloomsbury India)(self) 3 [Request] [Article] Cell-by-Cell Deconstruction of Stem Cell Niches(self) 1 [Book] Social research methods- fifth edition, Bryman, Alan (2016)(self) 4 [Book]Chinese and Indian Warfare – From the Classical Age to 1870(self) 1 [Book] PC-Forensik Christoph Willer(self) 1 [Book] Designing for Empathy: Perspectives on the Museum Experience(self) 4 [book] American Communism and Black Americans by Philip Foner(self) 4 [Book] Marcus Franke : War and Nationalism in South Asia The Indian State and the Nagas(self) 8 [BOOK] Natural Resources, Extraction and Indigenous Rights in Latin America. Exploring the Boundaries of Environmental and State-Corporate Crime in Bolivia, Peru, and Mexico(self) 1 [Book] International Human Rights Law (3rd edn) Edited by Daniel Moeckli - Oxford University Press(self) 4 [Book] Participatory Heritage, Edited by Henriette Roued-Cunliffe , Andrea Copeland(self) 4 [BOOK] Political Representation in Southern Europe and Latin America Before and After the Great Recession and the Commodity Crisis - André Freire, Mélany Barragán, Xavier Coller, Marco Lisi, Emmanouil Tsatsanis(self) 4 [BOOK] Latin America and Policy Diffusion From Import to Export - Osmany Porto de Oliveira, Cecilia Osorio Gonnet, Sergio Montero, Cristiane Kerches da Silva Leite(self) 0 [Book] Sexual behaviour in Britain: The National Survey of Sexual Attitudes and Lifestyles (1994)(self) 1 [book] Studien zur Hirnpathologie und Psychologie - Pick, Arnold(self) 4 [Other] Special Issue, Blockchain innovation and public policy, Journal of Entrepreneurship and Public Policy: Volume 9 Issue 2(self) 4 [BOOK] baby jails: the fight to end the incarceration of refugee children in america/ jstor account??(self) 1 [Journal] Special Issue: Blockchain innovation and public policy, Journal of Entrepreneurship and Public Policy, Volume 9, Issue 2(self) 1 [Book] Blackstone's EU Treaties and Legislation 2019-2020 (20th ed)(self) 3 [article] Deep Graph Kernels(self) 5 [Book] Routledge Handbook of the South Asian Diaspora - By Joya Chatterji, David Washbrook(self) 4 [Book] Growth and distribution(self) 1 [BOOK] The Radical Left in Europe in the Age of Austerity - Babak Amini(self) 4 [Book] Political Myth by Christopher Flood (Routledge) (2002)(self) 2 [Article] Robotic Assisted Radical Cystectomy vs Open Radical Cystectomy: Systematic Review and Meta-Analysis + Niranjan J Sathianathen et al(self) 1 [Book] Folk Art Potters of Japan Beyond an Anthropology of Aesthetics (Routledge) by Brian Moeran(self) 1 [book] Revolution: How the Bicycle Reinvented Modern Britain(self) 5 [BOOK] Radical Left Movements in Europe - Magnus Wennerhag, Christian Fröhlich, Grzegorz Piotrowski(self) 4 [BOOK] Party System Change, the European Crisis and the State of Democracy - Marco Lisi(self) 5 [BOOK] Routledge Handbook of Contemporary European Social Movements. Protest in Turbulent Times - Cristina Flesher Fominaya, Ramon A. Feenstra(self) 4 [Book] Attorney-Client Privilege in International Arbitration(self) 1 [Article] An Alternative Ontology of Food Beyond Metaphysics by Lisa Heldke. Published in Radical Philosophy Review, Vol 15, Issue 1, 2012(self) 1 [Book] Bello, Walden 2005 Dilemmas of Domination: The Unmaking of the American Empire. Zed Books, 2005.(self) 1 [Article] Owning the PastOwning the Past Reply to Stokes(self) 1 [Article] Owning the PastOwning the Past Reply to Stokes(self) 1 [Book] McQuire, Scott. Crossing the Digital Threshold. Brisbane: Australian Key Centre for Cultural and Media Policy, Faculty of Humanities, Griffith University, 1997.(self) 3 [Book] Request: Migration and the Refugee Dissensus in Europe: Borders, Security and Austerity by Nicos Trimikliniotis.(self) 9 [Article] Masculinity in videogames: the gendered gameplay of Silent Hill(self) 1 [BOOK] 'Truth games : lies, money, and psychoanalysis' by John Forrester, Harvard University Press, 2000(self) 1 [Book] Osterloh, Jörg, und Clemens Vollnhals. NS-Prozesse Und Deutsche Öffentlichkeit: Besatzungszeit, Frühe Bundesrepublik Und DDR.(self) 2
submitted by jaylenholt to ebookleaksdownload [link] [comments]

Review and Prospect of Crypto Economy-Development and Evolution of Consensus Mechanism (2)

Review and Prospect of Crypto Economy-Development and Evolution of Consensus Mechanism (2)

