submitted by thamilton5 to streamr [link] [comments]
Gains x Streamr AMA Recaphttps://preview.redd.it/o74jlxia8im51.png?width=1236&format=png&auto=webp&s=93eb37a3c9ed31dc3bf31c91295c6ee32e1582be
Thanks to everyone in our community who attended the GAINS AMA yesterday with, Shiv Malik. We were excited to see that so many people attended and gladly overwhelmed by the amount of questions we got from you on Twitter and Telegram. We decided to do a little recap of the session for anyone who missed it, and to archive some points we haven’t previously discussed with our community. Happy reading and thanks to Alexandre and Henry for having us on their channel!
What is the project about in a few simple sentences?
At Streamr we are building a real-time network for tomorrow’s data economy. It’s a decentralized, peer-to-peer network which we are hoping will one day replace centralized message brokers like Amazon’s AWS services. On top of that one of the things I’m most excited about are Data Unions. With Data Unions anyone can join the data economy and start monetizing the data they already produce. Streamr’s Data Union framework provides a really easy way for devs to start building their own data unions and can also be easily integrated into any existing apps.
Okay, sounds interesting. Do you have a concrete example you could give us to make it easier to understand?
The best example of a Data Union is the first one that has been built out of our stack. It's called Swash and it's a browser plugin.
You can download it here: http://swashapp.io/
And basically it helps you monetize the data you already generate (day in day out) as you browse the web. It's the sort of data that Google already knows about you. But this way, with Swash, you can actually monetize it yourself. The more people that join the union, the more powerful it becomes and the greater the rewards are for everyone as the data product sells to potential buyers.
Very interesting. What stage is the project/product at? It's live, right?
Yes. It's live. And the Data Union framework is in public beta. The Network is on course to be fully decentralized at some point next year.
How much can a regular person browsing the Internet expect to make for example?
So that's a great question. The answer is no one quite knows yet. We do know that this sort of data (consumer insights) is worth hundreds of millions and really isn't available in high quality. So With a union of a few million people, everyone could be getting 20-50 dollars a year. But it'll take a few years at least to realise that growth. Of course Swash is just one data union amongst many possible others (which are now starting to get built out on our platform!)
With Swash, I believe they now have 3,000 members. They need to get to 50,000 before they become really viable but they are yet to do any marketing. So all that is organic growth.
I assume the data is anonymized btw?
Yes. And there in fact a few privacy protecting tools Swash supplys to its users.
How does Swash compare to Brave?
So Brave really is about consent for people's attention and getting paid for that. They don't sell your data as such.
Swash can of course be a plugin with Brave and therefore you can make passive income browsing the internet. Whilst also then consenting to advertising if you so want to earn BAT.
Of course it's Streamr that is powering Swash. And we're looking at powering other DUs - say for example mobile applications.
The holy grail might be having already existing apps and platforms out there, integrating DU tech into their apps so people can consent (or not) to having their data sold - and then getting a cut of that revenue when it does sell.
The other thing to recognise is that the big tech companies monopolise data on a vast scale - data that we of course produce for them. That is stifling innovation.
Take for example a competitor map app. To effectively compete with Google maps or Waze, they need millions of users feeding real time data into it.
Without that - it's like Google maps used to be - static and a bit useless.
Right, so how do you convince these big tech companies that are producing these big apps to integrate with Streamr? Does it mean they wouldn't be able to monetize data as well on their end if it becomes more available through an aggregation of individuals?
If a map application does manage to scale to that level then inevitably Google buys them out - that's what happened with Waze.
But if you have a data union which bundles together the raw location data of millions of people then any application builder can come along and license that data for their app. This encourages all sorts of innovation and breaks the monopoly.
We're currently having conversations with Mobile Network operators to see if they want to pilot this new approach to data monetization. And that's what even more exciting. Just be explicit with users - do you want to sell your data? Okay, if yes, then which data point do you want to sell.
Then the mobile network operator (like T-mobile for example) then organises the sale of the data of those who consent and everyone gets a cut.
Streamr - in this example provides the backend to port and bundle the data, and also the token and payment rail for the payments.
So for big companies (mobile operators in this case), it's less logistics, handing over the implementation to you, and simply taking a cut?
It's a vision that we'll be able to talk more about more concretely in a few weeks time 😁
Compared to having to make sense of that data themselves (in the past) and selling it themselves
We provide the backened to port the data and the template smart contracts to distribute the payments.
They get to focus on finding buyers for the data and ensuring that the data that is being collected from the app is the kind of data that is valuable and useful to the world.
