Uncategorized

IDM (Ideal Data Memory) : Solving Problem for Cloud Storage

1

What is IDM? What’s on with IDM?

IDM has its own patented data protection technology called SIZE and is preparing to launch a new service – a global decentralized ecosystem that connects users who want to store information safely and miners who provide memory on their devices to generate income. Our development team has created a working prototype of a cloud storage service called BoobookBox. The service was launched in 2015 and has more than 2 thousand active users. The working prototype was launched to test the technology, both by developers and third-party organizations. IDM can successfully compete with all cloud data storage services, as it offers following exclusive features: o The most safe and secure data storage system and data transmission o Affordable price o The only player on the market offering this level of data protection o Savvy marketing strategy o Legal guarantee on data security IDM focuses on strictly defined segments of the consumer and business market, and takes advantage of a competitive market opportunity, namely the demand for secure data storage.

IDM can successfully compete with all cloud data storage services, as it offers following

exclusive features:

o The most safe and secure data storage system and data transmission

o Affordable price

o The only player on the market offering this level of data protection

o Savvy marketing strategy

o Legal guarantee on data security

IDM focuses on strictly defined segments of the consumer and business market, and takes advantage of a competitive market opportunity, namely the demand for secure data storage.

there are so many flaws and problems in Internet-based storage, one of the difficulties in accessing information that allows access by others. such as the secret files from SONY that have been hacked and published by hackers. of course this is very worrying to many parties. now present IDM (Ideal Data Memory). this project provides various features that can help you in maintaining and storing your data, either based on computer or internet. There are many problems again that always happen in millennial and of course IDM will solve them. See below!

Current Trends And Issues Associated With Cloud Data Storage

The 21st century is the age of information. More and more data are generated on daily basis creating an ever-increasing demand for storage space. Not every home

computer, let alone a mobile device, can store all of its own generated data. The capacity of the built-in memory is growing along with requirements for data safety. The increased volume of generated data proportionally increases the number of potential threats to the storage of this data. With the growth in the number of devices, cloud storage services are becoming increasingly important. Many cloud storage providers promise fast, reliable and convenient services. However, the reality is a bit more complicated. What kind of threats to the  information are the most relevant today? Evaluation of Cloud Storage Security.

2

Pure Statistics

o The year 2013 was marked by a scandal involving the outdated SSL service certificate by Microsoft Azure, which provided criminals with an opportunity to hack the Xbox Live system;

o The so-called Celebgate incident, which happened in 2015, when hackers stole intimate photos of celebrities from the iCloud (Apple) cloud storage;

o The number of hacks inflicted on cloud services is growing every year at the rate

around 50%;

o Approximately 70% of companies have at least one application running in a cloud;

o Lloyd’s of London and Cyence believe that a massive attack on cloud storage can

cause losses in excess of $ 5 billion, and only 15-17% of the total amount will be covered by insurance;

o In 2017, the data storage of Equifax, the US leading consumer credit report agency, had been hacked resulting a personal data loss of 143 million customers. Consequently, the value of company’s stocks has plummeted by 13%;

o The absence of two-factor authentication resulted in a personal data theft of 80 million customers of Anthem, an American health insurance company.

Data Loss In Cloud Storage

Despite the fact that this type of storage is called “cloud”, the data is stored in physical terrestrial and underground locations, called data centres. The actual storage devices are hard disks prone to various effects similar to those inherent in modern HDDs, such as an appearance of bad sectors, errors caused by voltage drops or physical damage to the disk surface, both due to improper operation or a design defect. As a rule, all information is duplicated in backup copies according to a specific schedule. However, this method does not fully guarantee the safety of your data. Also we must consider the human factor.

Theft Of Data From Cloud Storage

Data is not always lost as a result of technical failures. Often there is a banal theft. The criminals may steal information just for fun or with the purpose of honing their hacking skills. Information can be stolen with a very specific purpose: to make money through blackmailing or selling valuable data to interested parties. Not long ago, the media was buzzing with the news regarding the theft of intimate photos of celebrities from the cloud storage belonging to one of the main players on the mobile market.

After the scandal, the company responsible for security of the storage, as a third-party contractor, left the market, but the pictures, however, went all over the world.

Network Attack

The storage where your data is located may be subjected to a targeted cyberattack. In that case, you could be just a casual victim, especially if the hackers aimed at the entire service with the purpose of stealing or damaging the personal data of a particular user, whether it be an individual or a company.

Ddos Attack

No matter how safe cloud storage is a simple DDoS attack can cause huge losses to the service by slowing down or blocking its operations, with users not being able to retrieve their data or use the service.

Human Factor

Despite the abundance of cyberthreats, the so-called human factor remains the most dangerous element in the process of securing data. An attacker can be located within the data centre, for example, as a system administrator. This situation is quite common. Some employees are willing to commit crimes to enrich themselves. The stolen personal data or the access to that information can be sold to various criminal organizations that may inflict an enormous damage, both moral and material.

Countermeasures To Emerging Threats

  • The encryption of data by the user could be a viable method of countering cyberattacks and potential data theft;
  • Another way is to select an additional option offered by cloud service, which provides uploaded data to be encrypted by the service;
  • The two-factor authentication (2FA) allows to increase the level of data access protection with minimum costs;
  • Anti-virus software that is a more conservative method of data protection.

