• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    Blockchain & Money: Session 3: Blockchain Basics & Cryptography by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 15, 2021 /

    Session 3: Blockchain Basics & Cryptography Session 3 Study Questions: What are the design features–cryptography, append-only, time-stamped blocks, distributed consensus algorithms, and networking– of Bitcoin, the first use case for blockchain technology? What are cryptographic hash functions, asymmetric cryptography and digital signatures? How are they utilized to help make blockchain technology verifiable and immutable? What is the double spending problem and how it is addressed by blockchain technology? Session 3 Readings: Bitcoin: A Peer-to-Peer Electronic Cash System; Satoshi Nakamoto whitepaper. ‘Blockchain Technology Overview’ NIST (pages 9-23, sections 1 & 2) ‘Blockchain 101-A Visual Demo’ Brownworth; Youtube video. Bitcoin is just the first use-case of blockchain technology. We’re going to look…

    read more
    Aaron Comments Off on Blockchain & Money: Session 3: Blockchain Basics & Cryptography by M.I.T. Sloan School of Management with Professor Gary Gensler

    You May Also Like

    Maintaining Operating Systems–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021

    Start With Why — How Great Leaders Inspire Action | Simon Sinek | TedX [VIDEO]

    June 2, 2021

    What is Attack Surface?

    June 2, 2021
  • Tech

    Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    April 14, 2021 /

    So there’s quite a juicy, drama-filled story in the Washington Post that could be a Hollywood plot line about Apple, the FBI, a terrorist’s iPhone, and HACKERS!!! Azimuth Security, a publicity-shy company that says it sells its cyber wares only to democratic governments, secretly crafted the solution the FBI used to gain access to the device, according to several people familiar with the matter. The iPhone was used by one of two shooters whose December 2015 attack left more than a dozen people dead. So, yeah Azimuth is a hacking firm for the better good you can say. Azimuth is a poster child for “white hat” hacking, experts say, which…

    read more
    Aaron Comments Off on Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    You May Also Like

    Blockchain & Money: Session 16: Central Banks and Commercial Banking, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Inline Functions, References, & Reference Parameters–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    Dual Economy Continues to Emerge as Millions Have Lost Jobs But Hiring Booms In Some Sectors…

    December 30, 2020
  • Tech

    What is Hurricane Electric? Let’s Find Out Whilst Learning About Some Computer/Cyber Network Fundamentals!!!

    April 14, 2021 /

    Hurricane Electric (corporate website here) is a global Internet Service Provider (ISP), offering IP transit, colocation, dedicated servers, among other services, based in Fremont, CA, USA and founded in 1994. Referring to themselves an the “Internet Backbone and Colocation Provider”, Hurricane Electric operates its own global IPv4 and IPv6 network and is considered the largest IPv6 backbone in the world, as measured by the total number of customer networks connected and by the total number of customer prefixes announced.[2] Hurricane Electric IP Transit Network Hurricane Electric has connections ranging from multiple 10GigE (10,000 Mbps) to multiple 100GigE (100 Gbps) that form these rings that connect H.E. core routers. [NOTE: Gigabit…

    read more
    Aaron Comments Off on What is Hurricane Electric? Let’s Find Out Whilst Learning About Some Computer/Cyber Network Fundamentals!!!

    You May Also Like

    Blockchain & Money: Session 14: Blockchain Payments, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    What exactly IS Blockchain? Blockchain Technology Explained [VIDEO]

    January 13, 2021

    Function Call Stack & Activation Records–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021
  • Tech

    Blockchain & Money: Sessions 1 & 2: Introduction and Money, Ledgers & Bitcoin by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 13, 2021 /

    There’s a great course available for free about Blockchain & Money. The semester long course is taught by Professor Gary Gensler (yes, the S.E.C. Gary Gensler), offered by M.I.T.’s Sloan School of Management, and, freely available via video-lecture. I pored over the videos and studiously took notes as I watched. The course is for students wishing to explore blockchain technology’s potential use–by entrepreneurs & incumbents–to change the world of money and finance. The course goes through a review of the technology’s initial application, the cryptocurrency Bitcoin, and then lays an understanding of the commercial, technical and public policy fundamentals of blockchain technology, distributed ledgers and smart contracts in both open…

    read more
    Aaron Comments Off on Blockchain & Money: Sessions 1 & 2: Introduction and Money, Ledgers & Bitcoin by M.I.T. Sloan School of Management with Professor Gary Gensler

    You May Also Like

    Declarations, Prototypes, Definitions, & Implementations–C++ Notes (C Plus Plus Notes)

    May 26, 2021

    Computer Organization–Notes

    May 25, 2021

    Covid-19 “Dramatically accelerated” e-Commerce Up to 5+ Years: Kohl’s CEO…

    December 30, 2020
  • Tech

    What is Border Gateway Protocol (BGP)?