https://preview.redd.it/a51zsja94db51.png?width=567&format=png&auto=webp&s=99e8080c9e9b1fb5e11cbd70f915f9cb37188f81
Foreword
The consensus mechanism is one of the important elements of the blockchain and the core rule of the normal operation of the distributed ledger. It is mainly used to solve the trust problem between people and determine who is responsible for generating new blocks and maintaining the effective unification of the system in the blockchain system. Thus, it has become an everlasting research hot topic in blockchain.
This article starts with the concept and role of the consensus mechanism. First, it enables the reader to have a preliminary understanding of the consensus mechanism as a whole; then starting with the two armies and the Byzantine general problem, the evolution of the consensus mechanism is introduced in the order of the time when the consensus mechanism is proposed; Then, it briefly introduces the current mainstream consensus mechanism from three aspects of concept, working principle and representative project, and compares the advantages and disadvantages of the mainstream consensus mechanism; finally, it gives suggestions on how to choose a consensus mechanism for blockchain projects and pointed out the possibility of the future development of the consensus mechanism.
Contents
First, concept and function of the consensus mechanism
1.1 Concept: The core rules for the normal operation of distributed ledgers
1.2 Role: Solve the trust problem and decide the generation and maintenance of new blocks
1.2.1 Used to solve the trust problem between people
1.2.2 Used to decide who is responsible for generating new blocks and maintaining effective unity in the blockchain system
1.3 Mainstream model of consensus algorithm
Second, the origin of the consensus mechanism
2.1 The two armies and the Byzantine generals
2.1.1 The two armies problem
2.1.2 The Byzantine generals problem
2.2 Development history of consensus mechanism
2.2.1 Classification of consensus mechanism
2.2.2 Development frontier of consensus mechanism
Third, Common Consensus System
Fourth, Selection of consensus mechanism and summary of current situation
4.1 How to choose a consensus mechanism that suits you
4.1.1 Determine whether the final result is important
4.1.2 Determine how fast the application process needs to be
4.1.2 Determining the degree to which the application requires for decentralization
4.1.3 Determine whether the system can be terminated
4.1.4 Select a suitable consensus algorithm after weighing the advantages and disadvantages
4.2 Future development of consensus mechanism
Last lecture review: Chapter 1 Concept and Function of Consensus Mechanism plus Chapter 2 Origin of Consensus Mechanism
Chapter 3 Common Consensus Mechanisms (Part 1)
Figure 6 Summary of relatively mainstream consensus mechanisms
📷
https://preview.redd.it/9r7q3xra4db51.png?width=567&format=png&auto=webp&s=bae5554a596feaac948fae22dffafee98c4318a7
Source: Hasib Anwar, "Consensus Algorithms: The Root Of The Blockchain Technology"
The picture above shows 14 relatively mainstream consensus mechanisms summarized by a geek Hasib Anwar, including PoW (Proof of Work), PoS (Proof of Stake), DPoS (Delegated Proof of Stake), LPoS (Lease Proof of Stake), PoET ( Proof of Elapsed Time), PBFT (Practical Byzantine Fault Tolerance), SBFT (Simple Byzantine Fault Tolerance), DBFT (Delegated Byzantine Fault Tolerance), DAG (Directed Acyclic Graph), Proof-of-Activity (Proof of Activity), Proof-of- Importance (Proof of Importance), Proof-of-Capacity (Proof of Capacity), Proof-of-Burn ( Proof of Burn), Proof-of-Weight (Proof of Weight).
Next, we will mainly introduce and analyze the top ten consensus mechanisms of the current blockchain.
》POW
-Concept:
Work proof mechanism. That is, the proof of work means that it takes a certain amount of computer time to confirm the work.
-Principle:
Figure 7 PoW work proof principle
📷
https://preview.redd.it/xupacdfc4db51.png?width=554&format=png&auto=webp&s=3b6994641f5890804d93dfed9ecfd29308c8e0cc
The PoW represented by Bitcoin uses the SHA-256 algorithm function, which is a 256-bit hash algorithm in the password hash function family:
Proof of work output = SHA256 (SHA256 (block header));
if (output of proof of work if (output of proof of work >= target value), change the random number, recursive i logic, continue to compare with the target value.
New difficulty value = old difficulty value* (time spent by last 2016 blocks /20160 minutes)
Target value = maximum target value / difficulty value
The maximum target value is a fixed number. If the last 2016 blocks took less than 20160 minutes, then this coefficient will be small, and the target value will be adjusted bigger, if not, the target value will be adjusted smaller. Bitcoin mining difficulty and block generation speed will be inversely proportional to the appropriate adjustment of block generation speed.
-Representative applications: BTC, etc.
》POS
-Concept:
Proof of stake. That is, a mechanism for reaching consensus based on the holding currency. The longer the currency is held, the greater the probability of getting a reward.
-Principle:
PoS implementation algorithm formula: hash(block_header) = Coin age calculation formula: coinage = number of coins * remaining usage time of coins
Among them, coinage means coin age, which means that the older the coin age, the easier it is to get answers. The calculation of the coin age is obtained by multiplying the coins owned by the miner by the remaining usage time of each coin, which also means that the more coins you have, the easier it is to get answers. In this way, pos solves the problem of wasting resources in pow, and miners cannot own 51% coins from the entire network, so it also solves the problem of 51% attacks.
-Representative applications: ETH, etc.
》DPoS
-Concept:
Delegated proof of stake. That is, currency holding investors select super nodes by voting to operate the entire network , similar to the people's congress system.
-Principle:
The DPOS algorithm is divided into two parts. Elect a group of block producers and schedule production.
Election: Only permanent nodes with the right to be elected can be elected, and ultimately only the top N witnesses can be elected. These N individuals must obtain more than 50% of the votes to be successfully elected. In addition, this list will be re-elected at regular intervals.
Scheduled production: Under normal circumstances, block producers take turns to generate a block every 3 seconds. Assuming that no producer misses his order, then the chain they produce is bound to be the longest chain. When a witness produces a block, a block needs to be generated every 2s. If the specified time is exceeded, the current witness will lose the right to produce and the right will be transferred to the next witness. Then the witness is not only unpaid, but also may lose his identity.
-Representative applications: EOS, etc.
》DPoW
-Concept:
Delayed proof of work. A new-generation consensus mechanism based on PoB and DPoS. Miners use their own computing power, through the hash algorithm, and finally prove their work, get the corresponding wood, wood is not tradable. After the wood has accumulated to a certain amount, you can go to the burning site to burn the wood. This can achieve a balance between computing power and mining rights.
-Principle:
In the DPoW-based blockchain, miners are no longer rewarded tokens, but "wood" that can be burned, burning wood. Miners use their own computing power, through the hash algorithm, and finally prove their work, get the corresponding wood, wood is not tradable. After the wood has accumulated to a certain amount, you can go to the burning site to burn the wood. Through a set of algorithms, people who burn more wood or BP or a group of BP can obtain the right to generate blocks in the next event segment, and get rewards (tokens) after successful block generation. Since more than one person may burn wood in a time period, the probability of producing blocks in the next time period is determined by the amount of wood burned by oneself. The more it is burned, the higher the probability of obtaining block rights in the next period.
Two node types: notary node and normal node.
The 64 notary nodes are elected by the stakeholders of the dPoW blockchain, and the notarized confirmed blocks can be added from the dPoW blockchain to the attached PoW blockchain. Once a block is added, the hash value of the block will be added to the Bitcoin transaction signed by 33 notary nodes, and a hash will be created to the dPow block record of the Bitcoin blockchain. This record has been notarized by most notary nodes in the network. In order to avoid wars on mining between notary nodes, and thereby reduce the efficiency of the network, Komodo designed a mining method that uses a polling mechanism. This method has two operating modes. In the "No Notary" (No Notary) mode, all network nodes can participate in mining, which is similar to the traditional PoW consensus mechanism. In the "Notaries Active" mode, network notaries use a significantly reduced network difficulty rate to mine. In the "Notary Public Activation" mode, each notary public is allowed to mine a block with its current difficulty, while other notary public nodes must use 10 times the difficulty of mining, and all normal nodes use 100 times the difficulty of the notary public node.
Figure 8 DPoW operation process without a notary node
📷
https://preview.redd.it/3yuzpemd4db51.png?width=500&format=png&auto=webp&s=f3bc2a1c97b13cb861414d3eb23a312b42ea6547
-Representative applications: CelesOS, Komodo, etc.
CelesOS Research Institute丨DPoW consensus mechanism-combustible mining and voting
》PBFT
-Concept:
Practical Byzantine fault tolerance algorithm. That is, the complexity of the algorithm is reduced from exponential to polynomial level, making the Byzantine fault-tolerant algorithm feasible in practical system applications.
-Principle:
Figure 9 PBFT algorithm principle
📷
https://preview.redd.it/8as7rgre4db51.png?width=567&format=png&auto=webp&s=372be730af428f991375146efedd5315926af1ca
First, the client sends a request to the master node to call the service operation, and then the master node broadcasts other copies of the request. All copies execute the request and send the result back to the client. The client needs to wait for f+1 different replica nodes to return the same result as the final result of the entire operation.
Two qualifications: 1. All nodes must be deterministic. That is to say, the results of the operation must be the same under the same conditions and parameters. 2. All nodes must start from the same status. Under these two limited qualifications, even if there are failed replica nodes, the PBFT algorithm agrees on the total order of execution of all non-failed replica nodes, thereby ensuring security.
-Representative applications: Tendermint Consensus, etc.
Next Lecture: Chapter 3 Common Consensus Mechanisms (Part 2) + Chapter 4 Consensus Mechanism Selection and Status Summary
CelesOS
As the first DPOW financial blockchain operating system, CelesOS adopts consensus mechanism 3.0 to break through the "impossible triangle", which can provide high TPS while also allowing for decentralization. Committed to creating a financial blockchain operating system that embraces supervision, providing services for financial institutions and the development of applications on the supervision chain, and formulating a role and consensus ecological supervision layer agreement for supervision.
The CelesOS team is dedicated to building a bridge between blockchain and regulatory agencies/financial industry. We believe that only blockchain technology that cooperates with regulators will have a real future. We believe in and contribute to achieving this goal.