How To Secure The Information In The “Transparent” Cloud.

Almost all existing on the market cloud storage services guarantee the integrity and maximum protection of user information from external influence of third parties. Nevertheless, all services, one way or another, are obliged to comply with legal requirements of the country in which they provide services. Even the use of the AES256 encryption protocol, adopted as a data protection standard by US governmental organizations, does not guarantee the protection of your information. According to the current legal practice, a service is required, as per legislation of most countries, to provide government authorities with access to user data upon request.

3

From those explanation, IDM will solve them, IDM service provides a decentralised distributed cloud data storage system where security against both loss and theft of data provided by unique algorithm SIZE.

To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration.

Our patented algorithm SIZE supports an excellent protection of a file from loss

(corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology.

4

JOIN US,

WEBSITE : https://myidm.io/

TELEGRAM GROUP: https://t.me/idmprotect_en

ANN THREAD : https://bitcointalk.org/index.php?topic=3395543.msg35555064#msg35555064

TWITTER : https://twitter.com/IDMdatasecurity

MY BITCOINTALK PROFILE : https://bitcointalk.org/index.php?action=profile;u=1346920

Uncategorized

VEXANIUM ECOSYSTEM AND TOKEN FLOW

VEXANIUM

VEXANIUM is a decentralized marketing ecosystem. Utilizing blockchain technology, it builds an online marketplace that allows merchants to tokenize their rewards  and promote their products efficiently.

VEXANIUM ECOSYSTEM

vex 2

The VEXANIUM Platform features 4 components :

  1. Voucher Platform: The VEX Platform will allow businesses (offline, online and onchain) to create campaigns for acquiring new customers and rewarding existing ones, using the VEX token. It will also allow the creation of vouchers by these businesses which consumers can purchase with the VEX token. This will be facilitated via the VEX web and mobile apps.
  2. P2P Voucher Exchange: The VEX Exchange will allow consumers to trade vouchers among themselves and set their own prices. It is hosted within the VEX app.
  3. VEX Cryptoexchange Integration: The VEX app features an integration with selected cryptoexchanges in order to allow users to directly trade their VEX token balance on the exchange.
  4. Airdrop Platform The VEX Platform will also allow blockchain companies to create Airdrop campaigns for acquiring new customers and rewarding existing ones, using the VEX token. This will be facilitated via the VEX web and mobile apps.

VEXANIUM Ecosystem

  1. VEXM Generator

vex 1

VEXANIUM enables merchants to create their own tokenized vouchers (VEXM) easily by using VEXM Generator. VEXM is a smart contract based token standard, which has a similar function to ATP in Achain or ERC20 in Ethereum. The goal of VEXM Generator is to bring transparency to the marketplace by performing credible transactions that are trackable and irreversible without the need for third parties. Merchants can easily create their voucher tokens by editing parameters based on the contract template. All information of the token will be written in the VEXANIUM blockchain and can be reviewed any time at VEXplorer.

  1. VEXplorer

VEXplorer is a blockchain browser allowing users to perform searches, API and analysis of the VEXANIUM blockchain. Each transaction, each block generated and the smart contracts that had already been entered into will be shown at real time in VEXplorer. As an example example, if a burger chain called Mburger were to issue a Voucher Token (VEXMburger), all the information of VEXMBurger such as amount of tokens generated, terms, number of redemptions, number of token holders will be displayed at VEXplorer.

  1. VExchange

VEXchange is a crypto-crypto exchange platform for trading VEX tokens and all VEXM tokens.

VEXANIUM TOKEN FLOW

vex 3

VEX Token Economy

  1. VEX Token

Token Usage VEX are the tokens used to access services across the entire VEXANIUM ecosystem. The major uses of VEX tokens are:

(1) Service Fees for Merchant Token Generation Merchants will be paying service fees in VEX to generate their own token. For example, XYZGym is generating 1,000 pieces of $100-USD-worth gift card tokens. It will need to pay the equivalent amount of VEX tokens to the VEXANIUM platform.

(2) Service Fees of Airdrop Campaigns Merchants will pay service fees in VEX based on the number of target audiences it reaches out to in the VEXANIUM platform. For example, when MBurger needs to airdrop their coupon tokens to 100,000 VEXANIUM users, the platform will collect the equivalent amount of VEX tokens from MBurger.

(3) Trading Tokens VEX will be the main trading pair for all tokens or cryptocurrencies on the VEXchange platform.

(4) Trading Fees Users will receive 50% off on trading fees in VEXchange if he/she holds a certain amount of VEX.

  1. Token Information and Allocation

VEX tokens will be issued as an ATP 1.0 Standard Token on the Achain Blockchain Protocol. ATP 1.0, the Achain token standard, is a technical standard used for smart contracts on the Achain blockchain.

The total amount of VEX ever created will be 1,000,000,000 VEX. The Token Allocation Plan is as follows:

Allocation Parties Detail
40% Token Sales Tokens sold in pre-sale and public sale. Funds raised will be disclosed regularly.
15% Early Investors and Advisors Tokens for Angel Investors and early investor. 50% of the tokens will be locked up for 6 months after the end of the public sale; and the remaining 50% will be release after another 6 months.
20% VEXANIUM Foundation Reserve for future expansion and ecosystem.
15% VEXANIUM Team Token incentives for VEXANIUM team. 50% of the tokens will be released 12 months after public sale and the remaining 50% after 18 months.
10% User Incentives Token incentives for seed users (merchants and individuals) in marketing campaigns.

