<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Inspired by life</title>
        <link>https://paragraph.com/@1nspiredbylife</link>
        <description>The world of cryptocurrencies, innovations and the future</description>
        <lastBuildDate>Sun, 05 Apr 2026 07:56:38 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Inspired by life</title>
            <url>https://storage.googleapis.com/papyrus_images/8bd9f60a22a4e95718492470aa15e4a144abad72167b052e50d6da84bfa2f18a.jpg</url>
            <link>https://paragraph.com/@1nspiredbylife</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[What are Real World Assets (RWAs)?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-are-real-world-assets-rwas</link>
            <guid>OVmbDjF1lCFm6USJL7yA</guid>
            <pubDate>Sun, 28 Jul 2024 00:32:10 GMT</pubDate>
            <description><![CDATA[Real World Assets (RWAs) are a class of crypto tokens that represent tangible assets that exist outside the digital spectrum. These can range from bonds to real estate properties, commodities, and machinery. RWAs allow these assets to find a place within the Decentralized Finance (DeFi) ecosystem, increasing the availability to these often inaccessible financial tools and opening up new horizons of applications.Understanding RWAsThe tangible assets represented by RWAs are essentially assets t...]]></description>
            <content:encoded><![CDATA[<p>Real World Assets (RWAs) are a class of crypto tokens that represent tangible assets that exist outside the digital spectrum. These can range from bonds to real estate properties, commodities, and machinery. RWAs allow these assets to find a place within the Decentralized Finance (DeFi) ecosystem, increasing the availability to these often inaccessible financial tools and opening up new horizons of applications.</p><h2 id="h-understanding-rwas" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Understanding RWAs</strong></h2><p>The tangible assets represented by RWAs are essentially assets that have substantive value and are acknowledged universally, meaning the value and ownership of these assets are widely accepted and understood, making them viable for transactions, investments, and other financial operations globally. They are objects with economic value, owned by individuals or enterprises, and are expected to produce future economic benefits. The ownership can be transformed into value through sale or licensing. These tangible assets make up a significant portion of total global financial value</p><p>The integration of these universally acknowledged tangible assets into the blockchain and DeFi via RWAs is a groundbreaking innovation. Through tokenization, tangible assets can be represented as tokens on a blockchain, enabling them to be easily and securely bought, sold, or traded on digital platforms. This fusion of traditional assets with digital technology aims at enhancing liquidity, accessibility, and transparency, improving the experience for asset buyers and owners alike.</p><h2 id="h-why-are-rwas-useful" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why are RWAs Useful?</strong></h2><p>Since tangible assets from traditional finance comprise a significant portion of total global financial value, they should be seriously considered in any investor’s diversified portfolio. For people with considerable crypto exposure, integrating a mix of these tangible traditional assets can make for a more robust portfolio. Unfortunately, access to these traditional assets are curtailed by many factors, including high entry barriers, regulatory and geographic restrictions, and liquidity issues.</p><p>Traditional assets like real estate and commodities often require substantial initial investment. Similarly, while there are various denominations available, a reasonable investment in bonds also demands a significant outlay, limiting participation mainly to already wealthy individuals. Regulations, jurisdictions, and geographic locations play a critical role in asset accessibility. Different countries have varied regulations concerning asset ownership and investment, which may prevent international participants from investing, or make it practically infeasible without institutional help. Again, this usually requires people to already have a certain amount of wealth.</p><p>Finally, assets like real estate and commodities generally lack immediate liquidity. Converting these assets into cash can often be a lengthy and complex process, making it less appealing for people with lower time frame preferences or needing to exit positions rapidly.</p><p>Crypto RWA tokens present innovative solutions to these challenges inherent in traditional financial assets. One of the most transformative benefits they offer is the ability to lower entry barriers. By enabling fractional ownership of real-world assets, they make it possible for people to purchase tokens that represent a portion of assets like real estate or bonds. This approach fundamentally reduces the initial capital requirement, broadening accessibility to a diverse range of people who might have previously been priced out of such markets.</p><p>Beyond this, the global nature of blockchain technology shatters geographical and regulatory constraints. It provides a platform where assets, previously tethered by regional regulations or jurisdictional restrictions, become universally accessible. This global reach ensures people from various parts of the world can tap into opportunities they might have been denied, or priced out of in the past. Furthermore, the inherent design of cryptocurrency exchanges enhances the liquidity of traditionally illiquid assets. People find themselves equipped with the agility to swiftly enter or exit positions, tailoring their strategies to evolving market conditions.</p><p>Finally, the essence of tokenization lies in its ability to divide tangible assets into smaller, digestible units. This mechanism not only democratizes investment access but also paves the way for a more diversified and inclusive landscape of asset ownership. In essence, RWA tokens bridge the old with the new, a more level playing field in traditional financial markets.</p><h2 id="h-current-prominent-examples-of-rwas" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Current Prominent Examples of RWAs</strong></h2><p>RWAs are a fast evolving sector of the crypto landscape. The following are some of the use cases for RWAs:</p><ol><li><p><strong>Bonds</strong>: RWA tokens can be used to earn yield via bond RWA tokens, which are backed by sovereign bonds, such as US Treasury bills and bonds. By tokenizing these bonds, people can earn yield on their investment while also enjoying the benefits of blockchain technology such as increased transparency, liquidity, and fractional ownership.</p></li><li><p><strong>Real Estate</strong>: Tokenized real estate allows people to own a fraction of a property and earn rental income from it. This can help democratize real estate investing and make it accessible to more people.</p></li><li><p><strong>Commodities</strong>: Tokenized fine art allows people to own a fraction of a painting or sculpture and earn income from it. This can help make fine art investing more accessible to people who might not have the means to purchase an entire artwork.</p></li><li><p><strong>Art and Collectibles</strong>: Maecenas and other platforms have transformed art and collectible ownership by enabling the buying of fractional ownership in artworks or collectibles.</p></li><li><p><strong>Equipment and Machinery</strong>: Firms are now exploring the tokenization of industrial equipment and machinery, allowing for fractional ownership and usage rights, thus optimizing asset utilization.</p></li></ol><p>RWAs are breathing new life into the asset landscape by bridging the traditional with the technological. Their integration into the blockchain and DeFi spaces is a milestone in fostering inclusivity, innovation, and a broader spectrum of investment opportunities. As technology evolves, the application and utility of RWAs are expected to explode, reshaping the way people approach investment and asset management.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/9c7352a572b64c91be30302059de7992458160ba1d13be7bd89849dbcb7c5245.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Monad: An EVM-Compatible Layer 1 Built for Scalability]]></title>
            <link>https://paragraph.com/@1nspiredbylife/monad-an-evm-compatible-layer-1-built-for-scalability</link>
            <guid>0YAgKif9xOgiEXlgtjoQ</guid>
            <pubDate>Sun, 21 Jul 2024 00:52:00 GMT</pubDate>
            <description><![CDATA[What Is Monad?Monad is a high-performance blockchain platform designed as an Ethereum Virtual Machine (EVM)-compatible Layer 1 (L1) scaling solution. The smart contract platform offers full compatibility with the EVM, all while focusing on scalability and decentralization.Key TakeawaysMonad is a high-performance blockchain platform designed as an EVM-compatible Layer 1 scaling solution.Monad offers full compatibility with the EVM, allowing users and developers to access existing apps within t...]]></description>
            <content:encoded><![CDATA[<h2 id="h-what-is-monad" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Monad?</strong></h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.monad.xyz/"><strong>Monad</strong></a> is a high-performance blockchain platform designed as an Ethereum Virtual Machine (EVM)-compatible Layer 1 (L1) scaling solution. The smart contract platform offers full compatibility with the EVM, all while focusing on scalability and decentralization.</p><hr><h3 id="h-key-takeaways" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Key Takeaways</strong></h3><ul><li><p>Monad is a high-performance blockchain platform designed as an EVM-compatible Layer 1 scaling solution.</p></li><li><p>Monad offers full compatibility with the EVM, allowing users and developers to access existing apps within the Ethereum ecosystem.</p></li><li><p>Monad claims to have a throughput of 10,000 transactions per second (tps).</p></li></ul><hr><p>The technical limitations of Ethereum, the pioneer smart contract platform, and other existing infrastructures like <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/en/categories/solana-ecosystem"><strong>Solana</strong></a> have been some of the most critical challenges in the blockchain industry. Hence, the need for scalable and decentralized blockchain solutions has become extremely urgent over the last few years. To address these issues, Monad promises enhanced efficiency with a high throughput of 10,000 transactions per second.</p><h3 id="h-the-team-behind-monad" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>The Team Behind Monad</strong></h3><p>The Monad blockchain was designed by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.monadlabs.xyz/team"><strong>Monad Labs</strong></a>, a diverse group of professionals brought together by co-founders Keone Hon (CEO), James Hunsaker (CTO), and Eunice Giarta (COO). The team is experienced in low-latency programming and distributed systems design and claims to be building towards a more performant future in blockchain technology.</p><h2 id="h-scaling-the-evm" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Scaling the EVM</strong></h2><p>The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/learn/ethereum-virtual-machine-evm"><strong>Ethereum Virtual Machine (EVM)</strong></a> is a component of the Ethereum network that is responsible for the execution of smart contracts. The EVM has been vital in the rise of decentralized applications (dApps) and decentralized finance (DeFi). However, the growing popularity of DeFi and the continuous expansion of dApps has resulted in significant challenges for the EVM – especially in terms of scalability.