📷Website
https://www.celesos.com/
📷 Telegram
https://t.me/celeschain
📷 Twitter
https://twitter.com/CelesChain
📷 Reddit
https://www.reddit.com/useCelesOS
📷 Medium
https://medium.com/@celesos
📷 Facebook
https://www.facebook.com/CelesOS1
📷 Youtube
https://www.youtube.com/channel/UC1Xsd8wU957D-R8RQVZPfGA
submitted by CelesOS to u/CelesOS [link] [comments]

dxDAO aims to power DeFi protocols through decentralized governance

I found this article on internet. It's repost of it to help educate people about all DXDao advantages:
These are positive and necessary steps for DeFi. The new governance structures are intended to help coordinate across community stakeholders and make better decisions. These dynamics are influenced by the issues covered in Dose of DeFi, but I believe they deserve their own focused analysis.
Govern This aims to educate token holders and make them better voters. Emphasis will be placed on specific governance proposals and relaying community governance discussions on forums and weekly calls.
Governance is a coordination technology that has helped countries and companies build more than the sum of their parts. Blockchains are also a coordination technology, but for computers, not humans***.*** Govern This will track the development of the melding of these two over the coming years.
Like governance, Govern This is a work in progress. I would appreciate any feedback on format, topics covered or any other suggestions to make the newsletter better. Just hit reply.
The first issue of Govern This is below. Please click here to subscribe.
Thanks for reading,
Chris
📷
dxDAO aims to power DeFi protocols through decentralized governance
Gnosis launched a long-awaited DEX last week with batched auctions for low-liquidity trade pairs. The front-end, Mesa.Eth.Link is owned and operated by dxDAO, a decentralized collective that hopes to power other DeFi protocols.
While dYdX does not have any specific governance plans (yet), this tweet from dYdX founder Antonio Juliano is a common approach to governance.
📷Antonio Juliano @AntonioMJuliano3) 0x should focus less on governance in the short term. It’s way more important to first build something with a large amount of adoption that’s worth governing
December 6th 2018
3 Retweets62 Likes
The tweet at the end of 2018 was in response to 0x and its native token, ZRX. The project was popular but the token had no use case outside of governance.
This governance strategy – build now, decentralize later – is widely accepted in the space and is perhaps best exemplified by the A16Z’s Jesse Walden’s post, “Progressive Decentralization: A Playbook for Building Crypto Applications”, which the A16Z-backed Compound has essentially implemented (more in the section below).
dxDAO, on the other hand, maintains that decentralization must come at the beginning or else the core team and investors will have an outsized influence on the project in formal (token voting) or informal ways (dictators for life).
Background
dxDAO was launched in May 2019, spun out of a collaboration between Gnosis and DAOstack over managing the DutchX platform. dxDAO’s key governance design is separating financial rights to the DAO (DXD) from voting power over the DAO (Reputation). It used an Edgeware-style lock drop to distribute reputation to stakeholders in May of last year. Any user could lock up ETH or an accepted ERC-20 for a month and receive Reputation, which are voting rights in dxDAO, even though it is not a token and cannot be transferred.
Over 400 unique Ethereum addresses participated in the distribution scheme. Gnosis went through a pretty extensive process in July 2019 to “step back” from its involvement in the DAO, and since then, the community and dxDAO have aligned behind a mission of “putting the ‘De’ in Decentralized Finance”.
Following on last week’s launch of Mesa.ETH.Link, dxDAO is conducting a fundraiser or (“DAICO”?) to help fund its new slate of DeFi products, including a prediction market platform (Omen) and a privacy-centric DeFi dashboard (Mix).
Project launch is typically when a project is most centralized. Execution is hard and direction and accountability are important. dxDAO’s approach will be an interesting counterexample to the “decentralize later” trend and may provide insight into new governance strategies.
Click here for more information about the dxDAO fundraiser.
Here’s what is on the dxDAO docket this week:
Compound governance goes live, has it found Market-Protocol-Fit?
Since its founding in 2017, Compound has executed with an almost flawless record: no bugs/hacks, a major protocol upgrade and a big name fundraise (twice).
But all of that has been because Compound, the company, has executed well, but can protocol development and the growth of the platform be sustained with community management? We shall see.
Compound’s governance system could not be simpler. Anyone with at least 1% of COMP can submit a proposal of executable code. COMP holders have a 3 day voting period; the proposal passes with a majority of token votes AND a 4% quorum of all COMP tokens.
The 1% minimum for proposal submission is a good anti-Sybil mechanism but it greatly limits participation by small users. There is delegation, so you could imagine a “proposal petition” where you would delegate your COMP to a proposal instead of signing your name.
Compound is clearly taking the “less governance is the best governance” approach. This has worked surprisingly well with Bitcoin and Ethereum, which of course, do not have any formal governance, but those communities clearly have informal governance systems that make decisions.
The biggest governance question for Compound: who is the community?
Market-Protocol-Fit
Other Internet has an intriguing essay on the emergent order from new blockchain tokens and their communities. It is worth a read. It discusses the emergent iteration that blockchains – as a technology and a community – go through to find a niche, both in culture and product.
While it focuses on base-layer blockchains that launch with a token, the essay underscores the most underrated governance element: token distribution. It quotes an insightful tweet from Eric Wall
📷Eric Wall @ercwlA question that keeps me up at night: Is it possible to create a rubbish coin based on advanced bullshit, build a community of misguided fans nevertheless, run it centralized for 5 yrs, hardfork-copy the design of a real working project, keep the community and become a success?
keysheet @keysheet
@ErcWll was one of the first vocal critics of IOTA back in 2017, shortly before the project hit a market cap of $15B. https://t.co/2267e8LEpl Today, the project is down 99% and appears to be brutally falling apart. A thread:
February 13th 2020
17 Retweets163 Likes
Before Bitcoin could harden its code and find ‘Digital Gold’ and before Ethereum found ‘DeFi’ and ships ETH2.0, both needed to find a “a strong community of believers” in order to create a “virtuous cycle between headless brands and infrastructural build-out to progressively realize [their] initial promise.”
Communities are connected through a wide spread token distribution, Bitcoin through cypherpunks and online drugs and Ethereum through a global ICO (what Teo Leibowitz called “The Immaculate ICO”).
$COMP distribution
The biggest “news” has been details about $COMP distribution:
There are no explicit plans yet, but the widely held assumption is that the COMP distribution will be determined by the interest earned and paid by users on the protocol since its inception. This is a clever way that only incentivizes more use of the protocol and is hard to game because interests accrues over time.
But the question still remains, what will the COMP community look like and what values will it espouse? Can emergent cultures arise out of Silicon Valley too?
Here’s what is on the Compound docket this week:
Maker and wBTC, a test case for the MIP process
While Maker had planned to spend Q2 moving forward with their upgraded governance process, most of its focus has been on restoring the Dai peg.
For more on how the Maker governance process has expanded outside the core community, check out the previous edition of Govern This.
Here’s what is on the Maker docket this week:
Governance and Risk meeting (April 23)
Single Collateral Dai shutdown – the process has begun. A poll passed with May 12 as the official SCD shutdown. Just yesterday, an executive just passed yesterday to make the MKR oracle fee-less, which will help with migration. Many in the community think the migration of debt from SCD will do more than enough to restore the peg.
13 MIPs and 2 sub proposals – Core to the new Maker governance process is the “Maker Improvement Proposals (MIPs), which are modeled off of BIPs (for Bitcoin) and EIPs (for Ethereum). The two sub-proposals are to appoint the Smart Contracts Team and assign Charles St. Louis as the MIP editor.
The 13 MIPs are listed below:
- MIP1 (Maker Governance Paradigms)- MIP2 (Launch Period)- MIP3 (Governance Cycle)- MIP4 (MIP Amendment and Removal Process)- MIP5 (Emergency Voting System)- MIP6 (Collateral Onboarding Form/Forum Template)- MIP7 (Onboarding and Offboarding Domain Teams for Collateral Onboarding)- MIP8 (Domain Greenlight)- MIP9 (Community Greenlight)- MIP10 (Oracle Management)- MIP11 (Collateral Onboarding General Risk Model Management)- MIP12 (Collateral and Risk Parameter Management)
By and large, the MIPs codify many of the informal Maker governance processes. There is currently a request for comments period (MIP forum) and there will be an informal poll on Monday, April 27 on whether to proceed with the 13 MIPs and 2 sub proposals. If it’s a “Yes”, than an executive for an official ratification vote would start on May 1 and lasts for 4 days. If it passes, the official governance cycle will begin and the rest of the MIPs will likely be approved from May 4 – 6.
Other Governing Things
That’s it! Feedback definitely appreciated. Just hit reply. Written in Brooklyn where it rained all day. No euchre today, but yesterday was epic.
Govern This is written by Chris Powers. Opinions expressed are my own. All content is for informational purposes and is not intended as investment advice.
submitted by yaroslav_karpov to CryptoMoonShots [link] [comments]