(Through our sister company TX, we also help build out the applications for them and ensure a smooth integration).
The other thing to add is that the reason why this vision is working, is that the current data economy is under attack. Not just from privacy laws such as GDPR, but also from Google shutting down cookies, bidstream data being investigated by the FTC (for example) and Apple making changes to IoS14 to make third party data sharing more explicit for users.
All this means that the only real places for thousands of multinationals to buy the sort of consumer insights they need to ensure good business decisions will be owned by Google/FB etc, or from SDKs or through this method - from overt, rich, consent from the consumer in return for a cut of the earnings.
A couple of questions to get a better feel about Streamr as a whole now and where it came from. How many people are in the team? For how long have you been working on Streamr?
We are around 35 people with one office in Zug, Switzerland and another one in Helsinki. But there are team members all over the globe, we’ve people in the US, Spain, the UK, Germany, Poland, Australia and Singapore. I joined Streamr back in 2017 during the ICO craze (but not for that reason!)
And did you raise funds so far? If so, how did you handle them? Are you planning to do any future raises?
We did an ICO back in Sept/Oct 2017 in which we raised around 30 Millions CHF. The funds give us enough runway for around five/six years to finalize our roadmap. We’ve also simultaneously opened up a sister company consultancy business, TX which helps enterprise clients implementing the Streamr stack. We've got no more plans to raise more!
What is the token use case? How did you make sure it captures the value of the ecosystem you're building
The token is used for payments on the Marketplace (such as for Data Union products for example) also for the broker nodes in the Network. ( we haven't talked much about the P2P network but it's our project's secret sauce).
The broker nodes will be paid in DATAcoin for providing bandwidth. We are currently working together with Blockscience on our tokeneconomics. We’ve just started the second phase in their consultancy process and will be soon able to share more on the Streamr Network’s tokeneconoimcs.
But if you want to summate the Network in a sentence or two - imagine the Bittorrent network being run by nodes who get paid to do so. Except that instead of passing around static files, it's realtime data streams.
That of course means it's really well suited for the IoT economy.
Well, let's continue with questions from Twitter and this one comes at the perfect time. Can Streamr Network be used to transfer data from IOT devices? Is the network bandwidth sufficient? How is it possible to monetize the received data from a huge number of IOT devices? From u/ EgorCypto
Yes, IoT devices are a perfect use case for the Network. When it comes to the network’s bandwidth and speed - the Streamr team just recently did extensive research to find out how well the network scales.
The result was that it is on par with centralized solutions. We ran experiments with network sizes between 32 to 2048 nodes and in the largest network of 2048 nodes, 99% of deliveries happened within 362 ms globally.
To put these results in context, PubNub, a centralized message brokering service, promises to deliver messages within 250 ms — and that’s a centralized service! So we're super happy with those results.
Here's a link to the paper:
While we're on the technical side, second question from Twitter: Can you be sure that valuable data is safe and not shared with service providers? Are you using any encryption methods? From u/ CryptoMatvey
Yes, the messages in the Network are encrypted. Currently all nodes are still run by the Streamr team. This will change in the Brubeck release - our last milestone on the roadmap - when end-to-end encryption is added. This release adds end-to-end encryption and automatic key exchange mechanisms, ensuring that node operators can not access any confidential data.
If BTW - you want to get very technical the encryption algorithms we are using are: AES (AES-256-CTR) for encryption of data payloads, RSA (PKCS #1) for securely exchanging the AES keys and ECDSA (secp256k1) for data signing (same as Bitcoin and Ethereum).
Last question from Twitter, less technical now :) In their AMA ad, they say that Streamr has three unions, Swash, Tracey and MyDiem. Why does Tracey help fisherfolk in the Philippines monetize their catch data? Do they only work with this country or do they plan to expand? From u/ alej_pacedo
So yes, Tracey is one of the first Data Unions on top of the Streamr stack. Currently we are working together with the WWF-Philippines and the UnionBank of the Philippines on doing a first pilot with local fishing communities in the Philippines.
WWF is interested in the catch data to protect wildlife and make sure that no overfishing happens. And at the same time the fisherfolk are incentivized to record their catch data by being able to access micro loans from banks, which in turn helps them make their business more profitable.
So far, we have lots of interest from other places in South East Asia which would like to use Tracey, too. In fact TX have already had explicit interest in building out the use cases in other countries and not just for sea-food tracking, but also for many other agricultural products.