</p><p>One of the biggest challenges around scaling the EVM is that it is single-threaded, which means all transactions are executed sequentially. This limits the number of transactions that can be processed within a single time period, and also increases the time of execution.</p><p>At time of writing, there are two proposed solutions to scaling the EVM: sharding and parallel processing.</p><h3 id="h-sharding" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Sharding</strong></h3><p>Sharding involves splitting a larger blockchain network across multiple shards, increasing storage capacity and enhancing performance. Each shard holds a set of smart contracts and account balances, where nodes are assigned to individual shards to verify transactions and operations. Instead of every node being responsible for every transaction across the network, nodes are now assigned to specific shards, only coming together to agree on a universal Layer 1 state.</p><h3 id="h-parallel-processing" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Parallel Processing</strong></h3><p>Parallel processing is also known as parallelization, or parallel transaction execution. By structuring the network to process transactions simultaneously instead of processing transactions sequentially, more transactions can be validated at the same time. Monad uses parallel processing, offering developers a high throughput Layer 1 that is EVM-compatible, making it easy for them to port their dApps over.</p><h2 id="h-how-does-monad-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How Does Monad Work?</strong></h2><p>Monad is able to improve on Ethereum Virtual Machine’s limitations while retaining its desired qualities, thanks to its combination of various innovative technological mechanisms. For instance, the blockchain offers full bytecode compatibility for the EVM, which enables the migration of existing Ethereum applications to Monad without code changes. Monad is also equipped with full Ethereum <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/learn/crypto-rpc-best-rpc-providers"><strong>RPC (remote procedure call)</strong></a> compatibility, facilitating the use of infrastructures, such as self-custodial wallets and blockchain explorers.</p><p>Specifically, Monad provides optimizations in four primary areas, and they include;</p><h3 id="h-parallel-execution" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Parallel Execution</strong></h3><p>Most existing EVM-compatible blockchains, including Ethereum, Avalanche, and Binance Smart Chain (BSC), process transactions in a sequential order. Monad, on the other hand, achieves <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/learn/what-is-parallelization-parallel-execution-blockchain"><strong>scalability by executing transactions in parallel</strong></a>.</p><p>However, Monad performs parallel transaction execution while maintaining compatibility with Ethereum by structuring its blocks similarly, i.e. with a linearly ordered set of transactions. This ensures that despite the different execution mechanics, the outcomes of Monad’s transaction execution remain identical to those in Ethereum.</p><p>Typically, a blockchain must first determine and confirm which transactions can be processed independently before executing them in parallel. However, Monad employs optimistic execution, where the blockchain assumes that all transactions can be executed independently and tries to process them simultaneously.</p><p>Nonetheless, an incorrect execution could occur if two transactions, which are dependent on each other, are processed simultaneously. For instance, one of the transactions might require the other (suitably called prerequisite) transaction’s output as its own input. Monad resolves this by re-executing the incorrectly executed transaction with the “updated” data from its prerequisite transaction.</p><p>Finally, Monad uses a static code analyzer to predict transactions that depend on each other. This would help to save time that would normally have been used in trying to execute transactions that have prerequisite transactions.</p><h3 id="h-deferred-execution" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Deferred Execution</strong></h3><p>Another highlight mechanism of the Monad blockchain is that transaction execution is separated from the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/learn/coingecko-consensus-algorithms-guide-part-1"><strong>consensus process</strong></a>. This implies that transactions don’t have to be processed before the blockchain nodes reach a consensus on the ordering of transactions in a block — as opposed to the Ethereum network.</p><p>In Ethereum, the execution mechanism is designed such that all nodes have to process transactions before reaching consensus — all within a limited timeframe. This also requires setting conservative limits on the computational workload in order to maintain network reliability and performance.</p><p>Monad allows the nodes to determine and agree on a block’s state before the transactions within the block are executed. This way, transaction execution does not hold up the consensus process. Ultimately, this “deferred execution&quot; mechanism helps enhance the efficiency and scalability of the network, enabling it to process more transactions within a shorter period.</p><h3 id="h-monadbft" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>MonadBFT</strong></h3><p>MonadBFT, an optimized derivative of the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/parallelchain-io/hotstuff_rs#:~:text=HotStuff%20is%20the%20first%20consensus,fast%20as%20network%20latency%20allows."><strong>HotStuff algorithm</strong></a>, is the high-performance consensus mechanism of the Monad blockchain. It is designed to streamline communication between validating nodes and block leaders, reducing the consensus rounds and improving efficiency.</p><p>To reach consensus on a new block with MonadBFT (Byzantine Fault Tolerance), the block leader sends proof to the validating nodes that the previous block is valid. The nodes then directly send a signed “yes” message to the next leader, approving the block and signaling the readiness to move forward.</p><p>In a scenario where the block leader times out and the nodes fail to reach consensus, MonadBFT will trigger its fallback mechanism. It is a secondary communication process that consumes more time and requires mutual communication between all validators. However, this fallback mechanism ensures that the Monad blockchain still reaches consensus irrespective of delays or failures.</p><h3 id="h-monaddb" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>MonadDb</strong></h3><p>MonadDb is a custom on-chain database for storing the state of the Monad blockchain. Most Ethereum clients use data structures different from Ethereum’s Merkle Patricia Trie data structure, resulting in a suboptimal storage solution as one data structure will need to be embedded into the other data structure.</p><p>Given that Monad executes transactions in parallel, multiple transactions need to be able to read and write the database simultaneously. To address this, MonadDb employs a Patricia Trie data structure both on-disk and in-memory, which offers proper asynchronous i/o support to the database.</p><p>This allows the blockchain to execute multiple transactions in parallel and perform work asynchronously.</p><h2 id="h-benefits-of-monad" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Benefits of Monad</strong></h2><p>As already mentioned, Monad seeks to fill the gaps left behind by other EVM-compatible blockchains. The following are some of the advantages offered by the Monad blockchain.</p><h3 id="h-evm-compatibility" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>EVM Compatibility</strong></h3><p>One of the highlight features of Monad is its full compatibility with the Ethereum Virtual Machine. This capability enables developers to migrate their existing applications on Ethereum to Monad without any code modifications while avoiding further investment in resources and development time.</p><p>Furthermore, full EVM compatibility facilitates the integration of a wide array of Ethereum-based tools, libraries, and infrastructures to the Monad blockchain. This <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/learn/crypto-bridges-blockchain-interoperability"><strong>interoperability</strong></a> offers a scalable solution to existing projects seeking to improve their efficiency while also being able to leverage Ethereum’s vast resources.</p><h3 id="h-lower-fees-and-fast-transactions" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Lower Fees and Fast Transactions</strong></h3><p>Monad is designed to tackle the scalability challenges associated with most EVM-compatible blockchains. Monad provides a high throughput by employing a combination of different mechanisms, such as parallel execution and deferred execution, which enables more transactions to be handled in less time.</p><p>This reduction in network congestion leads to faster transaction times, thereby enhancing the overall efficiency of the blockchain. The increased efficiency also contributes to the lower transaction fees observed on Monad, making it a more economical option compared to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/en/coins/ethereum"><strong>Ethereum</strong></a>.</p><h2 id="h-potential-risks-of-monad" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Potential Risks of Monad</strong></h2><p>While the Monad blockchain has numerous advantages, it also bears some potential drawbacks.</p><h3 id="h-technical-complexity" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Technical Complexity</strong></h3><p>Indeed, Monad offers outstanding benefits in terms of scalability and overall performance. However, the advanced nature of its mechanics introduces a level of technical complexity that can be potentially challenging for both end-users and developers.</p><p>Due to the technical complexity, the cost of developing and maintaining applications and infrastructures on Monad may be unfavorable, especially for small-scale project developers and teams. Also, the intricacies behind the blockchain’s mechanisms, like parallel execution, may introduce unforeseen vulnerabilities and risks.</p><h3 id="h-centralization-concerns" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Centralization Concerns</strong></h3><p>Another potential challenge associated with the Monad blockchain is the issue of centralization. Specifically, venture capital (VC) involvement in the project adds an interesting perspective to this centralization conversation. Recently, Monad Labs successfully <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://decrypt.co/225455/what-is-monad-ethereum-solana-rival-raised-225-million"><strong>completed a $225 million funding round</strong></a> led by Paradigm, with contributions from other firms like Electric Capital, Coinbase Ventures, GSR Ventures, and so on.</p><p>For context, investors often receive a significant portion of a blockchain’s token supply as part of incentives for their investment. For instance, the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/en/coins/celestia"><strong>Celestia</strong></a> project reserved more than 35% of its native token (TIA) supply for its investors. With only a few entities controlling a substantial amount of tokens, there can be an imbalance in the governance and decision-making processes within the network.</p><p>This disproportionate token distribution can lead to centralization of power, where large investors have the power to influence over network upgrades, policy changes, and other vital decisions.