    April 12, 2021 /

    Border Gateway Protocol is one of those foundational, core infrastructure protocols used by Internet users everyday but not top of mind for the average consumer or end-user. Border Gateway Protocol, or BGP, is a routing protocol. BGP is the primary protocol for the Internet, and is a Layer 4 Transport protocol that sits on top of TCP [2]. It’s purpose is to keep the various systems on the Internet up to date with the information needed to send and receive data traffic correctly. So, real quick in a nutshell, when information is sent around these Internets, it’s broken up into chunks of data called ‘packets’. Packets sent on the Internet…

    read more
    Aaron 1 Comment

    You May Also Like

    Physical Networking—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021

    Printers & Multifunction Devices—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 9, 2021

    Enumerables–A Cleaner Way to Iterate!!! [Ruby Programming Language Notes]

    May 18, 2021
  • Tech

    News & Links

    April 9, 2021 /

    The Latest Chapter In IBM’s Quest To Build A Cloud For Banks Yesterday, IBM announced the latest chapter in the IBM Cloud for Financial Services, a public cloud capable of overcoming the stringent cybersecurity and regulatory challenges for a bank. [via Forbes] Bitcoin & Blockchain Gain Prominence: 4 Top Stocks to Buy…Ok, forget the link bait about the stocks to buy and just read this article for the sense of the built-in utility of blockchain. Blockchain is enabling enterprises and government agencies to tackle prominent issues, including data tracing, security, visibility and management, and supply chain supervision. [via Yahoo! Finance] Also, in more IBM news…IBM bets on FHE (Fully Homomorphic…

    read more
    Aaron Comments Off on News & Links

    You May Also Like

    Blockchain & Money: Session 12: Assessing Use Cases by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    Metaverse security is a thing because security is still a thing…

    December 3, 2021

    Blockchain & Money: Session 17: Secondary Markets and Crypto-Exchanges, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021
  • Tech

    What is “Shadow IT”??

    April 2, 2021 /

    Wikipedia describes Shadow IT as: In big organizations, shadow IT (also known as embedded IT, fake IT, stealth IT, rogue IT, feral IT, or client IT) refers to information technology (IT) systems deployed by departments other than the central IT department, to work around the shortcomings of the central information systems. Shadow IT systems are an important source of innovation, and shadow systems may become prototypes for future central IT solutions. On the other hand, shadow IT solutions increase risks with organizational requirements for control, documentation, security, reliability, etc. via Wikipedia [1] My first thought after digesting some basic information is that Shadow IT sounds like people coming up with…

    read more
    Aaron Comments Off on What is “Shadow IT”??

    You May Also Like

    Routing–The World of TCP/IP–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 13, 2021

    Blockchain & Money: Session 14: Blockchain Payments, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    Amazon’s “Sidewalk” Mesh Network Goes Live; All Devices Are Opted-In Automatically By Default

    June 8, 2021
  • Tech

    Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    March 30, 2021 /

    According to the Bleeping Computer new service, PHP’s Git server was hacked via a backdoor to the PHP source code. PHP is a general-purpose scripting language especially suited to web development. Typically a server-side programming language, PHP powers many sites on the internet including big players like Wikipedia and Facebook. In this latest attack the official PHP Git repository was hit and the code base was tampered with. Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server. The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf …

    read more
    Aaron Comments Off on Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    You May Also Like

    What is a program?–Notes…

    May 21, 2021

    Slackware Linux Configuration Notes

    June 1, 2021

    What is Attack Surface?

    June 2, 2021
  • Tech

    Protected: What is Equinix? And Why Are They So Important??

    March 23, 2021 /

    There is no excerpt because this is a protected post.

    read more
    Aaron Enter your password to view comments.

    You May Also Like

    LinkedIn Learning Path–Comp TIA A+ and Network + Courses…

    December 30, 2020

    Blockchain & Money: Session 22: Trade Finance & Supply Chain, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 23, 2021

    Unary Scope Resolution Operator–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021
  • Tech

    Post-Quantum Cryptography: The Race Is On

    March 18, 2021 /

    Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…

    read more
    Aaron Comments Off on Post-Quantum Cryptography: The Race Is On

    You May Also Like

    Blockchain & Money: Session 13: Blockchain Payments, Part 1 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    “The Truth About Blockchain” from HBR by Marco Iansiti & Karim Lakhani

    April 20, 2021

    Security & Organization–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 11, 2021
 Older Posts
Newer Posts 

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2026 Starby Four.
Ashe Theme by WP Royal.