(I think they had a call this week about a use case involving cows 😂)
I recall late last year, that the Streamr Data Union framework was launched into private beta, now public beta was recently released. What are the differences? Any added new features? By u/ Idee02
The main difference will be that the DU 2.0 release will be more reliable and also more transparent since the sidechain we are using for micropayments is also now based on blockchain consensus (PoA).
Are there plans in the pipeline for Streamr to focus on the consumer-facing products themselves or will the emphasis be on the further development of the underlying engine?by u/ Andromedamin
We're all about what's under the hood. We want third party devs to take on the challenge of building the consumer facing apps. We know it would be foolish to try and do it all!
As a project how do you consider the progress of the project to fully developed (in % of progress plz) by u/ Hash2T
We're about 60% through I reckon!
What tools does Streamr offer developers so that they can create their own DApps and monetize data?What is Streamr Architecture? How do the Ethereum blockchain and the Streamr network and Streamr Core applications interact? By u/ CryptoDurden
We'll be releasing the Data UNion framework in a few weeks from now and I think DApp builders will be impressed with what they find.
We all know that Blockchain has many disadvantages as well,
So why did Streamr choose blockchain as a combination for its technology?
What's your plan to merge Blockchain with your technologies to make it safer and more convenient for your users? By u/ noonecanstopme
So we're not a blockchain ourselves - that's important to note. The P2P network only uses BC tech for the payments. Why on earth for example would you want to store every single piece of info on a blockchain. You should only store what you want to store. And that should probably happen off chain.
So we think we got the mix right there.
What were the requirements needed for node setup ? by u/ John097
Good q - we're still working on that but those specs will be out in the next release.
How does the STREAMR team ensure good data is entered into the blockchain by participants? By u/ kartika84
Another great Q there! From the product buying end, this will be done by reputation. But ensuring the quality of the data as it passes through the network - if that is what you also mean - is all about getting the architecture right. In a decentralised network, that's not easy as data points in streams have to arrive in the right order. It's one of the biggest challenges but we think we're solving it in a really decentralised way.
What are the requirements for integrating applications with Data Union? What role does the DATA token play in this case? By u/ JP_Morgan_Chase
There are no specific requirements as such, just that your application needs to generate some kind of real-time data. Data Union members and administrators are both paid in DATA by data buyers coming from the Streamr marketplace.
Regarding security and legality, how does STREAMR guarantee that the data uploaded by a given user belongs to him and he can monetize and capitalize on it? By u/ kherrera22
So that's a sort of million dollar question for anyone involved in a digital industry. Within our system there are ways of ensuring that but in the end the negotiation of data licensing will still, in many ways be done human to human and via legal licenses rather than smart contracts. at least when it comes to sizeable data products. There are more answers to this but it's a long one!
Okay thank you all for all of those!
The AMA took place in the GAINS Telegram group 10/09/20. Answers by Shiv Malik.
Today we will talk about the security of using the Tkeycoin platform and the TKEYSPACE mobile blockchain wallet.submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Tkeycoin is a peer-to-peer payment system based on p2p principles and the concept of electronic cash. P2P technology is a fairer means of mutual settlements between users and companies around the world. Modern payment systems are imperfect and may depend on the will of high-ranking officials.
We approached the market from an economic and scientific point of view, borrowing the best from Bitcoin, Ethereum, DASH, and other alternative currencies, mixing modern concepts and building on the global experience of IBM, Microsoft and a number of other companies and research.
The Tkeycoin blockchain is protected by various mechanisms that include advanced cryptographic methods and mathematical models of behavior and decision-making. Blockchain technology prevents duplication or destruction of digital assets.
In addition to providing security and recording transactions in registers, cryptography also plays a role in ensuring the security of wallets used to store Tkeycoin. Paired public and private keys, which respectively allow users to receive and send payments, are created using asymmetric encryption or public-key cryptography. Public keys are used to generate digital signatures for transactions, which allows you to authenticate ownership of the coins being sent.
The asymmetric cryptography architecture does not allow anyone other than the owner of the private key to access funds stored in the cryptocurrency wallet, so these funds are kept safe until the owner decides to spend them.
In simple words, in the Tkeycoin peer-to-peer system, only you are the real owner of your money and only You have access to it.
Using tools such as a local Tkeycoin Core wallet or TkeySpace provides you with reliable storage, privacy, and security.
TkeySpace, in turn, adds maximum usability by combining the highest level of security and easy intuitive design.
How does TKEYSPACE provide security?TKEYSPACE is one of the first applications that support blockchain in a mobile device and is also the first decentralized application of the TKEY platform.