</p><h2 id="h-monad-vs-other-evm-compatible-blockchains" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Monad vs. Other EVM-Compatible Blockchains</strong></h2><p>There are multiple other EVM-compatible blockchain in the space, including BSC, Polygon, and Avalanche. Let&apos;s a take a look at Monad, and how it lines up against incumbents within the space.</p><p><strong>Feature</strong></p><p><strong>Ethereum</strong></p><p><strong>Monad</strong></p><p><strong>BNB Smart Chain (BSC)</strong></p><p><strong>Polygon</strong></p><p><strong>Avalanche</strong></p><p><strong>Consensus Mechanism</strong></p><p>Proof of Stake</p><p>MonadBFT</p><p>Proof of Staked Authority</p><p>Proof of Stake</p><p>Avalanche Consensus</p><p><strong>Scalability Approach</strong></p><p>Layer 1</p><p>Layer 1</p><p>Layer 1</p><p>Layer 2/Sidechain</p><p>Layer 1/Subnets</p><p><strong>Transaction Speed</strong></p><p>~ 15 tps</p><p>~ 10,000 tps (projected)</p><p>60 - 100 tps</p><p>~ 7,000 tps</p><p>~ 4,500 tps</p><p><strong>EVM Compatibility</strong></p><p>Yes</p><p>Yes</p><p>Yes</p><p>Yes</p><p>Yes</p><p><strong>Gas Fees</strong></p><p>Variable, often high</p><p>Low</p><p>Low</p><p>Low</p><p>Low</p><p><strong>Developer Tools</strong></p><p>Extensive</p><p>Extensive</p><p>Extensive</p><p>Extensive</p><p>Extensive</p><p><strong>Notable Features</strong></p><p>Decentralization, high security</p><p>Innovative execution mechanisms, Scalability focus</p><p>Low fees</p><p>Layer 2 scaling, zkRollups</p><p>Subnet infrastructure</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Conclusion</strong></h2><p>In this article, we explored Monad as an EVM-compatible Layer 1 designed for scalability, discussing how the blockchain network addresses the critical challenges faced by Ethereum. This piece highlights the various mechanisms Monad employs to process blockchain transactions efficiently while maintaining EVM compatibility and decentralization. Moreover, we discussed the benefits of Monad over other EVM-compatible chains and its potential downsides.</p><p>Looking forward, Monad shows significant potential to positively change the trajectory of Blockchain technology. With a scalable and efficient platform, the blockchain can become home to a wide range of developers and projects looking to overcome the limitations of existing blockchain networks. At the same time, the continuous development and improvement of Monad indicates the capacity of this project to encourage innovation in the decentralized finance industry.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/d8218cdf804b9ea68851800f2593074fcc0e22844201fe188f99be7be42de1f4.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Sophon Launches Liquidity Farming Allowing Everyone to Participate and Secure $SOPH Tokens
]]></title>
            <link>https://paragraph.com/@1nspiredbylife/sophon-launches-liquidity-farming-allowing-everyone-to-participate-and-secure-soph-tokens</link>
            <guid>MdvLnnNOqNKvhGGYQX4Z</guid>
            <pubDate>Sun, 14 Jul 2024 01:03:50 GMT</pubDate>
            <description><![CDATA[Sophon, the entertainment-focused blockchain network leveraging zkSync’s technology, has dedicated a full 10% of its total $SOPH supply to rewarding users that participate in Sophon’s liquidity farming period. Users who contribute to the TVL of Sophon are able to take part in these rewards by depositing certain eligible assets to the designated farming pools on Ethereum mainnet (and later Sophon mainnet when it launches). Each user who participates in the farming period is rewarded with “Soph...]]></description>
            <content:encoded><![CDATA[<p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://sophon.xyz/">Sophon</a>, the entertainment-focused blockchain network leveraging zkSync’s technology, has dedicated a full 10% of its total $SOPH supply to rewarding users that participate in Sophon’s liquidity farming period. Users who contribute to the TVL of Sophon are able to take part in these rewards by depositing certain eligible assets to the designated farming pools on Ethereum mainnet (and later Sophon mainnet when it launches). Each user who participates in the farming period is rewarded with “Sophon Points (SP)”, which accrue each block.</p><p>A key feature of Sophon’s farming pools is its booster program, an optional mechanism that allows participants to multiply the potential rewards earned by their deposit in exchange for permanently allocating some or all of their deposited assets for the purpose of providing liquidity on Sophon mainnet. This booster function will have the effect of multiplying either some or all of a user’s deposits in Sophon’s farming pools, creating even more reward potential. You can activate a booster by permanently locking any portion or all of your deposited assets. That means this liquidity is permanent to Sophon protocol, and can not be withdrawn. An activated boost multiplies your deposit by 5x (Thus, generating 5 times the original SP).</p><p>It’s important to note that the deposited assets used to activate boosters will be permanently allocated for the purpose of providing liquidity on Sophon mainnet with no option to withdraw in the future.</p><p>The primary assets users can deposit are BEAM and BEAM/ETH LP. Other farms will be released in due course.</p><p>The 10% of the total $SOPH supply dedicated to the Sophon liquidity farming period is anticipated to attract a large number of users, and an initial collection of pools will be launched, with an additional pool planned to launch in the following weeks.</p><p>SP given to participants will accrue in real-time, and users can view their accumulated rewards through Sophon’s Farming Portal. The rate of reward accrual differs by pool, but the primary rate of accrual is driven by the amount a user has deposited in a pool compared with the other deposits for that pool.</p><p>Any participation in the Sophon liquidity farming period will be subject to the user agreeing to the Token Airdrop Terms and Conditions and applicable Disclaimers, which will be published on Sophon’s website on or prior to the start of the liquidity farming period.</p><p><strong>About Sophon</strong></p><p>Sophon is an entertainment-focused ecosystem built as a modular rollup leveraging zkSync’s ZK Stack technology. As a ZK chain leveraging the ZK Stack, Sophon is intended to be tailored for any high throughput applications such as artificial intelligence and gaming. Sophon facilitates the connection between developers and users, backed by a robust strategic collaboration with ecosystems like zkSync, Beam, Zentry, and Aethir.</p><p>Leveraging the ZK Stack, Sophon is positioned to become a leading provider in the entertainment and blockchain space, leveraging the most future-proof Ethereum L2 out there. Node operators can engage with a blockchain network designed to shape the future of entertainment and blockchain technology, ensuring a decentralized, efficient, and user-centric environment.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/5197a3b1f1e980550062ec3e5ec021fe4123d1f9c7c4ccb4e98a59380032e702.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Connecting Injective: Hyperlane Opens the inEVM Bridge]]></title>
            <link>https://paragraph.com/@1nspiredbylife/connecting-injective-hyperlane-opens-the-inevm-bridge</link>
            <guid>wNYh9IDz51y9Ax2s5SRL</guid>
            <pubDate>Sun, 23 Jun 2024 07:54:35 GMT</pubDate>
            <description><![CDATA[Modular expansion is coming to the Injective ecosystem. Hyperlane is bringing permissionless interoperability and the first bridge between Injective and their inEVM rollup. Hyperlane now enables the Injective ecosystem to permissionlessly scale to more chains and more VMs than ever before. The inEVM bridge is now live on mainnet. Start exploring the inEVM now.What is Injective and inEVM?Injective is a Cosmos blockchain supporting CosmWasm smart contracts and out-of-the-box modules such as a c...]]></description>
            <content:encoded><![CDATA[<p>Modular expansion is coming to the<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://injective.com/"> Injective</a> ecosystem. Hyperlane is bringing permissionless interoperability and the first bridge between Injective and their inEVM rollup. Hyperlane now enables the Injective ecosystem to permissionlessly scale to more chains and more VMs than ever before.</p><p>The<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://bridge.inevm.com/"> inEVM bridge</a> is now live on mainnet. Start exploring the inEVM now.</p><h1 id="h-what-is-injective-and-inevm" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What is Injective and inEVM?</strong></h1><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.injective.network/learn/introduction">Injective</a> is a Cosmos blockchain supporting CosmWasm smart contracts and out-of-the-box modules such as a completely decentralized orderbook. It focuses on making DeFi applications easy to build and access.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.inevm.com/">inEVM</a> is the new EVM-compatible rollup designed to facilitate composability across Injective and Ethereum. The inEVM is an Arbitrum Orbit stack chain developed in collaboration between Injective and Caldera.</p><p>And coming in the future is the<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.injective.network/develop/cascade-svm-chain/"> Cascade inSVM</a>, a rollup supporting Solana smart contracts and developer tooling.</p><p>All of these chains with different VMs makes interoperability between them extremely complex. The easiest way to connect them all is Hyperlane:</p><h1 id="h-why-hyperlane" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why Hyperlane</strong></h1><h2 id="h-permissionless-interoperability" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Permissionless Interoperability</strong></h2><p>Permissionless Interoperability enables anyone to<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.hyperlane.xyz/docs/deploy-hyperlane"> deploy Hyperlane</a> to any chain. Interoperability and bridging for anyone, no need to ask the core team or wait in line.</p><p>The permissionless scaling of Hyperlane uniquely enables the Injective eco to connect to more chains and more ecosystems, without needing to rely on any bridge team.</p><h2 id="h-multi-vm-interoperability" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Multi-VM Interoperability</strong></h2><p>Hyperlane’s modular and open-source design enables anyone to adapt Hyperlane contracts for any smart contract environment. Check out our<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.hyperlane.xyz/docs/guides/implementation-guide"> implementation guide</a> if you’re interested in adapting Hyperlane for new VMs.</p><p>Injective and Caldera specifically preferred Hyperlane due to our support for many VM environments and our ready out-of-the-box deployments.</p><p>Hyperlane originally just supported permissionless interoperability for EVM. But over time, external teams have adapted Hyperlane for multiple other VMs, such as SVM, CosmWasm, MoveVM, and more in the pipeline.</p><h2 id="h-out-of-the-box-bridging" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Out-of-the-Box Bridging</strong></h2><p>Hyperlane offers<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.hyperlane.xyz/docs/protocol/warp-routes"> Warp Routes</a>, an out-of-the-box token bridging application on Hyperlane. Warp Routes enable deployers to open up permissionless bridging for any asset between any Hyperlane-connected chain. It’s especially useful for assets that existing bridges won’t whitelist.</p><p>In addition Hyperlane offers a<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.hyperlane.xyz/docs/guides/deploy-warp-route-UI"> warp UI template</a> for anyone to build a white label bridge on top of Hyperlane. In this case, the<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://bridge.inevm.com/"> inEVM bridge</a>.