 

Visit The Official site     : https://www.vexanium.com/

Whitepaper                     : https://www.vexanium.com/files/whitepaper-vexanium-english.pdf

My bitcointalk profile   : https://bitcointalk.org/index.php?action=profile;u=1346920

 

Uncategorized

SINT CRYPTOCURRENCY

 

WHAT IS SINT ?

sint 3

Sint is the first platform providing instant exchange transactions: Cryptocurrency to fiat and fiat to cryptocurrency.

Fiat Currency is one which has no underlying value per se, but which is accepted as legal tender with the backing of the issuing government or organization.

Commodity Currency (and representative currency by extension) suffer from the fact that they are tied to something which has a fixed supply and varying demand. This results in “zero-sum” economics, in which it is possible for a few rogue individuals to manipulate the value of the currency, often to the detriment of the issuer.

Fiat Currencies meanwhile are also subject to supply and demand, but neither of these factors is limited. The (theoretically unlimited) supply allows for the “rising tide raises all ships” type of economics. In periods of high demand, the issuer can control inflation by issuing more currency, and similarly control deflation by lowering the supply.

While most major Fiat Currencies are issued by a government, there is no requirement to do this. If you print money (physically or electronically) and people use it as a medium of exchange, then it is a Fiat Currency. AirMiles and similar rewards programs are an example of a privately-issued Fiat Currency.

Sint is fully based on the blockchain technology. It was created by a team of experienced developers and managers. It allows a fluent transfer of FIAT or any cryptocurrency from any cryptocurrency exchange in the world to your account.

SINT 1

The way the platform works
can be described in 4 easy steps

“App/Platform” Cryptocurrencies: This final category of cryptocurrency roughly represents the cryptocurrency equivalent of an app or platform and these cryptocurrencies are built on top of utility cryptocurrencies like Ethereum. Augur, for example, is a decentralized prediction market built on top of Ethereum where users can find and place bets on outcomes like who will be elected President, which team will win the Super Bowl, etc. and be compensated for being right.

No. When you need to fund a wallet with cryptocurrency When you need to withdraw the assets, and transfer them to your credit card or a bank account
1. Choose the cryptocurrency you want to receive. Choose the fiat currency you want to receive and specify the bank account number where the money should be transferred.
2. Specify the address of a wallet where you want to receive the cryptocurrency. Choose the cryptocurrency you want to sell.
3. Deposit the fiat currency from your credit card or a bank account with just one click using the system of instant payments. You will be given a unique wallet address where you will send cryptocurrency.
4. Your cryptocurrency address has been funded. The money will show up on your account shortly after the confirmation issued by Blockchain network is received.

SIN token cryptocurrency

SIN token is our cryptocurrency designed to provide security and unify the market for fiat and cryptocurrency transfers.

SINT 2

SIN token ERC-20
ICO date May 1 – 21 (23:59 CET)
ICO price 1 ETH = 250 000 SIN tokens + BONUS
Token supply 10 000 000 000 (all unsold tokens will be burned)
Exchange listing Main exchanges by June 2018
Token distribution Smart contract will transfer tokens right after contribution
Team Professionals with substantial experience
Payment options ETH Smart Contract
Fiat: USD, EUR

visit : https://sint.global/

whitepaper : https://sint.global/sint-whitepaper.pdf

 

Uncategorized

VC Travel (Venture Capital Travel – Investors & Advisors)

Every file which i get from cool cousin’s site, i always find “VC TRAVEL”. See below>>>

“In this paper, Cool Cousin, a VC-backed travel company, presents its vision for CUZ – a decentralized ecosystem that uses smart contracts to guarantee the direct and secure exchange of knowledge and services between travelers and locals around the world, with the goal of propagating fantastic travel experiences.” (Whitepaper : Cool Cousin Overview).

“Cool Cousin is a VC-backed company that allows locals to earn from their knowledge while making it easy for travellers to upgrade their trip.” (Cool Cousin Site)

“Launched in 2016, Cool Cousin is a VC-backed travel company, used by over 500K travelers worldwide. Crowned as an up-and-coming travel service by New York Times, Guardian, USA Today, National Geographic and TechCrunch, Cool Cousin enjoys monthly double-digit growth and is well positioned to become a major player in the $2.3 trillion travel industry.” (Icobench-Ico rating site : Description)

Now i want to tell you what is VC travel.

VC Travel (Venture Capital Travel – Investors & Advisors) is a multi-stage travel-focused investment and advisory proprietorship. We identify and grow successful travel companies of all sizes in high growth verticals and niches within travel. Our focus on select travel verticals allows a wide geographic scope which allows investment and advisory work in the United States, United Kingdom, LATAM, Europe, Middle East and Asia Pacific.

All of Venture Capital Travel’s advisors have experience managing companies which helps identify and provide hands on actionable help (capital, advice, introductions, best practices, purchasing power) to our portfolio companies we advise.

We know the niches, verticals and sub-verticals with in the 1 trillion dollar travel and hospitality industry to pursue (and avoid investing in) based on the geographic region, target client, current landscape, macro level trends, your resources and team and our value add beyond capital.

