Étiquette : token

0 470
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of April 20, 2020

Original release date: April 27, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available….

0 330
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of April 13, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Source : https://www.us-cert.gov/ncas/bulletins/sb20-111 Date : April…

0 240
Posted in #BLOCKCHAIN ENG

South Africa Proposes 30 Rules to Regulate Cryptocurrency

South Africa’s top financial regulators, including the South African Reserve Bank, have jointly released a policy paper with 30 recommendations for the regulation of cryptocurrency and related service providers. They aim to be in compliance with the cryptocurrency standards set by the Financial Action Task Force (FATF). Source : https://news.bitcoin.com/south-africa-cryptocurrency/…

0 300
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of April 6, 2020

Original release date: April 13, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available….

0 357
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of March 30, 2020

Original release date: April 6, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available….

0 239
Posted in #BLOCKCHAIN FRA

UX / UI dans la blockchain : exemples de travaux et réflexions

Image ci-dessus : interfaces conçues par notre Designer dans le cadre de nos travaux sur les Decentralized Identities (DID) lors du hackathon « Blockchain and the city » organisé en novembre 2019 (voir ici la synthèse de ces travaux sur les DID).  Source : https://blockchainpartner.fr/ux-ui-dans-la-blockchain-exemples-de-travaux-et-reflexions/ Date : April 6, 2020…

0 304
Posted in #BLOCKCHAIN ENG #DATA ENG #AI ENG

A Look At Blockchain Powered Decentralized Data Marketplaces

Decentralized data marketplace or exchange is a network run on a secure, smart contract blockchain that enables users to restore control over their data and monetize data assets without relying on a centralized platform. Source : https://analyticsindiamag.com/a-look-at-blockchain-powered-decentralized-data-marketplaces/?utm_source=rss&utm_medium=rss&utm_campaign=a-look-at-blockchain-powered-decentralized-data-marketplaces Date : April 6, 2020 at 06:44AM Tag(s) : #AI ENG Share this……

0 290
Posted in #SECURITE ENG #RGPD ENG

GDPR: An impact around the world

A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new data privacy rights to its people, the governor of California signed a separate, sweeping data protection law that borrowed several ideas from GDPR, sparking a torch in a legislative data…

0 415
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of March 23, 2020

Original release date: March 30, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available….

0 243
Posted in #BLOCKCHAIN ENG

Blockchain startup Block.one invests $150M in its social media app Voice, to kickstart its independent operations; Voice lets users post for token rewards (Celia Wan/The Block)

Blockchain startup Block.one invests $150M in its social media app Voice, to kickstart its independent operations; Voice lets users post for token rewards  —  Block.one, the publisher of the EOS blockchain protocol, has invested $150 million in Voice, a social media platform launched in June last year. Source : http://www.techmeme.com/200326/p17#a200326p17…

0 327
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of March 16, 2020

Original release date: March 23, 2020 Source : https://www.us-cert.gov/ncas/bulletins/sb20-083 Date : March 23, 2020 at 09:15PM Tag(s) : US GOV Share this… Email Facebook Twitter Linkedin Whatsapp Print

0 378
Posted in #BLOCKCHAIN ENG

Emerging Regulatory Approaches to Blockchain Based Token Economy

Blockchain-enabled digital scarcity has opened up a whole new dimension of legal conundrums for the regulators. This paper examines emerging regulatory approaches for the future of the token economy. Source : https://jbba.scholasticahq.com/article/12270-emerging-regulatory-approaches-to-blockchain-based-token-economy Date : March 19, 2020 at 04:08PM Tag(s) : #BLOCKCHAIN ENG Share this… Email Facebook Twitter Linkedin Whatsapp…

0 270
Posted in #CHATBOT ENG

Magento 2 Ecommerce Chatbot For Google Assistant & Facebook Messenger

The proliferation of chatbots is growing at an unprecedented rate. An increasing number of businesses are looking forward to reach to their customers on chat channels like Google Assistant, Facebook Messenger, Amazon Alexa, WhatsApp, Telegram and others. And it totally makes sense to offer products/services on such additional chat channels…

0 443
Posted in #BLOCKCHAIN ENG

What is Real World Asset Tokenization on Blockchain

Real World Asset Tokenization on Blockchain Source : https://datafloq.com/read/what-real-world-asset-tokenization-blockchain/7991 Date : March 18, 2020 at 06:42AM Share this… Email Facebook Twitter Linkedin Whatsapp Print

0 340
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of March 9, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Source : https://www.us-cert.gov/ncas/bulletins/sb20-076 Date : March…

0 358
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of March 2, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Source : https://www.us-cert.gov/ncas/bulletins/sb20-069 Date : March…

0 414
Posted in #RGPD ENG

#Privacy: What can the UK government teach about Identity Access Management?

The UK government can no longer think of itself as an entity that is just physically protecting private individuals and nation state interests. Source : https://gdpr.report/news/2020/03/09/privacy-what-can-the-uk-government-teach-about-identity-access-management/ Date : March 9, 2020 at 12:46PM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print

0 278
Posted in #DATA ENG

Connect 90+ Data Sources to Your Data Lake with Azure Databricks and Azure Data Factory

Data lakes enable organizations to consistently deliver value and insight through secure and timely access to a wide variety of data sources. The first step on that journey is to orchestrate and automate ingestion with robust data pipelines. As data volume, variety, and velocity rapidly increase, there is a greater…

0 402
Posted in #BLOCKCHAIN ENG

The Algorithms That Control the Cryptocurrency Market

Algorithms are at the heart of 21st century life, invisibly controlling many of the systems we use and take for granted on a daily basis. Pervasive algorithms determine the entertainment we consume (Netflix, Spotify), the information we read (Google), and the chatter we hear (Facebook, Twitter). It’s no different in…

0 249
Posted in #SECURITE ENG US GOV

Vulnerability Summary for the Week of February 24, 2020

Original release date: March 2, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available….