</p><h1 id="h-whats-new" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What’s New</strong></h1><p>The primary use case of the Hyperlane x Injective integration will be bridging.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.hyperlane.xyz/docs/protocol/warp-routes">Warp Routes</a>, Hyperlane’s token bridge application, were deployed for 3 tokens to start:</p><ul><li><p>INJ between the original Injective chain and inEVM</p></li><li><p>USDC between ETH and inEVM</p></li><li><p>USDT between ETH and inEVM</p></li></ul><p>INJ, the native token of Injective, will be accessible on inEVM as a result.</p><h1 id="h-whats-next" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What’s Next</strong></h1><p>Hyperlane will be pivotal in bringing interop to the upcoming inSVM rollup as well. The most efficient way to adapt interoperability and bridging to the complex Solana VM environment is with the permissionless and modular architecture of Hyperlane.</p><p>The inEVM bridging is already live on mainnet, try it now at<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://inevmbridge.com/"> </a><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://bridge.inevm.com/">bridge.inevm.com</a> or <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://usenexus.org/">Nexus</a>.</p><h1 id="h-more-about-hyperlane" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>More about Hyperlane</strong></h1><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.hyperlane.xyz/">Hyperlane</a> is the permissionless interoperability layer connecting the modular ecosystem. With Hyperlane, anyone can connect any blockchain, rollup, appchain, on any VM. Additionally, Hyperlane’s modular security stack gives developers the power to customize their interchain security to their needs.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/5b0408c9a81c74e3ada3f5cdcb20664168f29ff2871f406acd6909a6d0d382a4.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is Farcaster?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-farcaster</link>
            <guid>TNCCUyFdmSKGYynYbvML</guid>
            <pubDate>Thu, 30 May 2024 03:41:26 GMT</pubDate>
            <description><![CDATA[Farcaster is an innovative, open-source, decentralized social network that sets itself apart from centralized social networks like Meta or X by giving users complete control over their data. Unlike these centralized platforms that retain ownership of user data, Farcaster empowers its users with direct data ownership. While Farcaster shares similarities with traditional social networks, it introduces new terminology: Farcaster VocabularyEquivalent Common Social Media Termcastpostchannelsgroups...]]></description>
            <content:encoded><![CDATA[<p>Farcaster is an innovative, open-source, decentralized social network that sets itself apart from centralized social networks like Meta or X by giving users complete control over their data. Unlike these centralized platforms that retain ownership of user data, Farcaster empowers its users with direct data ownership.</p><p>While Farcaster shares similarities with traditional social networks, it introduces new terminology:</p><p>Farcaster VocabularyEquivalent Common Social Media Termcastpostchannelsgroupsframeweb app</p><p>Key points about Farcaster include:</p><ul><li><p>It functions as a standard social network, allowing individuals to:</p><ul><li><p>Set up an account</p></li><li><p>Share content</p></li><li><p>Engage with content shared by others</p></li></ul></li></ul><p>These functionalities align with the general expectations of a social network. However, Farcaster distinguishes itself through these integrated web3 aspects:</p><ul><li><p>An Ethereum (EVM) address is required to create a Farcaster account. This address will be linked to your account and used to sign messages and publish them on the Farcaster protocol (unlike the traditional username/password method). Messages of any activity identified as posts, replies, follows, etc.</p></li><li><p>User account data like profile details are stored on-chain. This is done via a smart contract (e.g., Id Registry) deployed on Optimism mainnnet. Other data, like Casts, etc., are stored off-chain on Farcaster&apos;s storage network called Hubs.</p></li><li><p>Usernames can be managed on-chain via ENS, ensuring users have sovereignty over their identity compared to centralized entities, who can revoke usernames at their discretion. Anyone can call the ENSRegistry contract to resolve a username to its custody address.</p></li><li><p>Users can create and embed decentralized applications within their posts (e.g., a mint NFT button, 1-click DAO vote, etc.). - Users can create and embed decentralized applications within their posts (e.g., a mint NFT button, 1-click DAO vote, etc.). These are called &quot;Frames&quot;, and they must comply with the OpenGraph in order to render properly in a Cast. Some popular frames already built by others include <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://warpcast.com/~/channel/cookies">@cookies</a>, who built a seamless checkout experience in a Frame powered by Coinbase Commerce and $DEGEN, which is an ERC-20 token airdropped to the Farcaster community via BASE chain.</p></li><li><p>The absence of a single entity owning the underlying data means that anyone with a Farcaster account can run a Farcaster node (aka Hub) and read/write data.</p></li></ul><p>Farcaster&apos;s unique features are supported by:</p><ul><li><p>Specific smart contracts, each performing distinct functions to facilitate the decentralized experience</p></li><li><p>Hubs, which refer to the open-source, decentralized, distributed peer-to-peer nodes that store and serve Farcaster data</p></li></ul><h2 id="h-farcaster-architecture" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Farcaster Architecture</strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quicknode.com/guides/social/what-is-farcaster#farcaster-architecture"><strong>​</strong></a></h2><p>As discussed previously, Farcaster stores some data like account creation on-chain and other data like Casts on nodes referred to as Hubs.</p><p>Here is a high-level view:</p><p>Let&apos;s dive into more of the smart contracts utilized.</p><p>Farcaster utilizes three smart contracts (deployed on Optimism mainnet) to facilitate on-chain operations:</p><ul><li><p><strong>Id Registry</strong> - This ID registry contract allows users to register, transfer, and recover accounts. It is tied to a <code>fId</code>, which is tied to the Ethereum address used during account creation</p></li><li><p><strong>Storage Registry</strong> - The storage registry contract keeps track of accounts and their storage rents. This is the same rent a user pays when creating an account and is used for their interactions (e.g., Casts, replies) on the Farcaster network.</p></li><li><p><strong>Key Registry</strong> - The key registry contract keeps track of keys registered to apps. This controls if an app can conduct activity (e.g., post, follow) on the user&apos;s behalf</p></li></ul><p>To learn more details about each smart contract&apos;s functionalities, check out the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.farcaster.xyz/learn/architecture/contracts">documentation</a>, and view the source code <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/farcasterxyz/contracts/">here</a>.</p><h2 id="h-hubs" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Hubs</strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quicknode.com/guides/social/what-is-farcaster#hubs"><strong>​</strong></a></h2><p>The network of nodes storing and serving Farcaster data is called Hubs. This distributed, peer-to-peer network of nodes stores and validates the entire state of Farcaster (both on-chain and off-chain data) and communicates with one another to keep the state of Farcaster up-to-date.</p><p>Since Farcaster is open-source, any user can run their own Hub and be able to read/write data from Farcaster via the API. Current implementations of Hubs include <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.thehubble.xyz/">Hubble</a> (written in Rust and Typescript). Let&apos;s first dive into storage and how it&apos;s stored; then, we will dive into the message lifecycle and how it&apos;s validated/stored on a Hub.</p><h3 id="h-storage" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Storage<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quicknode.com/guides/social/what-is-farcaster#storage">​</a></h3><p>In order for an account to interact on the Farcaster network, it must first pay rent. This is usually a once-a-year fee that covers all the activity an account may conduct, such as casting, replying, following others, etc.</p><p>Each type of message gets allocated some rent, and any messages published after this rent amount has been exceeded result in the oldest message being pruned (by a Hub). Users can continue using the Farcaster protocol once the rent has been exceeded due to Hubs pruning and controlling the network load.</p><p>Now, let&apos;s talk about messages and how they get stored on a Hub.</p><h3 id="h-message-lifecyle" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Message Lifecyle<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quicknode.com/guides/social/what-is-farcaster#message-lifecyle">​</a></h3><p>The sync process for a Hub contains a two-phase process - <code>gossip</code> and <code>diff</code> sync. Let&apos;s outline how it is used in the lifecycle of data being stored/served on Hubs:</p><ol><li><p>An account creates an interaction (e.g., Cast, React, Link) by signing the message</p></li><li><p>The message gets stored on a Hub and gets validated (e.g., is the signature valid? does it meet Cast requirements?)</p></li><li><p>The message is checked (async) for conflicts across storage and account limits (e.g., was the Cast deleted; a copy exists; does the account contain enough rent?)</p></li><li><p>If valid, the Hub propagates this message to other Hubs on the network (i.e., <code>gossiping</code>)</p></li><li><p>Periodically, a Hub will run <code>diff</code> sync to find messages that have been dropped and efficiently recover them</p></li></ol><p>Note that running a Hub requires a minimum hardware requirement and does not generate revenue for users running the node. To control bad actors, Hubs monitor peers and score their behavior, ignoring bad behavior if detected. To learn more, check out the Hubs <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.farcaster.xyz/learn/architecture/hubs">documentation</a>.</p><h2 id="h-additional-resources" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Additional Resources</strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.quicknode.com/guides/social/what-is-farcaster#additional-resources"><strong>​</strong></a></h2><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.farcaster.xyz/">Farcaster documentation</a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://quicknode.com/guides/social/how-to-build-farcaster-frames">How to Build Farcaster Frames</a></p></li></ul>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/d87f0b945574c960f4a8caecb06c2efe58c42a14c5fcd65d45160ae8addab118.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is AltLayer (ALT)?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-altlayer-alt</link>
            <guid>n6OxUkPE8fAgi0I72Z2d</guid>
            <pubDate>Wed, 31 Jan 2024 10:16:11 GMT</pubDate>
            <description><![CDATA[AltLayer is an open and decentralized protocol for rollups that aims to provide enhanced security, decentralization, interoperability, and fast finality to existing rollups. It introduces the novel concept of Restaked rollups, which combines the ease of spinning up rollups using popular rollup stacks with the power of EigenLayer&apos;s restaking mechanism.How does AltLayer (ALT) work?AltLayer&apos;s core innovation is the introduction of Restaked rollups. These rollups are essentially a set o...]]></description>