Investing in a consumer facing mobile destination content provider in one area would be a recipe for disaster whereas the same content in a different region to different target client disproportionately increases the chances of success for everyone.

The right management team,  founder & managing partner with outside experts and a growing network of worldwide contacts ensures an experienced brain trust to maximize mutual success. We focus on the history, experience and dynamic of the team (do we think your team can execute on what needs to be done?) and its prospective fit within the VC Travel family of professionals and companies we advise.

Now let’s see and compare between the text above with Cool Cousin’s explanation about VC Travel.

Cool Cousin, a VC-backed travel company, presents its vision for CUZ – a decentralized ecosystem that uses smart contracts to guarantee the direct and secure exchange of knowledge and services between travelers and locals around the world, with the goal of propagating fantastic travel experiences.

Use of the internet and reliance on it as a resource puts users in a precarious position, now more than ever. No generation before has had access to so much information, with so little ability to make good use of it. Powerful agendas, fake news, an overload of choice and the financial interests of a handful of large stakeholders influence the content we’re exposed to. Ultimately, we are not as free as we like to imagine. And yet, just 26 years ago, the internet completely revolutionized our lives and opened up so many great opportunities for consumers.

Tourism, one of the world’s largest industries with market value of over $2.3 trillion in 2016 alone, was one of the first to be dramatically transformed by the internet. Online booking companies such as Priceline ($85B) rendered high street travel agents obsolete; Airbnb (Estimated $30B) turned everyone with an extra bed into a semi-pro hotel owner; Yelp ($3.5B) and TripAdvisor ($5B) gave consumers a voice, amassing a bank of tens of millions of reviews about every hotel, store and restaurant on the planet, cataloguing and distributing the information for mass consumption.

Nowadays, these giant companies use scale strategies to create sophisticated networks, giving consumers a false sense of variety and reality, when in fact they are in an echo chamber of predetermined options. The economics of this highly centralized industry, with big average purchases and high revenues per-user for low marginal costs, make it very lucrative and thus a competitive arena. Small to medium size travel companies don’t stand a chance. Vast resources are used to manipulate search engine optimization and tweak advertising prices. Market interests which prioritize sales over accuracy and volume over personalization, taint our search results. Our feeds are filled with content we are most likely to pay for, not information leading to the best personal experience for travelers.

To guarantee large numbers of active users, information has largely remained “free” further cementing a standard which nullifies competition. Ultimately, the business model that upholds these companies devalues the information they offer, and travelers pay the price.

These travelers, especially millennials, have become painfully aware of the biases and manipulations within the travel industry. A recent article on Vice1 that demonstrates the ease with which someone can turn their backyard shed into the top rated London restaurant on Tripadvisor, is just one in a myriad of examples that kindle such mistrust. In an effort to avoid time-consuming research, people are reverting to pre-internet tactics of information sourcing – from reaching out to friends to paying travel agents2. A Nielsen study found that 82% of responders prefer recommendations from someone they know, and in the US, 22% of traveler used travel agents to book their trip in 2016, up from 14% in 2014. At the same time, 34% of millennials used a travel agent, up 19% from 2011. Those who stick to surfing the web, visit an average of 28 different websites in 76 online sessions over a period of 53 days.

Travel agents today focus mainly on luxury markets and business travel, charging hefty premiums for the personalized service and expert information they provide6. Despite their expensive services that don’t suit most travelers, over a third of millennials say they will use a travel agent the next time they travel7. This internet savvy generation and the fastest growing segment of travelers, is willing to pay a stranger with inbuilt biases who knows nothing about them to make travel decisions for them8 – anything but spend the hours it takes to find valuable intel.

My Bountyhive username : apur

visit : bountyhive.io/join/Cool%20Cousin

Uncategorized

Business and Financial Model of Cool Cousin

coold

As we know from the whitepaper, COOL COUSIN has its own business model. Talking about business model, we also talking about financial model. Actually, what is business and financial model? Let’s discuss with me. See below

BMs (Business Model) are a relatively new concept in management studies. The first apparition of the term can be dated back to 1957, but it is not until the end of the twentieth century that it has broadly attracted the attention of researchers. Although a specific definition 913 has still to be found, a BM has been identified as the “story that explains how an enterprise works” or also as the way firms do business. Further definitions of the term have been proposed in the past. Nevertheless, the concept of value represented a central aspect in many of the descriptions given by researchers since the early studies published around the topic.

Reading from Excelmodels.com, it gives some point about business and financial model.