Its serverless architecture provides the highest level of security for storing all assets in the application. unlike centralized applications that are managed by companies, TkeySpace does not have a Central management authority and operates in accordance with all the principles of peer-to-peer networks.
As we said above, the wallets in the blockchain have a public and private key. Centralized applications usually store users ‘private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft.
TkeySpace-stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. The backup phrase provides the maximum level of security and thanks to its usual appearance, an attacker is unlikely to ever guess what these words are and what they are for.
A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
And so that you do not get confused in the definitions and concepts, we will briefly describe simple and clear principles of how it all works. Let’s look briefly at the factors.
Lock ScreenThe simplest thing that protects your phone from unauthorized access is Pincode, a snake, a fingerprint or a Face Id login. And it would seem that this is related to TKEYSPACE?
Every platform, whether it’s Android or AppStore, uses specialized key stores. Cryptography, symmetric and asymmetric encryption, keys, and certificates are directly related to this task.
Keys and certificates that are used to protect information must also be securely protected. Android uses Keystore, a certificate and a Keystore, for this purpose.
Keystore is a specialized secret data store that is used by Java applications to encrypt, authenticate, and establish HTTPS connections.
For two-way authentication, the client and server exchange certificates, respectively, and the server and client must have a Keystore with a private/public key pair and a certificate. In other words, the Keystore is used to store keys and certificates that are used to identify the key owner (client or server).Starting with Android 8, the encryption systems have been upgraded, the system is checked for signs of hacking at startup, and the screen lock allows you to restrict access to the device. Data encryption and the use of keys ensure the security of information when it is stored and transmitted.
In the new version of the OS — Android 9 (Pie) — the developers also added support for hardware to protect against unauthorized changes.
Android apps run in an isolated software environment that restricts access to your information to other apps. OS components are also protected, which prevents attackers from exploiting system errors for their purposes.
Android uses both hardware and software to protect users and their data. Therefore, even at the operating system level, there are a lot of security factors. Of course, if you “flash” the phone (change the factory firmware) and enable Root access, this will reduce the security of Your device, but this is more an exception than a rule and such changes are usually introduced by very experienced users.
IOS uses Keychain — a specialized database for storing metadata and confidential information. Using a Keychain is the best practice for storing small pieces of data that are critical to your apps, such as secrets and passwords. In addition to the Keychain, Apple provides a full range of maximum protection for Your device.
And so we will continue,
Passcode in the appNow we understand that to get access to the tools, an attacker needs to hack the hardware security of the Google and Apple giants to somehow get access to the app, which is impossible.
To increase security and eliminate other risk factors, we have included an access code (secret code) in the app.
You set an additional level of security by enabling a pin code to log in to the app. The access code additionally encrypts all data stored in the app.
Just so you understand — it’s not just numbers that you enter on the screen, this combination affects the ciphers inside the app. When creating a key, a user interface element is called. when the user swipes the screen, the application receives a random set of bytes — thus, all information is additionally covered by a new layer of cryptography.
And as we said above, if you try to disable the pin code, the app will delete all the data, and the attacker will be left with nothing.
As we have already realized, only 2 of these factors provide the maximum level of security for the TKEYSPACE application.
And the most important thing is that the application runs on the blockchain, which guarantees its full Autonomous operation, data immutability, and privacy.
Generation of new addresses, absence of accounts, phone numbers, e-mail and other personal data-provides you with a social level of security, which is a huge advantage in our time.
In a world where security is based on the level of cryptography, attackers try to influence You with the human factor using social engineering, so when you use applications with accounts, phone numbers, you have more risks.
Social engineering is a method of obtaining the necessary access to information based on the characteristics of human psychology.For example, a copy of a SIM-card has become a new tool for fraudsters, but there is no personal information in TKEYSPACE, so even such groups of fraudsters can’t get access to your funds.
You don’t have to worry about security — it’s already built into the TKEYSPACE system.A mixed encryption system based on the principles of computational complexity, with the deterministic generation of signatures using elliptic curves, provides absolute security and safety of user funds, and reserve phrases will help you restore funds at any moment.
A mnemonic phrase is 12 or 24 words that are generated using the entropy of random numbers.
If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
Only you and no one else has access to the phrase. When you get the key, the app has restrictions on the screenshot, and the clipboard is disabled, which protects against malicious software.
It is you, as a user, who sees the phrases, and everything in the device is encrypted, the blockchain architecture protects against hacker attacks, information forgery, and other hacks.
For those who are a bit obsessed with persecution mania, we offer a small lifehack:
Buy several USB drives, connect them to a device that does not have access to the Internet, preferably on a clean operating system, create a text file, write backup phrases there, and encrypt the USB drives with passwords.