            <content:encoded><![CDATA[<p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://altlayer.io/">AltLayer</a> is an open and decentralized protocol for rollups that aims to provide enhanced security, decentralization, interoperability, and fast finality to existing rollups. It introduces the novel concept of Restaked rollups, which combines the ease of spinning up rollups using popular rollup stacks with the power of EigenLayer&apos;s restaking mechanism.</p><h2 id="h-how-does-altlayer-alt-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How does AltLayer (ALT) work?</strong></h2><p>AltLayer&apos;s core innovation is the introduction of Restaked rollups. These rollups are essentially a set of three vertically integrated Actively Validated Services (AVSes) created on-demand for a given rollup. These AVSes offer verification of rollups&apos; state correctness, faster finality, and decentralized sequencing.</p><p>Apart from that, AltLayer also offers a versatile, no-code RaaS launchpad that allows developers to spin up a customized rollup within minutes. The RaaS product supports multiple chains, virtual machines, rollup SDKs, sequencing services, and data availability layers.</p><p>AltLayer also introduces the concept of ephemeral rollups, which are highly resource-optimized rollups designed for dApps expecting a surge in demand. These rollups can be quickly spun up, used as needed, and then disposed of, providing the benefits of an application-specific rollup and a general-purpose Layer 1.</p><p>With these innovations, AltLayer presents a system with truly decentralized verifiers and sequencers, reduced time for transaction finalizations, strong interoperabilities, and a relatively high level of flexibility customizability.</p><p>AltLayer will airdrop ALT tokens to its early adopters and supporters. The ALT token is the native utility token of the AltLayer ecosystem. It serves several purposes:</p><ul><li><p><strong>Economic bond:</strong> ALT token holders can stake their tokens to participate in the consensus mechanism and earn rewards for securing the network. Stakes will be slashes at detection of malicious activities.</p></li><li><p><strong>Governance:</strong> ALT token holders have voting rights that govern the protocol&apos;s development and operations.</p></li><li><p><strong>Fees:</strong> Transaction fees, storage fees, and other services within the AltLayer ecosystem are paid in ALT tokens and operators will receive a portion of these as their incentivizations.</p></li></ul><h2 id="h-alt-goes-live-on-bitget" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>ALT goes live on Bitget</strong></h2><p>AltLayer is a promising project that aims to revolutionize the rollup landscape by providing enhanced security, decentralization, interoperability, and faster finality. Its Restaked rollups and RaaS platform offer a unique and compelling solution for developers looking to launch their own rollups. With its strong team and ambitious roadmap, AltLayer has the potential to become a major player in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bitget.com/academy/category/blockchain">blockchain</a> industry.</p><p>AltLayer (ALT) is now <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bitget.com/support/articles/12560603804190">listed on Bitget </a>and available for trade.</p><h2 id="h-how-to-trade-alt-on-bitget" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How to trade ALT on Bitget</strong></h2><p>Step 1: Go to the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bitget.com/spot/ALTUSDT">ALTUSDT spot trading page</a></p><p>Step 2: Enter the amount and the type of order, then click Buy/Sell.</p><p><em>For detailed instructions on how to trade spot in Bitget, please read </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bitget.com/academy/the-uncensored-guide-to-bitget-spot-trading"><em>The Uncensored Guide To Bitget Spot Trading</em></a> <em>.</em></p><p>The ALT token is a valuable asset for those who wish to participate in the AltLayer ecosystem. By staking their tokens, holders can earn staking rewards and contribute to the security of the network. Additionally, holders have governance rights and can participate in the decision-making process of the protocol. The ALT token also has utility as it is used to pay for transaction fees and other services within the AltLayer ecosystem.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/02f716b7cab8a9a7992b5a894204b7e7d33c526eca05361de1cf2c7534e8f81b.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is ZetaChain?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-zetachain</link>
            <guid>ecGM0yvqhXY4mxT95kRp</guid>
            <pubDate>Wed, 31 Jan 2024 10:12:23 GMT</pubDate>
            <description><![CDATA[ZetaChain aims to revolutionize blockchain interoperability with its Layer 1 (L1) blockchain and smart contract platform, connecting all blockchains and enabling seamless interaction. ZetaChain&apos;s mission is to address cross-chain and multi-chain challenges, making cryptocurrency and global finance accessible to everyone, fostering a future where users effortlessly navigate between different blockchains. Key features of ZetaChain include decentralization, hyper-connected nodes, omnichain ...]]></description>
            <content:encoded><![CDATA[<p>ZetaChain aims to revolutionize blockchain interoperability with its Layer 1 (L1) blockchain and smart contract platform, connecting all blockchains and enabling seamless interaction. ZetaChain&apos;s mission is to address cross-chain and multi-chain challenges, making cryptocurrency and global finance accessible to everyone, fostering a future where users effortlessly navigate between different blockchains. Key features of ZetaChain include decentralization, hyper-connected nodes, omnichain message passing, native smart contracts, and the ability to manage external assets. Interoperability and scalability have been persistent challenges faced by Web3 projects. Enter ZetaChain, a groundbreaking Layer 1 (L1) blockchain and smart contract platform with built-in connectivity to all blockchains that seeks to revolutionize the way blockchains interact with each other. In this article, we will delve into the world of ZetaChain, exploring its mission, features, and how it aims to bridge the gap between separate blockchain networks.</p><p>ZetaChain&apos;s Mission At its core, ZetaChain aims to address the &quot;cross-chain&quot; and &quot;multi-chain&quot; issues that have hindered the seamless operation of blockchain ecosystems. Its mission is ambitious yet clear: to make the world of cryptocurrency and global finance accessible to anyone. ZetaChain envisions a future where users and developers can effortlessly navigate between different blockchains, harnessing the unique advantages of each, whether in payments, DeFi, liquidity, gaming, art, social networks, performance, security, or privacy.</p><p>Key Features of ZetaChain</p><ol><li><p>Decentralized and Public ZetaChain is a decentralized and open blockchain network built on the robust foundations of Tendermint Consensus and Cosmos SDK. Transparency and trust are paramount in ZetaChain, as all transactions, including cross-chain transactions, are fully transparent and verifiable. Unlike many cross-chain solutions, ZetaChain operates in a trust-minimized manner, reducing centralization risks and vulnerabilities to hacks.</p></li><li><p>Hyper-Connected Nodes ZetaChain&apos;s network boasts hyper-connected nodes, which serve as observers, keeping a vigilant eye on transactions across all connected chains. These nodes provide a secure and decentralized environment for developers to create innovative cross-chain applications. They enable safe, decentralized reading and writing across interconnected chains.</p></li><li><p>Omnichain Message Passing With ZetaChain, developers can transmit messages, comprising both data and value, between various chains and levels with just a few function calls. This functionality simplifies the development of robust cross-chain applications, allowing developers to enhance their existing smart contracts with ease.</p></li><li><p>Omnichain Smart Contracts ZetaChain introduces native smart contracts that can interact with linked chains seamlessly. This innovation represents a fundamental shift in how applications are developed, enabling a new era of interoperability.</p></li><li><p>Managed External Assets ZetaChain&apos;s network and its decentralized applications can efficiently handle assets and vaults from other linked chains. This means that a decentralized app running on ZetaChain can coordinate and introduce smart contract logic to any linked chain, including non-smart-contract chains like Bitcoin and Dogecoin.</p></li></ol><p>$ZETA Token At the heart of ZetaChain&apos;s ecosystem is $ZETA, which serves several critical functions:</p><ol><li><p>Gas Fees $ZETA is the lifeblood of ZetaChain&apos;s smart contract operations, serving as the means to pay gas fees. These fees are essential for the execution of smart contracts, ensuring the uninterrupted flow of transactions and the overall smooth operation of the network.</p></li><li><p>Security Security is paramount in the world of blockchain, and $ZETA rises to the occasion by assuming a pivotal role in safeguarding the Proof-of-Stake (PoS) ZetaChain blockchain. Through mechanisms like bonding, staking, and slashing, $ZETA actively contributes to the network&apos;s security. This ensures that the ZetaChain ecosystem remains resilient against potential threats.</p></li><li><p>Cross-Chain Transactions $ZETA serves as the linchpin for cross-chain functionality within the ZetaChain ecosystem. It facilitates cross-chain transfers, enables swaps, and ensures the secure delivery of messages between interconnected blockchains. What sets $ZETA apart is its innovative one-way peg mechanism, simplifying cross-chain transactions while mitigating the risk of security breaches. This distinctive feature enhances the overall security and reliability of the ZetaChain network.</p></li></ol><p>Closing In a world where blockchain interoperability is becoming increasingly crucial, ZetaChain stands out as a promising solution. With its focus on decentralization, security, and the simplification of cross-chain interactions, ZetaChain seeks to create a more accessible and interconnected blockchain ecosystem. As the project ramps up towards its mainnet launch in Q4 2023, it may very well reshape the way we view and utilize blockchain technology, ushering in a new era of seamless cross-chain collaboration and innovation.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/bd53f578c2e9c8e1403e41946669c602ec3078b8c5977c303e7ae480e24499ef.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is Dmail and How Does it Work?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-dmail-and-how-does-it-work</link>
            <guid>Fsf1wbGB6eiMACv57e2V</guid>
            <pubDate>Sun, 28 Jan 2024 10:48:45 GMT</pubDate>
            <description><![CDATA[As a new generation decentralized mailbox, Dmail has become a leader and pioneer in exploring web3 mail services. Since its launch in June 2022, the number of emails sending and receiving via the Dmail platform has exceeded 1 million, and the number of community members also has continued to grow. Dmail is now becoming a linkage for web2 users to experience convenient information interaction in the web3 era. At the same time, Dmail, which was originally built on the Internet Computer, is tryi...]]></description>
