• NFT: HTML for Internet value


    Reading guideThis is a reasonable speculation.Looking back on the development of information internet for decades, the world wide web (WWW) is one of the most important developments. Nowadays, when we refer to the information internet, we mostly refer to the world wide web; Web1.0, Web2.0 and Web3.0 we often refer to the world wide web. […]

  • Build jumpserver fortress machine to manage tens of thousands of game servers


    The article is a little long. Please read it patiently! 1 jumpserver fortress machine Overview – deploy jumpserver running environment 1.1 overview of springboard machine The springboard machine is a server. In the maintenance process, developers or operation and maintenance personnel must log in to this server uniformly first, and then log in toMaintain and […]

  • Will filecoin’s market value surpass Ethereum in the future?


    More and more voices in the encryption industry believe that the possibility of Ethereum’s market value surpassing bitcoin is increasing. Ethereum is valuable because Ethereum network is the most commonly used smart contract protocol. It has the largest number of developers, dapps, and the largest total value lock-in. data storage In 2018, Ethereum experienced a […]

  • Founder of dapppreview: my understanding of NFT and metaverse


    Title: NFT and metaverse in my understandingBy Vincent, founder of dapppreview Almost three years ago, I wrote an article “talking about blockchain games that you don’t understand at all” to sort out some brain holes and ideas that can be thought of at that time point as far as possible. At that time, we talked […]

  • Community view | understanding the exchange protocol on mov chain


    Development of decentralized exchange protocol From bitshare, stellar to etherdelta, Bancor, 0x protocols on Ethereum, decentralized switching protocols have also gone through several generations of development and many modes of exploration. Each generation improves and deepens through the pain points of the previous protocols, It can be divided into three parts On chain order book, […]

  • Different 3D visualization platform for asset security


    preface In the era of digital economy, the application of good data is the key to the digital transformation of enterprises. The effective management and control of data based on cutting-edge science and technology is the new trend of digital value-added services. In recent years, the whole security industry is paying more attention to asset […]

  • Research on Portfolio Optimization Based on particle swarm optimization


    Link to the original text:http://tecdat.cn/?p=6811 My research topic this year is to use particle swarm optimization (PSO) for currency trading portfolio optimization. In this article, I will introduce portfolio optimization and explain its importance. Secondly, I will demonstrate how particle swarm optimization can be applied to portfolio optimization. Third, I will explain the arbitrage portfolio […]

  • Virtual open world games on blockchain


    Click to share Tencent cloud is in action to fight against the epidemic. Blockchain is a subversive Internet infrastructure. This subversion is reflected in the fact that it can build a low-cost asset trading function for all walks of life, so that assets can flow more easily. The game industry has virtual attributes, and the […]

  • What is the virtual open world game on the blockchain? |TVP enjoy


    Blockchain is a subversive Internet infrastructure. This subversion is reflected in the fact that it can build a low-cost asset trading function for all walks of life, so that assets can flow more easily. The financial industry itself has virtual attributes, and the blockchain naturally supports financial characteristics, so the financial industry itself has become […]

  • Amazing reversal! Hackers successfully steal $25 million from dforce and return it in full


    Technical editor: Zong enli from sifou newoffice SegmentFault has he reported the official account number: SegmentFault According to foreign media, nearly 25 million US dollars of assets were stolen from dforce, but then hackers returned almost all the funds to dforce, except for the loss of 1.2 million US dollars due to the conversion fee. […]

  • What are the advantages of programming on CKB?


    Since the birth of the project, nervos has been adhering to its own design concept, adhering to the layered design scheme. The bottom layer solves the security and decentralization problems, and the upper level solves the problems of efficiency, expansion and multi-function. It is hoped that this way can solve the impossible triangle problem in […]