MXC AMA Recapitulation-Filenet

MXC AMA Recapitulation-Filenet

https://preview.redd.it/6u8t4y55nay41.png?width=1200&format=png&auto=webp&s=6ad7775ac648def445571a6a80e285f1c152a803

Guest: FN Global Community Rep,Andrew Chan

Host: Molly

Introduction:

Andrew:
Nice to meet you guys here,it's my honor to stand here speach for Filenet.Filenet(FN) is the world's first public chain of distributed storage application who has lauchned the mainet, and is also the world's first public chain of distributed storage application using DPOS + POC consensus mechanism.Filenet is dedicated to storing and distributing valuable content, rewarding miners in the form of mining to contribute idle bandwidth and storage. The mission of Filenet is to establish a powerful distributed data service system by connecting all idle storage to form, so any storage device that can connect to the Internet can participate in mining. Generally, Filenet is a super cloud system based on distributed storage and content sharing.

Questions from community:

Molly: Q1.What are the benefits of the FN project for business? What is the main role FN plays in business for five validation and security?
Andrew:
As we said just now,Filenet(FN) is the world's first public chain of distributed storage.
Filenet is dedicated to storing and distributing valuable content. The system provides a file promotion system. The more data is retrieved, the more popular it becomes, and the file can be mined.The DAO mechanism adopted by Filenet, in the system of Filenet, users need not pay for uploading and downloading, which greatly reduces the cost of enterprise server and bandwidth.Besides that Filenet is used to retrieve and distribute mining patterns, pledge a certain amount of deposit and provide a certain amount of storage space to participate in mining. The higher the miner's contribution, the higher the probability of a block.
Filenet is a leader in the field of distributed storage because of its unique consensus mechanism, business model, economic model, ecological strategy and governance structure, enabling blockchain storage to break out of the shackles and develop into a new format, and providing a key role for the development of other blockchain storage systems.
On the level of consensus, Filenet adopts the DPOS+POC mechanism as the consensus mechanism for distribution in the context of POC storage and mining, avoiding the direct contradiction between equipment efficiency and resource allocation, and greatly improving the mining mode in the blockchain 3.0 era.
The specific operation process of DPOS algorithm is that stakeholders, namely the Token holders and miners, vote to select Filenet Super Nodes through the election program, and then the Super Nodes in the block will be randomly pseudorandomly, and the Filenet Super Nodes can choose whether to produce blocks within a specified time.
As for smart contracts, Filenet is a common chain for developers that provides special programming primitives for DApp to interact with stored data.
These primitives are contained within the EVM (ethereum intelligent contract virtual machine). Thus, information about the location of data, storage nodes, and miners can also be accessed in smart contracts.
The world's first distributed storage DApp "Ztiao" developed based on Filenet network is now on the market. All chat data in this application will be stored in a fragmented form at any node in the world, transferred by private key, and the ecology in the application will be circulated and settled with Fn as payment token.
Filenet's smart contracts apply primarily to miners' coin holdings.The smart contracts we have developed may be rapidly realized through EVM (ethereum smart contract virtual machine) and solsea.
Filenet itself has the potential to implement an intelligent contract mechanism, and we believe that future versions of EVM and WASM will naturally integrate with the capabilities of Filenet and allow other main chains to benefit from Filenet.
In terms of data structure, the Filenet block saves all data trace parameters, and the data uploaded to Filenet is of various types and large quantities. While traditional linked list structures make blocks redundant and complex to express, Filenet USES a block chain data structure with Merkle tree and DAG (directed acyclic graph) structure.
The DAG structure is more flexible, more powerful, and faster than the traditional blockchain chain structure, greatly improving the efficiency of block packaging, thereby improving the performance of the Filenet network.
The Merkle tree does not require complete block information, but only the key Merkle node information to verify the block chain number filenet. IO page 10, a total of 24 data, which makes the node lighter and more energy and resources are devoted to business processing and providing services for the filenet network.
At the same time, Merkle tree can also simplify the verification process and further improve network performance.
Molly: Q2.Why does Filenet use the DPOS + POC consensus mechanism? What is the advantage?
Andrew:
As we all know,the core element of blockchain technology is the consensus mechanism. Currently, the most commonly used mechanisms include PoW (Proof-of-Work), PoS (Proof-of-Stake), DPoS (Delegated-Proof-of Stake), and PoC (Proof-of-Contribution). Proof of Work requires miners to solve complex cryptographic math problems and relies on computing power. The advantage of the system is that it is secure and reliable. Disadvantages are its limited capacity and the possibility of “51% attacks”. The Proof of Stake consensus mechanism selects miners according to how many coins he or she has. An immediate advantage is its low resource consumption. However, it opens itself to a range of attacks, such as nothing-at-stake, and also results in centralization since wealth brings more rewards and more decision-making power. In DPoS, the majority of people holding voting rights authorize a small number of nodes to act for them. The system’s merits are its high efficiency, throughput capacity and concurrency. However, the power is then concentrated in the hands of a few nodes, which is not safe. Proof of Contribution allocates mining and validating rights according to the contributions made by the nodes. The advantage of this system is that it does not waste resources thanks to its concept of selection based on resources provided to network. A disadvantage is that the calculation of contributions depends on specific scenarios. In the era of Blockchain 3.0, the consensus mechanisms are to advance under the principles of economy of resources, security focus and scalability, throughput capacity and concurrency.

https://preview.redd.it/krjv4rm9may41.png?width=1066&format=png&auto=webp&s=40875d9f7c76c5259faba1ad09f2396447231fa5
Molly: Q3.What is the main reason behind the formation of FN? Why do you think coins like FN should be in the Marketplace?
Andrew:
As I just said,Filenet is an IPFS incentive layer to reward miners for sharing their storage and networking resources.
Filenet is also a token which powers a distributed certification mechanism. It creates a cloud-level system for content-sharing dedicated to storing and distributing valuable content on IPFS,demand leaders to results. Filenet solve the problem of data distribution and storage.Why coins like FN should be in the marketplace?
This is easy to understand,why bitcoin should be in the market?All coins can be in the market for just one reason-the consensus.If there just one person who think FN is valueble,we cannot say this is consesus,but if there is 10000,or 1 billion who make consesus,then you can say,FN should be in the market.Fn happens to have so many users make the consesus.The number of people in Filenet community has reached 210000+,the autonomy community is up to 21,the global super nodes is over 51+,Our community is still growing,our consensus is also deepening,because we all believe in the future of FN.In short term,in the mining mode, on the one hand: the tokens will be locked, and the decrease in circulation can increase the value of the token; on the other hand: mining can also generate income.
On the long term,Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.
Molly: Q4.Can ordinary users also participate in mining? If can participate, how much mining can ordinary user do? And please explain the role of FN Coin easily.
Andrew:
Ordinary people can also participate in mining,as long as you pledge 400FN,and provide 4T storage space,you can join to mining.And the specific details depend on the mining pool you joined,you can see these pictures for a detailed mining tutorial.

https://preview.redd.it/z9hr1knkmay41.png?width=864&format=png&auto=webp&s=61abf14e3e659430f8387915389e024a1523ad2e

https://preview.redd.it/g8r2hmgmmay41.png?width=864&format=png&auto=webp&s=d82d323958a9ff11761b7c165be0179d7aeb91d9
Molly: Q5.What's the future plan of Filenet?
Andrew:
In the 1.0 stage, Filenet is the first distributed storage application public chain on the mainnet, the first distributed storage application public chain on the exchange, and the first distributed storage application public chain using the DPOS + POC consensus mechanism.
Filenet 2.0 comprehensively solves the key shortcomings of centralized data service centers.
In Filenet3.0 stage, the vision can catch up with and surpass many leading projects and brands of the decentralized distributed storage track, such as Filecoin, IBM, Amazon, Maidsafe, and become the leader of the track.