            <content:encoded><![CDATA[<p>As a new generation decentralized mailbox, Dmail has become a leader and pioneer in exploring web3 mail services. Since its launch in June 2022, the number of emails sending and receiving via the Dmail platform has exceeded 1 million, and the number of community members also has continued to grow. Dmail is now becoming a linkage for web2 users to experience convenient information interaction in the web3 era.</p><p>At the same time, Dmail, which was originally built on the Internet Computer, is trying to bridge the gap between different chains. In addition, to support MetaMask(Ethereum) login earlier this year, in August, Dmail also supported BNB Chain login and BUSD payment, making it a step closer to a multi-chain ecosystem! Now we are working on KCC, Aptos, Polygon, Sui and etc.</p><p>And Dmail has raised a seed&amp;strategic funding from Amino Capital, Hashkey Capital, Draper Dragon, KuCoin Labs, OIG VC, Spark Digital, Outliers Fund and other 20+ global top VCs. Meanwhile, Dmail is the winner of the 2021 Wanxiang Hackathon.</p><h2 id="h-what-is-dmail" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What is Dmail?</strong></h2><p>Dmail is an on-chain Email tool with the function of web3 asset transfer, each Dmail mailbox corresponds to a private “canister”. Dmail guarantees the safety of user information, and forms the fundamental decentralized identity (DID). With Dmail, users can access information, assets and DApps securely and seamlessly.</p><p>Email is the next generation web3-based collaborative platform that integrates the functions of message communication, asset management, data storage, workspace and etc. Over time, Dmail will become a fundamental infrastructure tool and DID for users to enter the web3 era, and will be a bridge that links web2 users to easily use blockchain services.</p><h2 id="h-how-does-dmail-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How Does Dmail Work?</strong></h2><p>Based on the unique architecture of the smart contract, all Dmail mailboxes are allocated a batch of private container “Canisters”. With the web3 digital signature system, the user information stored in the Dmail mailbox can be secured and avoided the risk of leakage.</p><p>Each email sending is equivalent to the interaction of the smart contract, that is, the interaction of the Canisters corresponding to each mailbox. During the interaction process, crypto assets can not only be used as the information in the container to interact and sent with emails; the Principal ID corresponding to the container can also constitute the basic decentralized digital identity (DID), which supports the borderless interaction between users with information and assets by accessing various applications.</p><p>In the process of implementing email encryption, the following ways:</p><ol><li><p>Wallet login to achieve decentralized identity;</p></li><li><p>Distributed nodes and distributed storage based on a consensus algorithm ensure no downtime, ensure service continuity, and user data sovereignty and for-good storage, realizing the real web3;</p></li><li><p>The mail header and the mail body are separated, and the contract is chained and key encrypted to ensure the privacy of user data;</p></li><li><p>The agent robot realizes the bridge and link between web3 and web2;</p></li><li><p>Dual-ID verification is required for the recipient to send and receive for the first time, which solves the problem of spam.</p></li></ol><h2 id="h-who-created-dmail" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Who Created Dmail?</strong></h2><p>Dmail has a decentralized administrative system with multiple-located offices globally such as the United States, Malaysia, Singapore, the United Kingdom and China. The core team members have worked for leading companies in the Internet and encryption markets such as Google, Huobi, OKX, Tezos, Coinness and have extensive industry experience. The fusion of multi-culture background makes the development of Dmail full of vitality.</p><h2 id="h-why-choose-dmail" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why Choose Dmail?</strong></h2><p>Dmail has significant advantages regarding web3 information development.</p><p>Compared to the traditional web2 mailbox, Dmail is compatible with the product functions of web2, and the web3 application solves the defects of the old-generation products. At present, Dmail can already complete information interaction with most web2 mailboxes. Due to the involvement of blockchain technology and the application of three encryption levels (normal, advanced and full encryption), Dmail solves the problems of traditional mailbox information leakage, data attribution, and spam letters. Both ordinary C-end users and enterprise customers will not draw major concern about mailbox security.</p><p>The current development trend of the Internet leading companies reveals that the web3 has become unstoppable trend. To realize web3, DID undoubtedly carried very important functions and user attributes. Dmail is becoming the infrastructure for web3 DID functionality.</p><p>In the web2 era, the mailbox was already a kind of Internet identity identification; in web3 era, Dmail can still function the mailbox identification features to exist as the DID (decentralized identity) for users. At present, Dmail has launched the PFP NFT avatar setting function, combined with the NFT Domain account that firmly has the potential to act as a DID, which establishes the foundation for Dmail to continue to develop the DID function in the future.</p><p>In addition, the unique asset management function of the Dmail platform can also help users to realize the accumulation and appreciation of encrypted assets in the web3 era, and adapt to the economic incentive model of the web3 era. In terms of development progress, Dmail is the current mailbox DApp, the product that convene the majority function of web3 in an express development, which leads us to believe that Dmail can lead more users to the web3 era.</p><h2 id="h-what-dmail-want" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Dmail Want?</strong></h2><p>The web3 universe is still in a long way and Dmail will continue the function of web2 mailbox, and endow new DID attributes to create an information service platform that serves more users as well as allowing more users to experience the efficiency, convenience and security of the web3 universe.</p><p>On the basis of the continuous development of web3 and its underlying technology, we hope to open up the indiscriminate transmission of information between traditional mailboxes and blockchain mailboxes with the Dmail mailbox application as the entrance, which will reduce the threshold for users and developers to participate in the encrypted world, and allow users to use the blockchain like you use the internet. Meanwhile, the Dmail can also create a portal for free communication for the development and prevalence of the new generation of Internet web3, and provide more convenient, safe and reliable services for Internet users in the new era, and become the cornerstone product of network applications in the web3.0 era.</p><h2 id="h-closing-thoughts" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Closing Thoughts</strong></h2><p>Dmail team has just celebrated its first anniversary, during which the vigorous team members experienced exploration and setbacks, and also experienced the honor and pride moment of being recognized. No matter what the situation is, all Dmail team members and the partners of the Dmail team are adhering to the original intention of the pioneers with a mindset of moving forward and great curiosity of  exploring the future for bring building Dmail into a web3-level information service DApp as well as  linking to  web3 for users.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/55876ad3a646357bbb801138287a082fd6bf623c156b758d8a5a543ceb284eb4.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is CyberConnect? : Revolutionizing Social Networking with Decentralization]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-cyberconnect-revolutionizing-social-networking-with-decentralization</link>
            <guid>vYWiZn2PmTgdLd0GLrrP</guid>
            <pubDate>Tue, 03 Oct 2023 05:56:51 GMT</pubDate>
            <description><![CDATA[AbstractCyberConnect is a groundbreaking decentralized social network that empowers users by giving them ownership of their digital identity, content, and social connections. In this litepaper, we delve into the core components of CyberConnect, including CyberProfile, CyberConnect Social Graph, and CyberWallet. By combining blockchain technology and token-powered protocols, CyberConnect aims to liberate users from the constraints of centralized social media and enable them to fully harness th...]]></description>
            <content:encoded><![CDATA[<h1 id="h-abstract" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Abstract</strong></h1><p><strong>CyberConnect</strong> is a groundbreaking decentralized social network that empowers users by giving them ownership of their digital identity, content, and social connections. In this litepaper, we delve into the core components of <strong>CyberConnect</strong>, including CyberProfile, <strong>CyberConnect</strong> Social Graph, and CyberWallet. By combining blockchain technology and token-powered protocols, <strong>CyberConnect</strong> aims to liberate users from the constraints of centralized social media and enable them to fully harness the potential of their digital social identities.</p><h1 id="h-introduction" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Introduction</strong></h1><p>The early days of the internet, known as Web 1.0, promised a free exchange of information without the control of a single company or platform. However, the advent of Web 2.0 and social media introduced a few profit-driven corporations that gained significant control over how people communicate, create content, and host their online identities. This centralized model led to a data monopoly, limiting user options and resulting in a lack of platform-freedom.</p><p><strong>CyberConnect</strong> emerges as a decentralized social network to address the inefficiencies and inequities of centralized platforms. It is built on the principles of self-sovereignty, interoperability, composability, programmability, and scalability. By leveraging blockchain and token-powered protocols, <strong>CyberConnect</strong> offers a user-centric ecosystem that fosters user trust, content portability, and innovation.</p><h1 id="h-the-problem-with-centralized-social" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Problem with Centralized Social</strong></h1><p>Centralized social media platforms control users’ social connection data, leading to a misalignment of interests between platforms and users. Users’ social data is exploited to maximize profits, leaving them with limited alternatives for better experiences. This creates a data monopoly, with only a few social media platforms dominating the market.</p><p>Content creators often receive a small fraction of the revenue generated by social platforms, while users typically receive no compensation for their engagement and loyalty. Additionally, users find it challenging to switch platforms due to data silos and lack of interoperability.</p><h1 id="h-decentralized-social-our-solution" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Decentralized Social: Our Solution</strong></h1><p><strong>CyberConnect</strong> proposes a decentralized social network that provides a level playing field for platforms and developers, allowing them to compete based on the best service offered. All end-user social media platforms build upon the same social data layer, removing the need for any single company to control access to data. This enables users to seamlessly migrate their online identities across platforms.