Generative Data Intelligence

Tag: Private Key

MedAI Network Addresses the Blockchain Storage Issue

Medical imaging is a difficult issue for the blockchain approach. The files are typically huge, and they need to be kept strictly confidential....

Hyperledger Pushes Forward Advancements in Healthcare

Hyperledger is an open source collaboration involving blockchain developers and big businesses. Hosted by The Linux Foundation, this growing community is pushing the...

Blockchain Disrupting the Healthcare Industry

The modern healthcare system is necessarily a set of dependent and independent institutions. Because of its mission-critical nature, the system’s evolution involves a...

Understanding zero knowledge blockchains

How to show you know something without showing what you knowLast Friday saw the launch of Zcash, a new public blockchain and associated...

New TeslaCrypt Ransomware is Extremely Dangerous – Unless You’re Protected by Comodo

Reading Time: 2 minutesThe model is familiar: Software developers work tirelessly to improve their product, releasing new versions to add new features or fix...

Recent Features and 2016 Roadmap

An update from the MultiChain factory floorAs a change from blog posts about blockchains in general, I’d like to provide an update on...

Smart contracts: The good, the bad and the lazy

Why private blockchains should not be eager to run codeI’m not a fan of the term “smart contracts”. For a start, it has been used...

Ending the bitcoin vs blockchain debate

Is there any value in a blockchain without a cryptocurrency? The debate has been running for a while but the past month has seen a...

Lenovo Users at Risk for Man-in-the-Middle Attacks from Superfish

Reading Time: 2 minutesLenovo has had some explaining to do this week. Lenovo has been shipping laptops and personal computers since 2010 with adware...

Code Signing Certificates: Do Not Develop Software Without Them

Reading Time: 3 minutesCode signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

SSL 101: How Do I Get a Secured Connection?

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?