Free-asking Session

Q1.What is the difficulty bomb solution? Can you tell us more about [email protected]
Andrew:

https://preview.redd.it/zghna15smay41.png?width=905&format=png&auto=webp&s=2f01912ecb429f6e543d0b74322f4c295b901015
difficulty bomb is a solution to to encourage the nodes of the entire network to contribute more storage space and bandwidth, the Filenet Foundation plans to implement the difficulty bomb program in stages from May 1, 2020.
Q2.Checking the website, I found that the transaction fees of FN coins are very low, and the transaction speed is also very high! Can you explain how the FILENET project can achieve such a high transaction rate at the lowest [email protected]
Andrew:
As I said just now,there are lots of ways to generate revennue,in short term Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.And in long term Filenet is aim to encourage the nodes of the entire network to contribute more storage space and bandwidth, the Filenet Foundation plans to implement the difficulty bomb program in stages from May 1, 2020.
Q3.According to packaging node program, theywill recruit 105 packaging nodes worldwide. If 105 packaging nodes have been allocated, can I still participate in the activities of this packaging [email protected]
Andrew:
yes,of course,our paging nodes have proceed to the fifth issue,you can join us.
Q4.Why do people have to buy FN or hold it back? What is the FILENET team's plan to keep competing in the [email protected]
Andrew:
You could also refer to the eco mode and the apppreciation logic I've jsut share.
Q5.what are the benefits of $FN Long Term [email protected]
Andrew:
As we just shared: For long term, Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.
Follow us:
Telegram: https://t.me/MXCEnglish
MXC trading: https://t.me/MXCtrade
Twitter: https://twitter.com/MXC_Exchange
https://twitter.com/MXC_Fans
Reddit: https://www.reddit.com/MXCexchange/
Facebook: https://www.facebook.com/mxcexchangeofficial/
Discord: https://discord.gg/zu5drS8
submitted by SimonZhu666 to MXCexchange [link] [comments]

190 университетов бесплатно выложили сотни своих курсов. Если вы не слышали, университеты по всему миру предлагают свои курсы онлайн бесплатно (или, по крайней мере, частично бесплатно). Эти курсы называются БООК или Большие открытые онлайн–курсы. Часть 1

Программирование

Введение в CS50 по разработке игр от Гарвардского университета; Разработка мобильных приложений для CS50 с React Native от Гарвардского университета; Веб–программирование CS50 с использованием Python и JavaScript от Гарвардского университета; Функции, методы и интерфейсы в Go от Калифорнийского университета, Ирвин; Совпадения в Go от Калифорнийского университета в Ирвине; Начало работы с Go от Калифорнийского университета, Ирвин; Вычислительные в Python I: основы и процедурное программирование от Технологического института Джорджии; Вычислительные в Python IV: объекты и алгоритмы от Технологического института Джорджии; Вычислительные в Python III: структуры данных от Технологического института Джорджии; Вычислительные в Python II: структуры управления от Технологического института Джорджии; Проект программирования (Java) от Политехнической Школы Лозанны; Пиксельное искусство для видеоигр от Мичиганского государственного университета; Веб–дизайн: стратегия и информационная архитектура от Калифорнийского института искусств; Веб–разработка с React от Гонконгского университета науки и технологии; Разработка мультиплатформенного мобильного приложения с React Native от Гонконгского университета науки и технологий; Автоматизированное тестирование программного обеспечения: практические навыки для разработчиков Java от Технологического университета Делфта; Автоматизированное тестирование программного обеспечения: передовые навыки для разработчиков Java от Делфтского технологического университета; Погружение в Python от Московского физико–технического института; Основы разработки на C ++: красный пояс от Московского физико–технического института; AR (дополненная реальность) и услуги потокового видео от Университета Йонсей; Интеллектуальные устройства и новые мобильные технологии от Университета Йонсей; Решение проблем, программирование и видеоигры от Университета Альберты; Введение в дополненную реальность и ARCore от Google Daydream Impact; Основы NetLogo от Института Санта–Фе; Ключевые навыки конкурентоспособного программиста от Санкт–Петербургского государственного университета; Проблемы бизнеса и программные решения от Университета Дикина; Введение в язык Котлин от Санкт–Петербургского государственного политехнического университета; Веб–доступ для разработчиков от Университета Райерсона; Разработка карманных приложений для AR с Unity от Unity; Системные информационные ресурсы Интернет с MySQL / PHP и Joomla от Университета Росарио; Котлин для разработчиков Java от JetBrains; Введение в основы XR: VR, AR и MR от Unity; 3D–арт и аудио конвейер от Unity; Программирование прикладных систем от Unity; 3D взаимодействия и навигация от Unity; Программирование ядра взаимодействия от Unity.

Инженерия

Анализ транспортных явлений I: математические методы от Массачусетского технологического института; Строение космического челнока от Массачусетского технологического института; Искусство структурной инженерии: хранилища от Принстонского университета; Совместная безопасность роботов: проектирование и развертывание от Университета в Буффало; Электроэнергетические системы от Университета в Буффало; Современная робототехника, курс 5: Манипуляции с роботами и мобильные роботы на колесах от Северо–Западного университета; Робот Thymio от Университета естественных наук от Национальной Политехнической Школы Лозанны; Принцип полупроводниковых приборов Часть I: Полупроводники, PN–переходы и биполярные переходные транзисторы от Гонконгского университета науки и техники; Привет (реальный) мир с ROS — роботизированной операционной системой от Делфтского технологического университета; Разум Вселенной — Роботы в обществе: благословение или проклятие? от Делфтского технологического университета; Hyperloop: изменение будущего транспорта от Делфтского технологического университета; Электромобили: технология от Делфтского технологического университета; Электромобили: политика от Делфтского технологического университета; Глазами инженеров — расширение видения: инженерная механика с помощью эксперимента, анализа и проектирования от Университета Нового Южного Уэльса; Взглядом инженеров — представление о концепции: инженерная механика с помощью эксперимента, анализа и проектирования от Университета Нового Южного Уэльса; Конструкция оптической системы первого порядка от Университета Колорадо в Боулдере; Проектирование высокопроизводительных оптических систем от Университета Колорадо в Боулдере; Оптическая эффективность и разрешение от Университета Колорадо Боулдер; Двигатели и схемы управления двигателем от Университета Колорадо в Боулдере; Физика полупроводников от Университета Колорадо в Боулдере; Датчики и сенсорная схема от Университета Колорадо в Боулдере; Транзистор — полевой транзистор и транзистор с биполярным переходом от Университета Колорадо в Боулдере; Диод — pn Junction и Metal Semiconductor от Университета Колорадо в Боулдере; Diseño de diques rompeolas con cubípodos от Политехнического университета Валенсии; Введение в энергетику солнечной фотовольтаики от Политехнического университета Валенсии; Ознакомление со строительством от Университета Политехники в Валенсии; BIM Основы для инженеров от Национального университета Тайваня; Приложение BIM для инженеров от Национального университета Тайваня; Распределение электроэнергии от Института технологий и высшего образования в Монтеррее; Интеллектуальная сетка: фундаментальные технологии от Института технологий и высшего образования в Монтеррее; Передача электроэнергии от Института технологий и высшего образования в Монтеррее; Электрическая мощность: концепции и принципы от Института технологий и высшего образования в Монтеррее; Интеллектуальная сетка: электрические сети будущего от Института технологий и высшего образования в Монтеррее; Основы МОП–транзисторов от Университета Пердью; Основы протекания тока от Университета Пердью; Учебник по основам полупроводников от Университета Пердью; Введение в цепи от Университета Федерико II в Неаполе; Стандартизация от EIT Digital; Введение в системы управления батареями от Колорадского университета; Имитация модели ячейки эквивалентной цепи от Университета Колорадо; Оценка состояния батареи (SOC) от системы Университета Колорадо; Введение в веб–картографию: часть 2 от Швейцарской высшей техническая школы Цюриха; Высокоэффективное моделирование методом конечных элементов — часть 2 от Королевского технологического института; Интеграция энергетических систем: тенденция или революция? от Университета им. К.Ю. Ленвена Распространение радио от Института Mines–Télécom; «Monotsukuri» делает вещи в Японии: машиностроение от Токийского технологического института; Транспортная инженерия от Католического университета Чили; Введение в контрольную цифру Computadora от Университета Тенарис; Agile для управления проектами от Университеа штата Мэриленд.