Once again, to ensure security and easy recovery, it is enough to record backup phrases once and make several backups. you do not need to resort to an additional encryption method, because we have already done everything for you :)
A file encrypted twice and decrypted once is still garbage.EDIT 2: I've rewritten the bulk of this post so people don't have to slog through edits for important information.
The waiting for payment confirmation screen stayed up for 16 days before a decryption began, so don't lose hope if it's been up a while.
The DWORD values in the registry have no bearing on decryption. Renaming an encrypted file to one on the list in the registry will decrypt it. However, I would presume this would only work for files that the virus encrypted on that machine as the public key is different with every infection.
Adding any new matching files to somewhere the virus has access will cause them to be encrypted, even at the "waiting for payment confirmation" screen. Be careful.
Hitting "Cancel" on a file that can't be found doesn't cancel the entire decryption, just that file.
|Course Name||Start Date||Length (in weeks)||Provider||Rating|
|BJC.1x: The Beauty and Joy of Computing, Part 1||8th Sep, 2015||NA||edX||☆☆☆☆☆|
|Data Analysis and Statistical Inference||14th Sep, 2015||10||Coursera||★★★★★ (22 reviews)|
|Usable Security||14th Sep, 2015||6||Coursera||★★★★☆ (3 reviews)|
|Programming and the Web for Beginners||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Ruby on Rails: An Introduction||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Introduction to HTML5||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Getting Started with Python||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|DEV208x: Introduction to jQuery||15th Sep, 2015||3||edX||☆☆☆☆☆|
|Louv1.1x: Paradigms of Computer Programming – Fundamentals||21st Sep, 2015||5||edX||☆☆☆☆☆|
|CAMS.2x: Computing: Art, Magic, Science||22nd Sep, 2015||7||edX||☆☆☆☆☆|
|CODAPPS: Coding mobile apps for entrepreneurs||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Intro to Computer Science||Self paced||12||Udacity||★★★★★ (47 reviews)|
|Intro to Java Programming||Self paced||16||Udacity||★★★☆☆ (10 reviews)|
|Mobile Web Development||Self paced||6||Udacity||☆☆☆☆☆|
|DB: Introduction to Databases||Self paced||11||Stanford OpenEdx||★★★★★ (5 reviews)|
|Make Your Own 2048||Self paced||NA||Udacity||★★★★☆ (3 reviews)|
|Programming Foundations with Python||Self paced||6||Udacity||★★★★☆ (2 reviews)|
|Intro to HTML and CSS||Self paced||3||Udacity||★★★★☆ (10 reviews)|
|How to Use Git and GitHub||Self paced||3||Udacity||★★★★★ (15 reviews)|
|CS50x: Introduction to Computer Science||Self paced||NA||edX||★★★★★ (33 reviews)|
|Intro to Relational Databases||Self paced||4||Udacity||★★★☆☆ (1 review)|
|Networking: Introduction to Computer Networking||Self paced||11||Stanford OpenEdx||★★★★★ (5 reviews)|
|CS101: Computer Science 101||Self paced||6||Stanford OpenEdx||★★★☆☆ (5 reviews)|
|CS002x: Programming in Scratch||Self paced||6||edX||★★★★☆ (3 reviews)|
|CS001x: MyCS: Computer Science for Beginners||Self paced||6||edX||★★★☆☆ (1 review)|
|DEV203x: Introduction to Bootstrap – A Tutorial||Self paced||3||edX||★★☆☆☆ (5 reviews)|
|LFS101x.2: Introduction to Linux||Self paced||8||edX||★★★★☆ (16 reviews)|
|CS005x: CS For All: Introduction to Computer Science and Python Programming||Self paced||14||edX||★★★★★ (2 reviews)|
|CS101.1x: Introduction to Computer Programming, Part 1||Self paced||9||edX||★★☆☆☆ (9 reviews)|
|COMP102.1x: Introduction to Java Programming – Part 1||Self paced||5||edX||★★★★☆ (3 reviews)|
|Learn Swift Programming Syntax||Self paced||3||Udacity||☆☆☆☆☆|