Business Model – Bank

  • “Top-down” financial model of Business Unit-level performance of a commercial bank with 2 major lines of business, based on a handful of global assumptions
  • “Bottom-up” financial model that accepts revenue and cost inputs at very low levels of granularity for both lines of business, including:
  • Variable Cost tab accepting input of assumptions of each line of business by Distribution Channel, Product, average loan duration, and primary Revenue Source (interest or sale)
  • Fixed Cost input tab allowing modified sliding scale for fixed cost assumptions, by Distribution Channel, according to 8 tranches of loan origination volume
  • Stacked P&Ls of both lines of business plus consolidated, and calculations of Key Performance Indicator (KPI) summary, as well as by Channel, Product, Revenue Source

Business Model – Digital Media Company

  • Comprehensive model of Digital Media company with multiple sources of online and offline Revenue: Subscription, Advertising, Sponsorships, Events, Licensing, and Sales
  • In addition to P&L, Balance Sheet, and Cash Flows, model includes Cash Budget, Depreciation Schedule, Capital Structure, Valuation, Financial Ratios, & Economic Profit

Business Model – Manufacturer

  • Integrated Financial Statements, Business Drivers, and debt schedule for billion dollar manufacturing company with 5 Operating Units and one for Corporate overhead
  • 5-year historicals and 5-year forecast of financials and free cash flow, for each Operating Unit, culminating in Discounted Cash Flow (DCF) Valuation
  • EV/EBITDA multiple Valuation using a 7-company Peer Group divided among client’s three major lines of business: Manufacturing, Leasing, and Services
  • Bottom-up Cost of Capital (WACC) calculation, 15-slide summary Presentation, and side-by-side analysis of client’s Share Price, Book Value, and two intrinsic Valuations
  • Methodology HERE

Business Model – Lender

  • Financial model describing a Lending Company making amortizing loans
  • Model calculates loan originations for each of 4 specific borrower profiles, as well as Cash Flows generated from Interest Income and secondary market sales
  • Color-coded and footnoted global assumptions sheet accepts inputs for Rates, Fees, loan Repayment, and Commissions for each Distribution Channel
  • Originations and assumptions drive tabs for Revenue, COGS, Headcount assumptions, Payroll, Overhead, OpEx, P&L, Balance Sheet, and Cash Flow Statement

Business Model – Social Network

  • Business model of an online and offline organization, comprised of two “Clubs”, both catering to elite members of a specific demographic
  • “Membership” worksheet contains powerful Dashboards for forecasting membership subscription revenue for one 4-tier club and another 3-tier club
  • Additional “Analysis” worksheet tabulates key performance indicators (KPI), including lifetime value (LTV) & acquisition costs, and churn rate
  • Modular construction of this model facilitates plug-in for additional Clubs, which are then automatically rolled into the Consolidated P&L

Business Model – VIP Concierge Service

  • Financial model crafted to accompany an RFP submission for a high-end concierge service for traveling VIPs
  • Simple dashboard distributes a few assumptions across comprehensive 5-year financial statement forecast: starting month, starting amount, growth by calendar year, prices, quantities

Business Model – Loyalty Company

  • Standard financial statements, plus Intangibles & Depreciation schedules
  • Includes two Balance Sheets: one for an S1 filing and one for SEC-compliance

Business Model – simple

  • One-year monthly Gross Margin summary of a website with various sources of Revenue
  • Extensive use of Excel’s Formatting functionality demonstrates our ability to create an alternative environment, or “look-and-feel” to the typical spreadsheet

Financial Model

  • Very simple 12-month financial model with Income Statement, Balance Sheet, Cash Flow Statement, and Debt & Depreciation Schedules

Financial modeling is one of the most highly valued but thinly understood skills in finance.  The objective is to combine accounting, finance, and business metrics to create an abstract representation of a company in Excel, forecasted into the future.  This guide to financial modeling for beginners and “dummies” will teach you all the basics a beginner needs to know!

There are many types of financial models with a wide range of uses include: making business decisions at a company, making investments in a private or public company, pricing securities, or undergoing a corporate transaction such as a merger, acquisition, divestiture, or capital raise.

financial-modeling-example-1-768x491
Image from CFI’s financial modeling courses.

There are many different types of financial models.  In this guide, we will outline the top 10 most common models used in corporate finance by financial modelingprofessionals.

Here is a list of the 10 most common types of financial models:

  1. Three Statement Model
  2. Discounted Cash Flow (DCF) Model
  3. Merger Model (M&A)
  4. Initial Public Offering (IPO) Model
  5. Leveraged Buyout (LBO) Model
  6. Sum of the Parts Model
  7. Consolidation Model
  8. Budget Model
  9. Forecasting Model
  10. Option Pricing Model

Cool Cousin Business Model

Cool Cousin faces the challenge of upholding our content standards and steering clear of manipulative marketing strategies, while generating profit for the Company and incentivizing the Community. Revenues from transactions will go directly to the service provider (be it the Cousin— as detailed in service fees, or the Company— as detailed in affiliation fees and solutions for businesses), minus commision fees that will be split between the Company and the Community. In instances when the platform provides the service, ie. a feature in the app or promotional product (described below), the Company will apportion a fee to the Community Pool, proportionate to the product’s price.

As blockchain technology enables us to charge low transaction fees, due to the fact that the decentralized network is self governing and thus demands lower sums for operations, the fees will always remain significantly lower than market standards. The rate of every fee will be determined, using smart contracts, in relation to each particular product. Every change in the transparent smart contracts will be evaluated and decided by Board of Representatives, in order to protect Community and Company interests. The components that make up this model will be implemented prudently and gradually.

The Company can suggest to alter the distribution between the parties, in response to Community needs or changing market rates with the approval of the Board of Representatives. The interests of all parties involved are protected through transparent smart contracts. The fee collected by the Company will finance its development and marketing efforts, and the fee collected by the Community will go to the Community Pool to be distributed through the Rewards Engine.