Информатика

Машинное обучение с Python: от линейных моделей до глубокого обучения от Массачусетского технологического института; Технология блокчейн от Калифорнийского университета, Беркли; Биткойн и криптовалюты от Университета Калифорнии, Беркли; Введение в машинное обучение от Университета Дьюка; Введение в компьютерное программирование от Лондонского университета международных программ; Как работают компьютеры от Лондонского университета международных программ; ИТ–инфраструктура и новые тенденции от Университета Миннесоты; Корпоративные системы от Университета Миннесоты; Управление ИС / ИТ от Университета Миннесоты; Встроенное программное и аппаратное обеспечение от Университета Колорадо в Боулдере; Промышленные рынки Интернета вещей и безопасность от Университета Колорадо в Боулдере; Введение в технологию блокчейн от Московского физико–технического института; Искусственный интеллект — обучение и теория от Национального университета Тайваня; Введение в аппаратное обеспечение Verilog от Университета Галилео; Интернет вещей: Новые технологии беспроводных и облачных вычислений от Университета Йонсей; Информационные технологии от Университета Федерико II в Неаполе; Естественный язык, от человека к машине от Университета Федерико II в Неаполе; Новые цифровые технологии от Университета Федерико II в Неаполе; Программирование на C: языковые фонды от Института Mines–Télécom; Программирование на C: модульное программирование и управление памятью от Дартмута; Программирование на C: расширенные типы данных от Дартмута; Основы Linux: интерфейс командной строки от Дартмута; Программирование на C: использование инструментов и библиотек Linux от Дартмута; Программирование на C: Начало работы от Дартмута; Программирование на C: указатели и управление памятью от Дартмута; Введение в теорию вычислений от Института Санта–Фе; Основы машинного обучения от Института Санта–Фе; Введение в FinTech от Университета Гонконга; FinTech: Этика и риски от Университета Гонконга; Блокчейн и FinTech: основы, приложения и ограничения от Университета Гонконга; DDoS–атаки и защита от Университета Колорадо; Безопасность облачных вычислений от системы Университета Колорадо; Введение в программирование на языке C: Инструкции по контролю над текстами от Университета Мадрида; Введение в программирование на языке C: Типы и структура от Университета Мадрида; Введение в программирование на языке C: Функции и указатели от Автономного университета Мадрида; Кибер–физические сети от Королевского технологического института KTH; Понимание сути Интернета: сети операторов от Института Института Mines–Télécom; Усовершенствованная алгоритмика и теория графов на Python от Института Mines–Télécom; Программирование Arduino, от новичка до ниндзя от Института Mines–Télécom; Кибербезопасность: атакует противников от Университета Рей Хуана Карлоса; Цифровая трансформация и команда ИТ от Университета Витватерсранда; Стратегические и трансформационные информационные технологии от Университета штата Мэриленд; Основы сетевой безопасности от Университета Ковентри; Введение в криптографию от Университета Ковентри; Информационная система по глобальной сети Интернет Microsoft Access от Университета Росарио; Основы кибербезопасности I сетей Пало–Альто от сетей Пало–Альто; Фонд кибербезопасности Академии сетей Пало–Альто от сетей Пало–Альто; Шлюз I кибербезопасности сетей Пало–Альто от сетей Пало–Альто; Шлюз ІІ кибербезопасности сетей Пало–Альто от сетей Пало–Альто; Основы ІІ кибербезопасности сетей Пало–Альто от сетей Пало–Альто; Блокчейн: основы и варианты использования от Академии ConsenSys; Архитектура сети и безопасности с VMware NSX от VMware.
submitted by 5igorsk to Tay_5 [link] [comments]

Start learning programming " Here is the best Platforms for you"

Step by step Help for you:
Platforms Node.js Frontend Development iOS Android IoT & Hybrid Apps Electron Cordova React Native Xamarin Linux ContainersOS X Command-Line ScreensaverswatchOS JVM Salesforce Amazon Web Services Windows IPFS Fuse HerokuProgramming Languages JavaScript Promises Standard Style Must Watch Talks Tips Network Layer Micro npm Packages Mad Science npm Packages Maintenance Modules - For npm packages npmAVA - Test runner ESLintSwift Education PlaygroundsPython Rust Haskell PureScript Go Scala Ruby EventsClojure ClojureScript Elixir Elm Erlang Julia Lua C C/C++ R D Common Lisp Perl Groovy Dart JavaRxJava Kotlin OCaml Coldfusion Fortran .NET PHP Delphi Assembler AutoHotkey AutoIt Crystal TypeScriptFront-end Development ES6 Tools Web Performance Optimization Web Tools CSS Critical-Path Tools Scalability Must-Watch Talks ProtipsReact RelayWeb Components Polymer Angular 2 Angular Backbone HTML5 SVG Canvas KnockoutJS Dojo Toolkit Inspiration Ember Android UI iOS UI Meteor BEM Flexbox Web Typography Web Accessibility Material Design D3 Emails jQuery TipsWeb Audio Offline-First Static Website Services A-Frame VR - Virtual reality Cycle.js Text Editing Motion UI Design Vue.js Marionette.js Aurelia Charting Ionic Framework 2 Chrome DevToolsBack-end Development Django Flask Docker Vagrant Pyramid Play1 Framework CakePHP Symfony EducationLaravel EducationRails GemsPhalcon Useful .htaccess Snippets nginx Dropwizard Kubernetes LumenComputer Science University Courses Data Science Machine Learning TutorialsSpeech and Natural Language Processing SpanishLinguistics Cryptography Computer Vision Deep Learning - Neural networks TensorFlowDeep Vision Open Source Society University Functional Programming Static Analysis & Code Quality Software-Defined NetworkingBig Data Big Data Public Datasets Hadoop Data Engineering StreamingTheory Papers We Love Talks Algorithms Algorithm Visualizations Artificial Intelligence Search Engine Optimization Competitive Programming MathBooks Free Programming Books Free Software Testing Books Go Books R Books Mind Expanding Books Book AuthoringEditors Sublime Text Vim Emacs Atom Visual Studio CodeGaming Game Development Game Talks Godot - Game engine Open Source Games Unity - Game engine Chess LÖVE - Game engine PICO-8 - Fantasy consoleDevelopment Environment Quick Look Plugins - OS X Dev Env Dotfiles Shell Command-Line Apps ZSH Plugins GitHub Browser Extensions Cheat SheetGit Cheat Sheet & Git Flow Git Tips Git Add-ons SSH FOSS for DevelopersEntertainment Podcasts Email NewslettersDatabases Database MySQL SQLAlchemy InfluxDB Neo4j Doctrine - PHP ORM MongoDBMedia Creative Commons Media Fonts Codeface - Text editor fonts Stock Resources GIF Music Open Source Documents Audio VisualizationLearn CLI Workshoppers - Interactive tutorials Learn to Program Speaking Tech Videos Dive into Machine Learning Computer HistorySecurity Application Security Security CTF - Capture The Flag Malware Analysis Android Security Hacking Honeypots Incident ResponseContent Management System Umbraco Refinery CMSMiscellaneous JSON Discounts for Student Developers Slack CommunitiesConferences GeoJSON Sysadmin Radio Awesome Analytics Open Companies REST Selenium Endangered Languages Continuous Delivery Services Engineering Free for Developers Bitcoin Answers - Stack Overflow, Quora, etc Sketch - OS X design app Places to Post Your Startup PCAPTools Remote Jobs Boilerplate Projects Readme Tools Styleguides Design and Development Guides Software Engineering Blogs Self Hosted FOSS Production Apps Gulp AMA - Ask Me Anything AnswersOpen Source Photography OpenGL Productivity GraphQL Transit Research Tools Niche Job Boards Data Visualization Social Media Share Links JSON Datasets Microservices Unicode Code Points Internet of Things Beginner-Friendly Projects Bluetooth Beacons Programming Interviews Ripple - Open source distributed settlement network Katas Tools for Activism TAP - Test Anything Protocol Robotics MQTT - "Internet of Things" connectivity protocol Hacking Spots For Girls Vorpal - Node.js CLI framework OKR Methodology - Goal setting & communication best practices Vulkan LaTeX - Typesetting language Network Analysis Economics - An economist's starter kit
Few more resources:
submitted by Programming-Help to Programming_Languages [link] [comments]