</p><h1 id="h-cyberprofile-universal-web3-identity-infrastructure" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>CyberProfile: Universal Web3 Identity Infrastructure</strong></h1><p>CyberProfile is a universal identity infrastructure that anchors users’ self-sovereign digital identity to their <strong>CyberConnect</strong> account. It stores basic personal information, usernames, avatars, and metadata. When users create content, a connection between the content and their profile is established, ensuring on-chain proof of the original creator and allowing for proper attribution and monetization.</p><h1 id="h-cyberconnect-social-graph" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>CyberConnect Social Graph</strong></h1><p>The <strong>CyberConnect</strong> Social Graph stores social data, including connections between users, their content, and interests. It offers developers a toolkit for building composable applications that utilize social data from <strong>CyberConnect</strong>. The smart contracts enable programmability, tokenization of content, and various social interactions.</p><h1 id="h-cyberwallet-an-accessible-and-intuitive-web3-wallet" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>CyberWallet: An Accessible &amp; Intuitive Web3 Wallet</strong></h1><p>CyberWallet is a user-friendly web3 wallet designed to provide a frictionless onboarding experience for new users. It features two tiers, Social and Pro, catering to different user needs and knowledge levels. CyberWallet supports gasless transactions and account abstraction, enabling easy cross-chain gas fee payments.</p><h1 id="h-cyber-cyberconnects-native-utility-and-governance-token" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>CYBER: CyberConnect’s Native Utility &amp; Governance Token</strong></h1><p>CYBER is CyberConnect’s native utility and governance token. It allows token holders to participate in governance decisions and will be used for various functionalities within the ecosystem, such as payment for CyberProfile minting and gas fees in CyberWallet.</p><h1 id="h-conclusion-and-how-to-get-involved" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Conclusion &amp; How to Get Involved</strong></h1><p>CyberConnect represents the future of decentralized social networking, where users regain control over their digital lives and creators can thrive in a fair and decentralized environment. To get involved, users can try out social products built on <strong>CyberConnect</strong> or experiment with dApps leveraging its technology. A public sale for CYBER tokens will be held on CoinList. In the coming months, an official whitepaper will provide more technical details about the protocol.</p><h1 id="h-about-cyberconnect" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>About CyberConnect</strong></h1><p><strong>CyberConnect</strong> is web3’s leading decentralized social network, enabling developers to create user-centric social applications where users own their digital identities, content, and connections. The platform fosters connections between thousands of projects, creators, and users, promoting a thriving and equitable social networking ecosystem.</p><p>To join the decentralized social revolution, mint a CyberProfile and embrace the power of true ownership and meaningful connections.</p><h1 id="h-join-cyberconnect-community" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Join CyberConnect Community</strong></h1><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cyberconnect.me/">Website</a> | <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.cyberconnect.me/">Docs</a> | <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/CyberConnectHQ">Twitter</a> | <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://discord.gg/cyberconnect">Discord</a> | <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://t.me/CyberConnect">Telegram</a></p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/650004ea5cbc8adeb30cc3c641de4b391d228ef7b4f0afcdd5803c93e12aa069.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Is GitHub? A Beginner’s Introduction to GitHub]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-github-a-beginner-s-introduction-to-github</link>
            <guid>hN6DKcXrxo2a9YiYJQZM</guid>
            <pubDate>Sat, 05 Aug 2023 03:21:30 GMT</pubDate>
            <description><![CDATA[At a high level, GitHub is a website and cloud-based service that helps developers store and manage their code, as well as track and control changes to their code. To understand exactly what GitHub is, you need to know two connected principles:Version controlGitIn this article, we’ll first explain those two principles. Then, we’ll dig into more about GitHub and how you can actually use GitHub to work with WordPress and/or Kinsta.What Is Version Control?Version control helps developers track a...]]></description>
            <content:encoded><![CDATA[<p>At a high level, GitHub is a website and cloud-based service that helps developers store and manage their code, as well as track and control changes to their code. To understand exactly what GitHub is, you need to know two connected principles:</p><ul><li><p>Version control</p></li><li><p>Git</p></li></ul><p>In this article, we’ll first explain those two principles. Then, we’ll dig into more about GitHub and how you can actually use GitHub to work with WordPress and/or Kinsta.</p><h2 id="h-what-is-version-control" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Version Control?</strong></h2><p>Version control helps developers track and manage changes to a software project’s code. As a software project grows, version control becomes essential. Take WordPress…</p><p>At this point, WordPress is a pretty big project. If a core developer wanted to work on one specific part of the WordPress codebase, it wouldn’t be safe or efficient to have them directly edit the “official” source code.</p><p>Instead, version control lets developers safely work through <strong>branching</strong> and <strong>merging</strong>.</p><p>With <strong>branching</strong>, a developer duplicates part of the source code (called the <strong>repository</strong>). The developer can then safely make changes to that part of the code without affecting the rest of the project.</p><p>Then, once the developer gets his or her part of the code working properly, he or she can <strong>merge</strong> that code back into the main source code to make it official.</p><p>All of these changes are then tracked and can be reverted if need be.</p><h2 id="h-what-is-git" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Git?</strong></h2><p>Git is a <strong>specific open-source version control system</strong> created by Linus Torvalds in 2005.</p><p>Specifically, Git is a <strong>distributed version control system</strong>, which means that the entire codebase and history is available on every developer’s computer, which allows for easy branching and merging.</p><p>According to a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://insights.stackoverflow.com/survey/2018/#work-version-control">Stack Overflow developer survey</a>, over 87% of developers use Git.</p><h2 id="h-what-is-github" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is GitHub?</strong></h2><p>GitHub is a for-profit company that offers a cloud-based Git repository hosting service. Essentially, it makes it a lot easier for individuals and teams to use Git for version control and collaboration.</p><p>GitHub’s interface is user-friendly enough so even novice coders can take advantage of Git. Without GitHub, using Git generally requires a bit more technical savvy and use of the command line.</p><p>GitHub is so user-friendly, though, that some people even use GitHub to manage other types of projects – <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://braythwayt.com/2015/01/29/how-i-write-books-with-github-and-leanpub.html">like writing books</a>.</p><p>Additionally, anyone can sign up and host a public code repository for free, which makes GitHub especially popular with open-source projects.</p><p>As a company, GitHub makes money by selling hosted private code repositories, as well as other business-focused plans that make it easier for organizations to manage team members and security. We utilize Github extensively at Kinsta to manage and develop internal projects.</p><h2 id="h-how-to-use-git-and-github-at-kinsta" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How To Use Git And GitHub At Kinsta</strong></h2><p>Kinsta offers a Git client so that you can <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/docs/connect-to-ssh/">use SSH</a> to pull down your own Git repository from GitHub (<em>or other similar services</em>).</p><h2 id="h-other-ways-to-use-git-and-github-with-wordpress" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Other Ways To Use Git And GitHub With WordPress</strong></h2><p>Many WordPress theme and plugin developers host their projects’ source code at GitHub. For example, you can view the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/elementor/elementor">Elementor page builder code</a>, the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/Codeinwp/zerif-lite">Zerif Lite theme source code</a>, and lots more.</p><p>But there are also WordPress plugins that help you use Git with WordPress more directly.</p><p>For example, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://versionpress.com/">VersionPress</a> aims to bring the power of Git to regular WordPress actions, like updating a post or installing a plugin. VersionPress adds version control for both your <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/knowledgebase/wordpress-database/">WordPress database</a> and files.</p><p>de</p><h3 id="h-hallo" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Hallo!</strong></h3><p>Diesen Artikel gibt es auch auf Deutsch.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/de/wissensdatenbank/was-ist-github/"><strong>Schaue dir die deutsche Version an</strong></a></p><p>Close</p><p>At a high level, GitHub is a website and cloud-based service that helps developers store and manage their code, as well as track and control changes to their code. To understand exactly what GitHub is, you need to know two connected principles:</p><ul><li><p>Version control</p></li><li><p>Git</p></li></ul><p>In this article, we’ll first explain those two principles. Then, we’ll dig into more about GitHub and how you can actually use GitHub to work with WordPress and/or Kinsta.</p><h2 id="h-what-is-version-control" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Version Control?</strong></h2><p>Version control helps developers track and manage changes to a software project’s code. As a software project grows, version control becomes essential. Take WordPress…</p><p>At this point, WordPress is a pretty big project. If a core developer wanted to work on one specific part of the WordPress codebase, it wouldn’t be safe or efficient to have them directly edit the “official” source code.</p><p>Instead, version control lets developers safely work through <strong>branching</strong> and <strong>merging</strong>.</p><p>With <strong>branching</strong>, a developer duplicates part of the source code (called the <strong>repository</strong>). The developer can then safely make changes to that part of the code without affecting the rest of the project.</p><p>Then, once the developer gets his or her part of the code working properly, he or she can <strong>merge</strong> that code back into the main source code to make it official.</p><p>All of these changes are then tracked and can be reverted if need be.</p><h2 id="h-what-is-git" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Git?