Latest News

IOTA’s Qubic explained #2

After the teaser on the 3rd of May, the IOTA Foundation has now revealed the full meaning behind the long-awaited Qubic project. In my previous blog, I explained the individual components that were teased: Oracles, Smart Contracts, and Outsourced Computation. The explanations still hold true as the details of Qubic seem to work as I assumed. However, a lot more information has come to light about the implementation details of Qubic. The concepts are very hard to understand, but in this blog, I will try and explain it in an…

IOTA and Qubic – The Start of New Era (and the Fulfillment of a Long Time Dream)

Inspired by Steve David's (then CIO of Procter & Gamble) vision of a "Consumer Driven Supply Network", SAP embarked on a journey to reinvent supply chain management systems back in the year 2001. The quest to become a leader in Gartner's Magic Quadrant would lead us to become a founding member of the MIT Auto-ID Center, where Kevin Ashton invented the term "Internet of Things". It also lead us to collaborate with the brilliant minds of BiosGroup, a spin-off of the Santa Fe Institute and founded by the godfather of…

What is “Q” from a laymen given Barney style…

A bit long, but I think it might help people understand Qubic a bit.Two takeaways I took from reading Qubic:1. If you host a “Q-Node”, a node that supports the Q protocol (layer) you can earn rewards in these manners: Offering PoW (mining rigs, computer, or your coffee pot), PoS (your IOTA’s that you hold), your bandwidth that you don’t use (probably something to do with LIFI in the future, so this could be your router and lightbulbs in your house), and simply, the previous history of running an honest node for the …

Qubic – Details on the most significant project built on top of IOTA

What is Qubic? In short: Qubic began life as as an initalism-turned-acronym, QBC, which stands for quorum-based computation.Quorum (distributed_computing) on wikipediaSpecifically, Qubic is a protocol that specifies IOTA's solution for quorum-based computations, including such constructs as oracle machines, outsourced computations, and smart contracts. Qubic provides general-purpose, cloud- or fog-based, permissionless, multiprocessing capabilities on the Tangle. In the long term, Qubic will allow people to leverage…

Nordic Semiconductor and NTNU in Norway explore IOTA and the Data Marketplace

The IOTA Data Marketplace initiative was launched in Q4 2017 as a joint Proof of Concept (PoC) and open innovation ecosystem. The platform simulates future data exchange and data trading by enabling connected devices to be paid via zero micropayments for data they share securely in real-time over the web. The first phase of this PoC development is finished from IOTA’s end and provides for a growing number of dedicated organisations the possibility to demystify IOTA through a simple experiment.Nordic Semiconductor is a…

Trinity: Threat Modelling Mitigation Report

The Trinity threat modelling report (available here) produced by Cybersecurity Lab at COMSATS University Islamabad, outlines several important threats. In the interest of full transparency, this article outlines the mitigation efforts that the Trinity team have undertaken, to provide the utmost security for all end users. Threat 1: Attacker steals seed by monitoring the Android clipboard through a malicious app Due to inherent security issues in relation to the Android clipboard, it is advised to avoid clipboard use with…

DNB teams up with IOTA to explore the Economy of Things and MyData / ‘GDPR as an opportunity’

DNB ASA and the IOTA Foundation signed a cooperation agreement to drive open innovation and co-creation in the space of citizen centric innovation, machine economy and decentralised data marketplacesOslo, Norway, May 2018 — DNB and the IOTA Foundation (IOTA) signed a Memorandum of Understanding coming into effect immediately. The two parties will collaborate on exploring the new digital innovation landscape made possible by the IOTA Tangle technology.DNB ASA is Norway’s largest financial services group and one of the…

FogNet Update # 1

Since we won the IOTA Flash Channel competition a couple of months ago, we have had many people who have asked us how to become involved or simply expressing their enthusiasm for the project. This feedback has really validated our belief that a decentralized alternative network is valuable to society. Yesterday we had a great time sharing our work in a Meetup here in Seattle. Here is an update of some things we have been working on:Guiding principles There are a lot of options that one has to make in the design…

CEBIT-Exhibitor 2018 / IOTA – Partner at VOLKSWAGEN

The IOTA Foundation participates in this year's New Cebit - Europe's Business Festival for Innovation and Digitization. As a triple-punch event featuring exhibits, conferences and networking, CEBIT covers the digitization of business, government and society from every angle. Its four sections – d!conomy, d!tec, d!talk and d!campus – represent an entirely new approach, but one thing remains: the show’s core focus on generating leads and business for all concerned! The IOTA Foundation is part of the Volkswagen Future Mobility…

Welcome Mathew Yarger to the IOTA Foundation

Mathew Yarger is a Cyber Security expert, DoD Certified Forensic Examiner, Certified Ethical Hacker, and experienced Project Manager with National and International scaled projects. Mathew has a diverse Computer Science and Network Security background, and has been getting increasingly involved in Blockchain and Distributed Ledger Technologies (DLTs) over the last 2 years. A longtime proponent of IOTAs Tangle methodology, Mathew is also a distinguished US Army Combat Veteran with 8 years of service and a tour in Iraq where…

Interview with Kevin Chen, Founder and Head of IOTA Evangelist Network (IEN)

I met Kevin Chen at some point of 2017, in the IOTA Slack. I can’t remember when (and I have no way to find out since Slack deleted most of our conversations). I think it was Rajiv Shah who introduce me to Kev and I know for sure that the first time we spoke he told me about the IOTA Evangelist Network and kind of invited me to apply. It took me some time to do it, but I finally ended up becoming a IEN member some months ago. Since then, as a part of this network, I got in touch with lots of people aroun the globe doing…

Conclusion | Cyber Security Lab: Threat Modelling of IOTA Trinity Wallet

Conclusion "While we can mitigate the risk of an attack, we can never wholly eliminate risk from any complex application. The truth in the world of security is that we recognize the nearness of threats and we deal with our risks. Threat analysis enables us to examine and impart security throughout our work. In our threat analysis, we have: identified sensitive system assets, identified ways that an attacker could compromise the system and gain access to the sensitive assets, and prioritised these threats by categorizing…

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. AcceptRead More