Weekly Wrap: This Week In Chainlink June 8 - June 14

Weekly Wrap: This Week In Chainlink June 8 - June 14

Announcements and Integrations 🎉.

Kyber Network's DEX KyberSwap is now using Chainlink Price Reference Data to update asset prices in their UI. This provides KyberSwap users with more reliable price feeds for calculating slippage rates and further safeguards against price manipulation.
Graph Protocol is making it easier for devs to pull indexed subgraph data into smart contracts. Dapps can use Chainlink to access data to index DEX liquidity to calculate slippage, catalog block data for gas fees, and sort identity data for user profiles.
ARPA is integrating Chainlink oracles to bring reliable data to its multiparty computation (MPC) network. ARPA plans to use Chainlink Price Reference Data to support its financial services, including a DeFi lending dApp for cross-chain assets.
Distributed Energy Trading Platform Dipole_Tech is integrating Chainlink oracles to price energy assets using premium data sources. Dipole also plans to use Chainlink to connect traditional & cryptocurrency payment options to its energy trading markets.
NFT devs natealex6677 & skylerfly from the generative art project ChainFaces are using Chainlink VRF to power the spin-off game FaceGolf. Chainlink VRF will be used in determining the outcome of golf matches, the random creation of new NFTs and more

Ecosystem & Community Celebrations 👏

Featured Community Videos 🎥

This video features the Chainlink and the Aave teams with presentations from ETH Global HackMoney Winning Projects along with a Q&A with Marc Zeller of Aave where we will discuss the newest developer trends in Aave and Chainlink’s communities and spark ideas for continuous building.

Upcoming Community Events 📅

Are you interested in hosting your own meetup? Apply to become a Chainlink Community Advocate today: https://events.chain.link/advocate

SmartContract is hiring: Check out these open roles 👩‍💼

View all open roles at https://careers.smartcontract.com
Are there other community content and celebrations that we missed? Post them in the comments below! ⤵️
submitted by linkedkeenan to Chainlink [link] [comments]

AT2: Asynchronous Trustworthy Transfers

AT2, a fairly new unknown tech to create a decentralized asset transfer system without blockchain.
This week there was an article @ www.computing.co.uk. See below.
link: https://www.computing.co.uk/feature/4017118/at2-answer-cryptocurrency-energy-performance
AT2 paper: https://arxiv.org/pdf/1812.10844.pdf

Could AT2 be the answer to cryptocurrency's energy and performance problems?
Blockchains are slow, wasteful and ill-suited for digital currencies, say researchers who believe they've found a better way
Blockchains solve a hard problem: how to ensure consensus across a distributed, decentralised network, where messages arrive out of order if at all, where individual nodes may fail, and where a certain proportion may be actively malicious.
The original blockchain, bitcoin, was designed to support a novel digital currency, and the issue its consensus algorithm solved was preventing double-spend. It also successfully introduced game theory for security: adversaries would have to spend more money on an attack than they could expect to gain financially. All this and the original protocol was just a few hundred lines of code.
But this achievement came at a high cost in terms of energy use and performance.
With bitcoin, a new leader is required to verify each block of transactions, that leader being the first device to complete a computationally heavy challenge (Proof of Work, PoW). As a result, the blockchain's throughput is painfully slow at around seven transactions per second (Visa claims it can do 56,000) and the whole process is massively wasteful of energy. These drawbacks have been surmounted, to some degree, in newer blockchain designs using overlay networks, sharding and different types of "proofs of" and by non-blockchain directed acyclic graphs (DAGs), but each requires tradeoffs in terms of centralisation, complexity or security.
A group of researchers led by computer scientist Professor Rachid Guerraoui of Swiss University Ecole Polytechnique Fédérale de Lausanne (EPFL) decided to look afresh at the problem. Is this gargantuan security apparatus, in which every node in a network of thousands or millions must come to a consensus about the ordering of events, really necessary everytime someone makes a purchase? Could a leaderless mechanism be applied to the problem instead? If so, could it be guaranteed to be reliably consistent, even when a certain number of nodes are malicious or faulty (Byzantine)?
The headline answer, published in an initial paper last year, is that network-wide consensus is overkill for simple asset transfers. If cryptocurrencies could be rebooted, all the fossil fuels burned by miners of bitcoin and its clones could be left in the ground and Visa-level transaction speeds could be achieved without any loss of security or reliance on centralised control. As compact as Satoshi's original bitcoin protocol itself, the few hundred lines of code that make up their Asynchronous Trusted Transfers (AT2) algorithm could solve some of the tricky problems that have plagued decentralised token-based networks from the off.
AT2 can be used to validate transactions within two different decentralised networking scenarios: (1) permissioned or small unpermissioned networks, and (2) global scale unpermissioned networks. In the first case, the algorithm uses quorum for validating actions, whereby a certain proportion of the network's nodes must agree an action is correct before it can take place. The second scenario, networks made up of very large number of machines (nodes), uses probabilistic sampling. Instead of asking all nodes it checks a number of randomly selected nodes for their viewpoint. This is much more efficient and scalable than the deterministic quorum but carries a tiny (ca. 10-15) possibility of failure.
Doing away with network-wide consensus means AT2 sidesteps the bane of decentralised networks, the FLP Impossibility - the theory that in a fully asynchronous system, a deterministic consensus algorithm cannot be safe, live and fault-tolerant.
Computing caught up with Matteo Monti, who worked on the statistical aspects of AT2, and by email with Guerraoui to find out more. We also spoke to David Irvine of networking firm MaidSafe, which has adopted AT2 to simplify its consensus process.

Incentivising improvements
We asked Monti (pictured) to summarise the innovation that AT2 brings to the table.
"What we noticed is that there's a specific subclass of problems that can be solved on a decentralised, distributed network without requiring consensus," he said. "The main use for consensus at the moment, cryptocurrency transactions, is part of that class. We can solve this using a weaker abstraction and in doing so you gain the ability to work in a completely asynchronous environment."
Bitcoin doesn't even solve consensus well. It solves eventual consensus which an even weaker abstraction, he added, whereas AT2 can guarantee strong eventual consistency. Another issue it tackles is PoW's incentivization model which means that improvements in technology do not translate into a better performing network.
"With bitcoin, the bottleneck is always electricity. If everyone doubles their computational speed it's not going to change the efficiency of the network. Everyone's competing not to compute but to waste energy."
In place of PoW, AT2 uses ‘Proof of Bandwidth', i.e. evidence of recent interaction, to verify that a node is real. Since it doesn't rely on consensus, the performance of AT2 should allow messaging speeds across the network that approach the theoretical maximum, and improvements in hardware will translate into better overall performance.