 

My Bountyhive username : apur

visit : bountyhive.io/join/Cool%20Cousin

Uncategorized

BLOCK REWARD

Block Reward

As we know that CURRENT currently has the Block Reward feature. sounds familiar is not it ?. of course not, we often hear this word when we want to do mining. bitcoin parties have explained in detail about Block Reward. Current strives to follow the path of bitcoin success.

from the little explanation above, do you know what is Block Reward? what is the relationship between Block Reward with MINING? yeah, now I will start discussing Block Reward system ever implemented by Bitcoin.

What is the definition of the Block Reward?

Bitcoin block reward refers to the new bitcoins that are awarded by the blockchain network to eligible cryptocurrency miners for each block they mine successfully.

halving countdown
Example: Block Reward Countdown

Each bitcoin block is around 1 MB in size and is used to store the bitcoin transaction information. For example, when A sends money to B, this transactional information is stored on a block.

Miners who use mining devices to find new blocks are rewarded for their efforts through block rewards. Other cryptocurrencies have a similar mechanism for rewarding miners with blocks of the respective blockchain.

At inception, each bitcoin block reward was worth 50 BTC. The block reward is halved after the discovery of every 210,000 blocks, which takes around four years to complete. As of February 2018, one block reward is worth 12.5 BTC.

Working on the principle of a standard cryptocurrency economy with declining bitcoins awarded as block rewards, fewer new bitcoins will be available over time that will keep bitcoin prices high. After 64 iterations of halving the block reward, it will eventually become zero.

The winning miner claims a block reward by adding it as a first transaction on the block.

Importance of the Block Reward

The block reward is the only way that new bitcoins are created on the network. Satoshi explained this in an early email post in 2009:

Coins have to get initially distributed somehow, and a constant rate seems like the best formula.

The block reward creates an incentive for miners to add hash power to the network. The block reward is what miners try to get using their ASICs, which make up the entirety of the Bitcoin network hash rate.

ASICs are expensive, and have high electricity costs. Miners are profitable when their hardware and electricity costs to mine one bitcoin are lower than the price of one bitcoin. This means miners can mine bitcoins and sell them for a profit.

The more hash power a miner or mining pool has, the greater the chance is that the miner or pool has to mine a block. As miners add more hash rate, more security is provided to the network. The block reward acts as a subsidy and incentive for miners until transaction fees can pay the miners enough money to secure the network.

How do Block Reward Halvings Affect Miners?

Block reward halvings cut miners’ earnings in half, assuming the same Bitcoin price before and after the halving. Since approximate block halving dates are known, most miners take block reward halvings into account before they happen.

Block reward halvings also decrease supply, which as discussed above may cause Bitcoin’s price to increase. A Bitcoin price increase can help offset the block reward halving.

history-block.png
Example: Block Reward History

‘Current’ Block Reward

That’s all the Block Reward of Bitcoin, but how about Curren Block Reward? Current gave a little explain about it.

“In order to ensure liquidity and supply, the Block Reward (Br) calculation maintains a ratio of available supply to demand. Each block is eq-ual to 3600 seconds or one hour of consumption (mining) done by a consumer. With every 100,000,000 blocks mined, the block reward changes in proportion with the number of tokens left in the system. This is known as a Block Cycle (Bc).”

Current has its own calculation in determining the reward block. see below

Calculation
Formula: Current Block Reward Calculation

 

Current Site : https://current.us/

Telegram Group : https://t.me/CurrentCRNC

ANN THREAD : https://bitcointalk.org/index.php?topic=2829644.0

Uncategorized

What is GUI? What is Trading GUI?

trading-gui.jpg

What is GUI?

The graphical user interface (GUI /ɡuːiː/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs),[1][2][3] which require commands to be typed on a computer keyboard.

The actions in a GUI are usually performed through direct manipulation of the graphical elements.[4] Beyond computers, GUIs are used in many handheld mobile devices such as MP3 players, portable media players, gaming devices, smartphones and smaller household, office and industrial controls. The term GUI tends not to be applied to other lower-display resolution types of interfaces, such as video games(where head-up display (HUD)[5] is preferred), or not including flat screens, like volumetric displays[6] because the term is restricted to the scope of two-dimensional display screens able to describe generic information, in the tradition of the computer science research at the Xerox Palo Alto Research Center.

How does a GUI work?

A GUI uses windowsicons, and menus to carry out commands, such as opening, deleting, and moving files. Although many GUI operating systems are navigated through the use of a mouse, the keyboard can also be utilized by using keyboard shortcuts or arrow keys.

What are the benefits of GUI?

Unlike a command line operating system or CUI, like Unix or MS-DOS, GUI operating systems are much easier to learn and use because commands do not need to be memorized. Additionally, users do not need to know any programming languages. Because of their ease of use, GUI operating systems have become the dominant operating system used by today’s end-users.