|Linux Command Line Basics||Self paced||1||Udacity||☆☆☆☆☆|
|Computer Science 101||Self paced||NA||Coursera||★★★★☆ (11 reviews)|
|Course Name||Start Date||Length (in weeks)||Provider||Rating|
|EX101x: Data Analysis: Take It to the MAX()||1st Sep, 2015||8||edX||★★★☆☆ (10 reviews)|
|Python Data Structures||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Programming Mobile Applications for Android Handheld Systems: Part 1||2nd Sep, 2015||4||Coursera||★★★★☆ (27 reviews)|
|Programming Mobile Applications for Android Handheld Systems: Part 2||2nd Sep, 2015||4||Coursera||★★★★★ (7 reviews)|
|Algorithms, Part I||4th Sep, 2015||6||Coursera||★★★★☆ (24 reviews)|
|Algorithmic Thinking (Part 1)||5th Sep, 2015||4||Coursera||★★★☆☆ (3 reviews)|
|Statistical Inference||7th Sep, 2015||4||Coursera||★★☆☆☆ (9 reviews)|
|Regression Models||7th Sep, 2015||4||Coursera||★★★☆☆ (8 reviews)|
|Practical Machine Learning||7th Sep, 2015||4||Coursera||★★★☆☆ (10 reviews)|
|Developing Data Products||7th Sep, 2015||4||Coursera||★★★★☆ (4 reviews)|
|Introduction to Genomic Technologies||7th Sep, 2015||4||Coursera||★★★☆☆ (6 reviews)|
|Bioconductor for Genomic Data Science||7th Sep, 2015||4||Coursera||☆☆☆☆☆|
|Python for Genomic Data Science||7th Sep, 2015||4||Coursera||★★★★☆ (4 reviews)|
|Statistics for Genomic Data Science||7th Sep, 2015||4||Coursera||☆☆☆☆☆|
|Concepts in Game Development||7th Sep, 2015||4||Open2Study||★★★★☆ (14 reviews)|
|The Data Scientist’s Toolbox||7th Sep, 2015||4||Coursera||★★★☆☆ (79 reviews)|
|R Programming||7th Sep, 2015||4||Coursera||★★★☆☆ (128 reviews)|
|Getting and Cleaning Data||7th Sep, 2015||4||Coursera||★★★☆☆ (23 reviews)|
|Exploratory Data Analysis||7th Sep, 2015||4||Coursera||★★★★☆ (13 reviews)|
|Reproducible Research||7th Sep, 2015||4||Coursera||★★★★☆ (10 reviews)|
|SPD2x: Systematic Program Design - Part 2: Arbitrary Sized Data||8th Sep, 2015||5||edX||☆☆☆☆☆|
|Analysis of Algorithms||11th Sep, 2015||6||Coursera||★★★★☆ (1 review)|
|Automata||12th Sep, 2015||6||Coursera||★★★★☆ (7 reviews)|
|Mining Massive Datasets||12th Sep, 2015||7||Coursera||★★★★★ (6 reviews)|
|Software Security||14th Sep, 2015||6||Coursera||★★★★★ (11 reviews)|
|Cryptography||14th Sep, 2015||7||Coursera||★★★★★ (4 reviews)|
|Introduction To Swift Programming||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Foundations of Objective-C App Development||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Database Management Essentials||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Introduction to Big Data||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Data Management and Visualization||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Introduction to Software Product Management||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Object Oriented Programming in Java||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|Design of Computer Programs||Self paced||8||Udacity||★★★★☆ (9 reviews)|
|Web Development||Self paced||12||Udacity||★★★★★ (16 reviews)|
|Programming Languages||Self paced||8||Udacity||★★★☆☆ (7 reviews)|
|Intro to Algorithms||Self paced||16||Udacity||★☆☆☆☆ (1 review)|
|Software Testing||Self paced||4||Udacity||★★★★☆ (5 reviews)|
|Software Debugging||Self paced||8||Udacity||★★★★☆ (2 reviews)|
|Intro to Theoretical Computer Science||Self paced||8||Udacity||★★★★★ (1 review)|
|Intro to Artificial Intelligence||Self paced||16||Udacity||★★★★☆ (4 reviews)|
|HTML5 Game Development||Self paced||8||Udacity||★★★☆☆ (4 reviews)|
|Learning from Data (Introductory Machine Learning course)||Self paced||10||Others||★★★★☆ (2 reviews)|
|Intro to Hadoop and MapReduce||Self paced||4||Udacity||★★★★☆ (8 reviews)|