Security measures
Blockchains like bitcoin are extremely resilient against Sybil attacks; bitcoin is still running after all, in the face of unwavering opposition from powerful nation states and bankers. Sybil attacks are a major vulnerability in permissionless decentralised networks where anyone can join anonymously, but there are others too.
Monti said the most challenging aspect of designing the AT2 algorithm was distilling all the potential types of dangerous Byzantine behaviour into a manageable set so they could be treated using probability theory. As a result of studying many possible failure scenarios, including Sybil, the algorithm is able to quickly react to deviations from the norm.
Other security features flow from the fact that each network node needs to know only a limited amount about its counterparts for the system to function. For example, the randomness used in sampling operations is generated locally on the calling device rather than on the network, making this vector hard to utilise by an attacker looking to influence events.
Signals are passed across the network via a messaging system called Byzantine Reliable Broadcasting (BRB) a gossip-based method by which nodes can quickly and reliably come to an agreement about a message even if some are Byzantine.
As a result of these features, AT2 does not rely on economic game theory for security, said Monti.
"I'd go as far as saying that the moment you need to implement an economic disadvantage to attacking the system, it means that you failed to make it impossible to attack the system. We don't care about your interests in attacking the system. What we want to achieve is a proof that no matter what you do, the system will not be compromised."

‘Crypto-Twitter'
AT2 starts with the simple idea that rather than requiring the whole network to maintain a time-ordered record of my transactions (as with a blockchain or DAG), the only person who needs to keep that tally is me.
If I decide to spend some money, I merely announce that fact to the network over BRB and this request will be held in a memory snapshot escrow. Depending on the network type, a representative sample or a quorum of other nodes then check my balance and inspect my ordered transaction history to ensure that the funds haven't already been spent (each transaction has a unique sequential ID) and provided all is correct the transaction is guaranteed to go through, even if up to a third of those validators are malicious. If I try to cheat, the transaction will be blocked.
Monti likens a wallet on an AT2 network to a social media timeline.
"What we've proved, essentially, is that you can have a cryptocurrency on Twitter," he explained.
"A payment works in two steps. First, there's a withdrawal from my account via a tweet, then the second step is a deposit, or a retweet. I tweet a message saying I want to pay Bob. Bob then retweets this message on his own timeline, and in the act of retweeting he's depositing money in his account.
"So everyone has their own independent timeline and while the messages - my tweets - are strictly ordered, that's only in my own timeline; I don't care about ordering relative to other timelines. If I try to pay someone else, it will be obvious by the sequence of tweets in my account, and my account only, whether I can perform that payment.
"In contrast, consensus effectively squeezes all of the messages into a unique timeline on which everybody agrees. But this is overkill, you don't need it. We can prove that it still works even if the ordering is partial and not total, and this enables us to switch from consensus to reliable broadcast."
But of course, nothing comes for free. AT2 can verify exchanges of tokenised assets, but aside from arrangements between a small number of opted-in parties, it does not have the ability to support smart contracts of the type that are viable on ethereum and other blockchains, because this does require network-wide consensus. Guerraoui said his team is working on "refinements and extensions" to support such functionality in the future.

Early adopters
AT2 is still pretty ‘cutting edge'. Three papers have been accepted for peer review the latest published in February, but it provides the sort of efficiencies and simplifications that could bring real progress. Guerraoui said AT2 has "received interest from many groups including companies ‘selling' blockchain approaches, as well as companies and organisations using such approaches".
One organisation that has already picked up on the potential of AT2 is Scotland's MaidSafe, creator of the SAFE Network. MaidSafe is already using AT2 to replace its Parsec consensus algorithm, which testing showed was indeed overkill for many network operations. CEO David Irvine said he and his colleagues came across AT2 while working on another way of propagating changes to data without consensus, conflict-free data replicated types (CRDTs), promptly forked the code and started to apply it.
SAFE, currently in Alpha, is a sharded network, meaning it's subdivided into small semi-autonomous sections. On a network level, the way it works is that trusted 'elder' nodes vote on a requested action then pass instructions to other sections to carry it out.
AT2 allows the initial task of accumulating the votes for an action, which had been done by the elders using a consensus algorithm, to be moved off the network and onto the requesting client which is much more lightweight and efficient. Once a quorum of votes has been gathered, the client simply resubmits the request and the elders will ensure it's carried out. The system is much simpler and should be more secure too. "It's 200 lines of logic compared to 15,000 for a start," Irvine said.
AT2 is not just used to validate token transfers. By the same mechanism, it can also be used to authorise requests to store or change data. Together with CRDTs, which guarantee that such changes cannot fail, this makes for a very tight and efficient ship, said Irvine.
"AT2 is for us a missing link. The difficulty of several nodes agreeing is simplified by the initiator taking on the effort of accumulating quorum votes. It seems so simple but in fact, it's an amazing innovation. It certainly falls into the category of 'why didn't I think of that?'."
submitted by ZaadNek to CryptoTechnology [link] [comments]

How to mine $1,000,000 of Bitcoin using just a laptop ... BITCOIN & LITECOIN ALL TIME HIGHS - COMING SOON What is NAMECOIN BITCOIN'S First Fork - YouTube How Much Can You Make Mining Bitcoin With 6X 1080 Ti ... How to Mine Bitcoins Using Your Own Computer - YouTube

The numbers on the graph represent historical Bitcoin-related events. The list of events is detailed below in this page. Click on a number and you will be transferred to the corresponding event. Frequently Asked Questions How Much was Bitcoin Worth When it Started in 2009? When Bitcoin started out there wasn’t really a price for it since no one was willing to buy it. The first time Bitcoin ... The more hashing (computing) power in the network, the greater its security and its overall resistance to attack. Although Bitcoin’s exact hashing power is unknown, it is possible to estimate it from the number of blocks being mined and the current block difficulty. Notes. Daily numbers (raw values) may periodically rise or drop as a result of the randomness of block discovery : even with a ... Live streaming charts of the Bitcoin price. The chart is intuitive yet powerful, offering users multiple chart types for Bitcoin including candlesticks, area, lines, bars and Heikin Ashi. The graph above shows the market share of the most popular bitcoin mining pools. It should only be used as a rough estimate and for various reasons will not be 100% accurate. A large portion of blocks are grouped into the 'Unknown' category. This does not mean an attack on the network, it simply means we have been unable to determine the origin. The table below shows a detailed breakdown of ... Not only does one need to know the power requirement of the Bitcoin network, but one also need to know where this power is coming from. The location of miners is a key ingredient to know how dirty or how clean the power is that they are using. Just like it’s not easy to find out what machines are active in the Bitcoin network, determining location isn’t an easy feat either. Initially the ...

[index] [25608] [29331] [32061] [26091] [30778] [34602] [1184] [22071] [1364] [45527]

How to mine $1,000,000 of Bitcoin using just a laptop ...

SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Nviddia GTX 1080 Ti - https://amzn.to/2Hiw5xp 6X GPU Mining Rig Case - https://bitcoinmerch.com/produc... I help you deduce Bitcoin's small-world nature through logical deduction and understand the real power of Bitcoin - its network! Presentation starts at 9:11. What is NAMECOIN BITCOIN'S First Fork http://youtu.be/oBkhPhu3_B4 Test Scanning Stainless Steel BITCOIN WALLET view http://youtu.be/P3Cny4iX-CM Why the block... Bitcoin Price Mt Gox Site Disappears BITCOIN PRICE , BITCOIN FUTURE in doubt http://youtu.be/eO-yrpQpIT8 What is NAMECOIN BITCOIN'S First Fork http://youtu.b... In this bitcoin technical analysis video, we are going to talk about speculation based on bitcoin halving and litecoin halving. This is the 500th video for Crypto Capital Venture, so thank you for ...

#