Trading GUI (CoinMetro Feature)

The Matching Engine will allow clients to send both standard and non-standard order types, including: Markets, Limits, Stops, Limit Stop Orders and OCO (One Cancels Other) orders, which are a combination of Stop and Limit orders on the same ticket. The system will also allow for several different TIF (Time in Force) options, such as FOK (Fill or Kill), IOC (Immediate or Cancel), and GTC (Good till Cancelled).Charting will be powered by a professional grade HTML5 library that allows users to customize their layout with a few clients and add in multiple time and price studies or indicators with ease. Using a simple drag-and-drop interface, clients will be able place stop and limit orders based on pre-calculated risk to reward settings. To reduce latency for higher frequency traders and to simplify the order enter process one click trading will be available right from the chart. Historical trades, both filled and pending orders, can be plotted on the chart, as well, so the client will be able to see a graphical representation of their account activity.The platform is intended to be accessible from both a web browser and via our own CoinMetro-branded iOS and Android apps. API access and FIX 4.4 connectivity will be available. Following the approach of our strategic partner, FXPIG, API and FIX access will be open to anyone who requests it, with no minimum volume requirements or access fees.

This is the example of GUI from some famous exchangers

GUI
LeonArdo Bitcointalk Post

 

COIN METRO SITE : https://coinmetro.com/

TELEGRAM GROUP : https://t.me/CoinMetro

ANN THREAD : https://bitcointalk.org/index.php?topic=2540667.0

Uncategorized

Mesh Network Technology

What does Mesh Networking mean?

Mesh networking is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes. Routers are used to provide the best and most efficient data path for effective communication. In the event of a hardware failure, many routes are available to continue the network communication process.

Reading from Techopedia, There are two types of mesh networking topologies:

  • Total Mesh Topology: This kind of topology is in effect when every node in the network is connected to all the other nodes with direct links. This provides greater redundancy, because if any node fails, the network traffic can be directed using other nodes. Each node accesses the working nodes in close proximity and finds the best route for efficient and reliable communication.
  • Partial Mesh Topology: This kind of topology is in effect when some nodes are connected with all the other nodes using direct links, while some are just connected to one or two nodes only. This is less expensive to implement compared to total mesh topology, but has less redundancy.

A mesh networking layout is not commonly used because of high costs related to cabling, devices and its complex infrastructure. However, wireless mesh networks are very popular among wireless networks and their users. This is because, by definition, a wireless network does not need cabling or any other physical infrastructure other than an access point.

Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger–Horne–Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

mesh network topology and illustration

The illustration below shows a full mesh network with six nodes. Each node is shown as a sphere and connections are shown as straight lines.

mesh 1

The illustration below shows a partial mesh network with six nodes. Each node is shown as a sphere and connections are shown as straight lines. The connections in either a full or partial network can be wired or wireless.

mesh 2

Mesh networks are expected to play an important part in the Internet of Things (IoT). Unlike nodes in a star topology, which require a router to deliver Internet service, network nodes can “talk” directly to each other without requiring the assistance of an Internet connection. A big advantage of this decentralized topology is that there cannot be a single point of failure (SPoF). If one node can no longer operate, the others can still communicate with each other, directly or through one or more intermediate nodes.

In the past, when mesh networks were always wired, the topology could be expensive (and complicated) to deploy because each node had to be physically connected to the other nodes. Today, however, advances in wireless communication and short-range wireless personal network (WPAN) specifications have removed the physical and financial barriers.

Quantum Mesh Network (Stealthcrypto Feature)

The StealthCrypto Cloud™ NAS System is fully decentralized, with files distributed and stored all over the world, on different containers. This allows the network to be robust to attacks, with no central point of weakness. StealthCrypto Cloud™ NAS with an embedded wifi router container that connects to peer-to-peer cloud storage, telecommunications, communications, IOT connections, mining, and powered by StealthCrypto™ incentive based Ecosystem. The system will Delivered Quantum Entropy engine, quantum key generation, key distribution and authentication.

reff link : bountyhive.io/r/apur

visit : bountyhive,io/join/StealthCrypto

Uncategorized

Financial Modelling for ICO and Business

What is financial modeling?

Financial modeling is one of the most highly valued but thinly understood skills in finance.  The objective is to combine accounting, finance, and business metrics to create an abstract representation of a company in Excel, forecasted into the future.  This guide to financial modeling for beginners and “dummies” will teach you all the basics a beginner needs to know!

There are many types of financial models with a wide range of uses include: making business decisions at a company, making investments in a private or public company, pricing securities, or undergoing a corporate transaction such as a merger, acquisition, divestiture, or capital raise.

financial-modeling-example-1-768x491Image from CFI’s financial modeling courses.

There are many different types of financial models.  In this guide, we will outline the top 10 most common models used in corporate finance by financial modelingprofessionals.

Here is a list of the 10 most common types of financial models:

  1. Three Statement Model
  2. Discounted Cash Flow (DCF) Model
  3. Merger Model (M&A)
  4. Initial Public Offering (IPO) Model
  5. Leveraged Buyout (LBO) Model
  6. Sum of the Parts Model
  7. Consolidation Model
  8. Budget Model
  9. Forecasting Model
  10. Option Pricing Model

 

More detail about each type of financial model

To learn more about each of the types of financial models and perform detailed financial analysis, we have laid out detailed descriptions below.  The key to being able to model finance effectively is to have good templates and a solid understanding of corporate finance.

#1 Three Statement Model

The 3 statement model is the most basic setup for financial modeling. As the name implies, in this model the three statements (income statement, balance sheet, and cash flow) are all dynamically linked with formulas. in Excel.  The objective is to set it up so all the accounts are connected, and a set of assumptions can drive changes in the entire model.  It’s important to know how to link the 3 financial statements, which requires a solid foundation of accounting, finance and Excel skills.