|CS 8802, Artificial Intelligence for Robotics: Programming a Robotic Car||Self paced||NA||Udacity||★★★★★ (1 review)|
|Intro to Data Science||Self paced||8||Udacity||★★★★☆ (7 reviews)|
|Data Wrangling with MongoDB||Self paced||8||Udacity||★★★★☆ (3 reviews)|
|Data Analysis with R||Self paced||8||Udacity||★★★★★ (11 reviews)|
|Parallel Programming Concepts||Self paced||NA||openHPI||★★★★☆ (3 reviews)|
|Website Performance Optimization||Self paced||1||Udacity||★★★★☆ (2 reviews)|
|UX Design for Mobile Developers||Self paced||6||Udacity||★★★★☆ (1 review)|
|Developing Scalable Apps in Java||Self paced||8||Udacity||★★★★☆ (1 review)|
|Developing Android Apps||Self paced||10||Udacity||★★★★★ (2 reviews)|
|Software Development Process||Self paced||12||Udacity||☆☆☆☆☆|
|Computer Networking||Self paced||12||Udacity||★★★★★ (2 reviews)|
|Practical Numerical Methods with Python||Self paced||17||Others||★★★★★ (2 reviews)|
|Intro to AJAX||Self paced||2||Udacity||★★★★★ (1 review)|
|Data Visualization and D3.js||Self paced||7||Udacity||★★★☆☆ (1 review)|
|HTML5 Canvas||Self paced||2||Udacity||★★★★☆ (2 reviews)|
|Intro to iOS App Development with Swift||Self paced||4||Udacity||★★★★★ (4 reviews)|
|Intro to jQuery||Self paced||NA||Udacity||★★★★☆ (2 reviews)|
|Intro to Machine Learning||Self paced||10||Udacity||★★★★☆ (5 reviews)|
|Full Stack Foundations||Self paced||3||Udacity||☆☆☆☆☆|
|Responsive Web Design Fundamentals||Self paced||2||Udacity||★★★★☆ (3 reviews)|
|Health Informatics in the Cloud||Self paced||5||Udacity||☆☆☆☆☆|
|UIKit Fundamentals||Self paced||8||Udacity||☆☆☆☆☆|
|LPL: Language, Proof and Logic||Self paced||15||Stanford OpenEdx||☆☆☆☆☆|
|Responsive Images||Self paced||2||Udacity||★★★★☆ (2 reviews)|
|Machine Learning||Self paced||NA||Coursera||★★★★★ (100 reviews)|
|iOS Networking with Swift||Self paced||12||Udacity||☆☆☆☆☆|
|Authentication & Authorization: OAuth||Self paced||2||Udacity||★★★★☆ (2 reviews)|
|Browser Rendering Optimization||Self paced||4||Udacity||★★★★☆ (1 review)|
|Developing Scalable Apps in Python||Self paced||6||Udacity||★★★★☆ (1 review)|
|iOS Persistence and Core Data||Self paced||8||Udacity||☆☆☆☆☆|
|How to Make an iOS App||Self paced||12||Udacity||☆☆☆☆☆|
|Android Performance||Self paced||4||Udacity||☆☆☆☆☆|
|Android Development for Beginners||Self paced||4||Udacity||★★★★☆ (5 reviews)|
|Advanced Android App Development||Self paced||6||Udacity||☆☆☆☆☆|
|Android Design for Developers||Self paced||4||Udacity||☆☆☆☆☆|
|Android Ubiquitous Computing||Self paced||4||Udacity||☆☆☆☆☆|
|Google Play Services||Self paced||8||Udacity||☆☆☆☆☆|
|Gradle for Android and Java||Self paced||6||Udacity||★★★★★ (1 review)|
|DEV201x: Introduction to TypeScript||Self paced||6||edX||☆☆☆☆☆|
|DEV202.1x: Building Cloud Apps with Microsoft Azure – Part 1||Self paced||4||edX||★★★☆☆ (1 review)|
|DEV204x: Programming with C#||Self paced||6||edX||★★★★☆ (5 reviews)|
|AMRx: Autonomous Mobile Robots||Self paced||NA||edX||★★★☆☆ (3 reviews)|
|Xcode Debugging||Self paced||3||Udacity||☆☆☆☆☆|
|PH525.1x: Statistics and R for the Life Sciences||Self paced||4||edX||★★★★☆ (6 reviews)|
|KIexploRx: Explore Statistics with R||Self paced||NA||edX||★★★★☆ (7 reviews)|
|Intro to DevOps||Self paced||3||Udacity||☆☆☆☆☆|
|Configuring Linux Web Servers||Self paced||1||Udacity||☆☆☆☆☆|
|Learn Backbone.js||Self paced||2||Udacity||☆☆☆☆☆|
|Android TV and Google Cast Development||Self paced||1||Udacity||☆☆☆☆☆|
|Course Name||Start Date||Length (in weeks)||Provider||Rating|
|Bitcoin and Cryptocurrency Technologies||4th Sep, 2015||7||Coursera||☆☆☆☆☆|
|Genomic Data Science with Galaxy||7th Sep, 2015||4||Coursera||★★☆☆☆ (4 reviews)|
|Command Line Tools for Genomic Data Science||7th Sep, 2015||4||Coursera||☆☆☆☆☆|
|Algorithms for DNA Sequencing||7th Sep, 2015||4||Coursera||★★★★★ (8 reviews)|
|Hardware Security||14th Sep, 2015||6||Coursera||★★★☆☆ (6 reviews)|
|Big Data Science with the BD2K-LINCS Data Coordination and Integration Center||15th Sep, 2015||7||Coursera||★★★☆☆ (1 review)|
|Machine Learning Foundations: A Case Study Approach||Sep, 2015||NA||Coursera||☆☆☆☆☆|
|DAT203x: Data Science and Machine Learning Essentials||24th Sep, 2015||5||edX||☆☆☆☆☆|
|Machine Learning||Self paced||NA||Udacity||★★★★★ (1 review)|
|Artificial Intelligence for Robotics||Self paced||8||Udacity||★★★★★ (11 reviews)|
|Applied Cryptography||Self paced||8||Udacity||★★★★☆ (2 reviews)|
|Intro to Parallel Programming||Self paced||12||Udacity||★★★★☆ (2 reviews)|
|Interactive 3D Graphics||Self paced||8||Udacity||★★★★★ (2 reviews)|
|Functional Hardware Verification||Self paced||8||Udacity||★★★★★ (1 review)|
|Machine Learning 1—Supervised Learning||Self paced||NA||Udacity||★★★★☆ (1 review)|
|Machine Learning 2—Unsupervised Learning||Self paced||NA||Udacity||★★★★☆ (1 review)|
|Machine Learning 3—Reinforcement Learning||Self paced||4||Udacity||★★★☆☆ (2 reviews)|
|In-Memory Data Management In a Nutshell||Self paced||NA||openSAP||★★☆☆☆ (1 review)|
|Real-Time Analytics with Apache Storm||Self paced||2||Udacity||★★★★☆ (1 review)|
|Model Building and Validation||Self paced||8||Udacity||★★★☆☆ (3 reviews)|
|Advanced Operating Systems||Self paced||5||Udacity||★★★★★ (1 review)|
|High Performance Computer Architecture||Self paced||NA||Udacity||☆☆☆☆☆|
|Computability, Complexity & Algorithms||Self paced||NA||Udacity||☆☆☆☆☆|
|Knowledge-Based AI: Cognitive Systems||Self paced||7||Udacity||☆☆☆☆☆|
|Introduction to Recommender Systems||Self paced||NA||Coursera||★★★★☆ (10 reviews)|
|Machine Learning||Self paced||16||Udacity||☆☆☆☆☆|
|Rate (per day)||0.69||9.75|
Generated with BBoe's Subreddit Stats (Donate)
2048 Game is centered on a devilishly simple idea – you use the arrow keys to slide pieces around the 4×4 grid. Each movement sends the tiles to as far as it can go in a specific direction, while at the same time causing a 2 or 4 to appear on the board randomly. As the value increases, tiles change color and will emit a glow around them. Individuals, businesses, developers: learn from our simple Bitcoin guides. How Bitcoin works, what is Bitcoin, what is blockchain, how to buy Bitcoin, what is Bitcoin mining and more. 2048 is an easy and fun puzzle game. Even if you don't love numbers you will love this game. It is played on a 4x4 grid using the arrows or W, A, S, D keys alternatively. Every time you press a key - all tiles slide. Tiles with the same value that bump into one-another are merged. Although there might be an optimal strategy to play, there is always some level of chance. If you beat the game ... Join the numbers and get to the 2048 tile! Join the numbers and get to the 2048 tile! Careful: this game is extremely addictive! 2048. 0. 0. Join the tiles, get to 2048! How to play → New Game. Keep going Try again. How to play: Use your arrow keys Swipe with your fingers to move the tiles. Tiles with the same number merge into one when they touch. Add them up to reach 2048! Start playing ... Google hat ein System für den Hinweis auf unsichere, gefährliche oder Seiten für Ihre Navigation, irreführend, wenn die Website %s in dieser Liste enthalten ist, impliziert, dass diese Web Site sehr gefährlich für die Navigation ist und absolut nicht ratsam durchsuchen kaufen oder alles zu tun ist, der. Google Vorschau . Bitcoin 2048 Game . m.bitcoin2048.com / Win Free Bitcoins playing ...
[index]