Learn the foundations in our online financial modeling courses.

 

#2 Discounted Cash Flow (DCF) Model

The DCF model builds on the 3 statement model to value a company based on the Net Present Value (NPV) of the business’ future cash flow. The DCF model takes the cash flows from the 3 statement model, makes some adjustments where necessary, and then uses the XNPV function in Excel to discount them back to today at the company’s Weighted Average Cost of Capital (WACC).

These types of financial models are used in equity research and other areas of the capital markets.

 

#3 Merger Model (M&A)

The M&A model is a more advanced model used to evaluate the pro forma accretion/dilution of a merger or acquisition.  It’s common to use a single tab model for each company, where the consolidation where Company A + Company B = Merged Co.  The level of complexity can vary widely and is most commonly used in investment bankingand/or corporate development.

 

#4 Initial Public Offering (IPO) Model

Investment bankers and corporate development professionals will also build IPO models in Excel to value their business in advance of going public. These models involve looking at comparable company analysis in conjunction with an assumption about how much investors would be willing to pay for the company in question.  The valuation in an IPO model includes “an IPO discount” to ensure the stock trades well in the secondary market.

#5 Leveraged Buyout (LBO) Model

leveraged buyout transaction typically requires modeling complicated debt schedules and is an advanced form of financial modeling.  An LBO is often one of the most detailed and challenging of all types of financial models as they many layers of financing create circular references and require cash flow waterfalls.  These types of models are not very common outside of private equity or investment banking.

#6 Sum of the Parts Model

This type of model is built by taking several DCF models and adding them together.  Next, any additional components of the business that might not be suitable for a DCF analysis (i.e. marketable securities, which would be valued based on the market) are added to that value of the business.  So, for example, you would sum up (hence “Sum of the Parts”) the value of business unit A, business unit B, and investments C, less liabilities D to arrive at the Net Asset Value for the company.

#7 Consolidation Model

This type of model includes multiple business units added into one single model. Typically each business unit is its own tab, with consolidation tab that simply sums up the other business units.  This is similar to a Sum of the Parts exercise where Division A and Division B are added together and a new, consolidated worksheet is created.

#8 Budget Model

This is used to model finance for professionals in financial planning & analysis (FP&A) to get the budget together for the coming year(s).  Budget models are typically designed to be based on monthly or quarterly figures and focus heavily on the income statement.

#9 Forecasting Model

This type is also used in financial planning and analysis (FP&A) to build a forecast that compares to the budget model. Sometimes the budget and forecast models are one combined workbook and sometimes they are totally separate.

#10 Option Pricing Model

The two main types of models are binomial tree and Black-Sholes. These models are based purely on mathematical models rather than subjective criteria and therefore are more or less a straightforward calculator built into Excel.

Examples of financial models

FINANCIAL PROJECTIONS of Iconic.
The financial projections contained herein were prepared based on two fundamental assumptions:

1. modicity in the projections of variables related to revenues and

2. the estimation of expenses with a certain margin of safety. The variables used, for the most part, are included in the explanatory notes that accompany the projections. In addition, the projections took into account a scenario of average fundraising within Iconic’s
ICO. The resources, in this case, are used to provide the cash needed for the operation to enter as soon as possible in the revenue generation phase, as demonstrated in the cash flow chart.
Differences for less in ICO funding will be offset by reduction in marketing, expansion and team size dedicated to accelerating ecosystem delivery. On the other hand, differences for more in the fundraising will allow the implementation of more aggressive plans of marketing and expansion of Iconic.

Screenshot_2018-03-29-05-40-05-938_com.google.android.apps.docsICONIC financial model

Visit : https://bountyhive.io/join/Iconic

My bountyhive username :

Referral link :

Uncategorized

STEALTHCRYPTO

FcKD6NC2_400x400

descripton

Quantum Cyber Security a new age of communications – Developing the largest decentralized, incentivized, self-sustainable, quantum mesh network based on blockchain technology. Using proprietary encryption, Dynamic Split GeoDistribution™”, quantum number generation, quantum key distribution & authentication. Quantum Secure Cryptography for the Qubit blockchain, communications, smart city platforms, IoT and banking. The Team is developing a single Quantum Secure Digital Identity (QSDI) ecosystem.

token detail

SYMBOL                  : QMN

Platform                  : Ethereum

Token Type             : ERC-20

Available for sale   : 100.000.000 QMN

PreICO Price            : 1 ETH = 10,000 MOC

ICO                            : Price 1 QMN = 1.00 USD

Accepting                 : ETH, US, BTC, LTC

Website                    :  vsit

White paper            : read

ICO Time                  : 8 Feb 2018 – 8 Mar Feb 2018

Whitelist/KYC          : Whitelist & KYC

Country                    : Gibraltar

BOUNTY                   : availabe

rate

NO. ICO RATING SITE RATE MAX
1. FOUNDICO 5.8 10.0
2. ICOHOLDER 3.44 5.0
3. WISERICO 3.2 5.0
4.
5.
AVERAGE RATE 3.1/6.3

 

VISIT : bountyhive.io/join/StealthCrypto

Reff Link : bountyhive.io/r/apur