</strong></h2><p>Git is a <strong>specific open-source version control system</strong> created by Linus Torvalds in 2005.</p><p>Specifically, Git is a <strong>distributed version control system</strong>, which means that the entire codebase and history is available on every developer’s computer, which allows for easy branching and merging.</p><p>According to a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://insights.stackoverflow.com/survey/2018/#work-version-control">Stack Overflow developer survey</a>, over 87% of developers use Git.</p><h2 id="h-what-is-github" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is GitHub?</strong></h2><p>GitHub is a for-profit company that offers a cloud-based Git repository hosting service. Essentially, it makes it a lot easier for individuals and teams to use Git for version control and collaboration.</p><p>GitHub’s interface is user-friendly enough so even novice coders can take advantage of Git. Without GitHub, using Git generally requires a bit more technical savvy and use of the command line.</p><p>GitHub is so user-friendly, though, that some people even use GitHub to manage other types of projects – <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://braythwayt.com/2015/01/29/how-i-write-books-with-github-and-leanpub.html">like writing books</a>.</p><p>Additionally, anyone can sign up and host a public code repository for free, which makes GitHub especially popular with open-source projects.</p><p>As a company, GitHub makes money by selling hosted private code repositories, as well as other business-focused plans that make it easier for organizations to manage team members and security. We utilize Github extensively at Kinsta to manage and develop internal projects.</p><p>The GitHub homepage</p><h3 id="h-check-out-our-video-to-learn-the-difference-between-git-and-github" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Check out our video to learn the difference between Git and Github</strong></h3><h2 id="h-how-kinsta-compares-to-other-hosting-providers" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How Kinsta Compares to Other Hosting Providers</h2><p>We tested 3,200+ client sites... some received up to a 200% speed boost just by switching to Kinsta. Learn why Kinsta is the top recommended WordPress host.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/kinsta-alternatives/"><strong>Compare your options</strong></a></p><h2 id="h-exploring-the-github-interface" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Exploring The GitHub Interface</strong></h2><p>To give you a basic understanding of what the GitHub interface looks like, here’s the WordPress source code <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/WordPress/WordPress">hosted at a GitHub repository</a>:</p><p>The WordPress code at GitHub</p><p>From here, you can view the various branches that are being worked on, as well as when someone made a <strong>commit</strong> (<em>this is kind of like “saving” a file</em>). Depending on how a repository is set up, you also might be able to create your own <strong>branch</strong> and make your own <strong>commits</strong> there.</p><p>And once you made some changes, you could submit that code back to a branch by making a <strong>pull request</strong>. A pull request is basically asking the person in charge of the branch to include your code. And it also helps that person see exactly what you’ve changed in the code.</p><p>If you wanted to edit some or all of the WordPress source code on your own account on a more permanent basis, you could also <strong>fork</strong> it by clicking the <strong>Fork</strong> button (a fork is similar in concept to a <strong>branch</strong>, but a fork is more permanent):</p><p>An example of forking code</p><p>WordPress itself was <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/learn/wordpress-history/">originally a fork of b2/cafelog</a>. If you want a bit more information on how you can use GitHub, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://guides.github.com/activities/hello-world/">GitHub’s Hello World guide</a> offers a beginner-friendly tutorial for getting started.</p><h2 id="h-how-to-use-git-and-github-at-kinsta" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How To Use Git And GitHub At Kinsta</strong></h2><p>Kinsta offers a Git client so that you can <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/docs/connect-to-ssh/">use SSH</a> to pull down your own Git repository from GitHub (<em>or other similar services</em>).</p><p>If you’re interested in using Git or GitHub at Kinsta, please <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/docs/git/">read this help article for full instructions</a>.</p><h2 id="h-other-ways-to-use-git-and-github-with-wordpress" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Other Ways To Use Git And GitHub With WordPress</strong></h2><p>Many WordPress theme and plugin developers host their projects’ source code at GitHub. For example, you can view the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/elementor/elementor">Elementor page builder code</a>, the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/Codeinwp/zerif-lite">Zerif Lite theme source code</a>, and lots more.</p><p>But there are also WordPress plugins that help you use Git with WordPress more directly.</p><p>For example, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://versionpress.com/">VersionPress</a> aims to bring the power of Git to regular WordPress actions, like updating a post or installing a plugin. VersionPress adds version control for both your <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/knowledgebase/wordpress-database/">WordPress database</a> and files.</p><p>VersionPress</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://wppusher.com/">WP Pusher</a> is another Git-based plugin that lets you deploy themes and plugins directly from GitHub to your WordPress site.</p><h2 id="h-how-to-get-started-with-github" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How To Get Started With GitHub</strong></h2><p>To get started with GitHub:</p><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/join">Sign up</a> for a free GitHub account</p></li><li><p>Follow the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.github.com/en/get-started/quickstart/hello-world">GitHub Hello World guide</a> to understand the most popular actions you’ll likely want to take</p></li><li><p>Read: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/blog/wordpress-version-control/">WordPress Version Control (What It Is and Best Solutions)</a></p></li><li><p>Read: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://kinsta.com/knowledgebase/git-vs-github/">Git vs Github: What’s the Difference and How to Get Started with Both </a></p></li></ul>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/60ec6048ed765bb99be25532c54a3aeb5bc0cc39bf243ecdb581de233ef0d130.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Is DeBank? ]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-debank</link>
            <guid>QuNn1YIWB0XVEx8xwYji</guid>
            <pubDate>Sat, 05 Aug 2023 03:01:58 GMT</pubDate>
            <description><![CDATA[DeBank is a DeFi dashboard that tracks over 800 protocols on more than 15 different chains. It provides users with a simple overview of their holdings, positions, outstanding debt on loans and pending rewards. The project has gained interest from some well-known funds raising over $25 Million for further development. These names include Coinbase Ventures, Crypto.com, Circle Ventures and others.How To Use DeBank?After connecting your wallet to the website, you may need to verify your address t...]]></description>
            <content:encoded><![CDATA[<p>DeBank is a DeFi dashboard that tracks over 800 protocols on more than 15 different chains. It provides users with a simple overview of their holdings, positions, outstanding debt on loans and pending rewards.</p><p>The project has gained interest from some well-known funds raising over <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pitchbook.com/profiles/company/471828-07#signals">$25 Million</a> for further development. These names include Coinbase Ventures, Crypto.com, Circle Ventures and others.</p><h2 id="h-how-to-use-debank" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How To Use DeBank?</h2><p>After connecting your wallet to the website, you may need to verify your address to start using the dashboard.</p><p>When the transaction is signed you will be able to access your profile page by selecting it on the left side of your screen.</p><p>When you open your profile DeBank will give you an overview of all the assets belonging to your wallet, if it is tracking the protocol and chain you are on. It is also possible to track funds on all blockchains individually. Simply select the chain of your choice and the dashboard will give you an overview of your assets on that chain.</p><p>NFT tracking is included but not all marketplaces are covered. If the NFT is in your wallet it should show up on DeBank.</p><p>The <strong>approval</strong> page is very useful if you have given permission to protocols that you want to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://wiki.rugdoc.io/docs/how-to-revoke-permissions/">revoke</a>. It will not only show you which protocols have permission to spend your tokens but also how much capital is at risk if these permissions get used in a malicious way.</p><p>If you want to stay safe and organized, you can use this option to revoke any permission you have given on the chains that are supported by DeBank.</p><p><strong>Bundles</strong> allow you to track multiple wallets if there is a need for it. Simply add the addresses you want to a bundle and they will be tracked. It is possible to create multiple bundles as well.</p><p>DeBank also offers a complete <strong>DeFi List</strong> that tracks almost all major protocols and projects on 17 different chains. Users that want to discover new investment opportunities can easily find them by filtering by blockchain and niche on DeBank.</p><p>For example, if you are looking for DEX aggregators on Ethereum all you have to do is select ETH as the preferred chain and DEX-Aggregator as the second option.</p><p>Lastly, DeBank can greatly help those that are involved in multiple projects and want to participate in governance. The dashboard aggregates all active proposals from a lot of different projects and gives users a simple overview of them. There is also an option to view only those that are of interest to you based on your wallet holdings.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Conclusion</h2><p>At the time of writing DeBank was still under heavy development. Some features like Swaps will be migrated from the app while others will have significant improvements. As for the functionality, there is no question that DeBank can be of great value to DeFi users that are involved in multiple projects at the same time.</p><p>Not only does it provide a very detailed overview of your portfolio, but it also keeps track of many different projects and their governance proposals. With DeBank it should be easy to stay organized and informed at the same time.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/8d74bbd1b96fae568da5e8259dc2931544c7af5222a282fd11318224e7bb94a6.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What is Worldcoin?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-worldcoin</link>
            <guid>zigzTlnZWwcNjshBUDzR</guid>
            <pubDate>Sat, 05 Aug 2023 02:54:38 GMT</pubDate>
            <description><![CDATA[An ambitious project with a confluence of cryptocurrencies, blockchain and artificial intelligence technologies to build a biometric global identity and financial system. Worldcoin is a cryptocurrency and digital identity project co-founded by OpenAI CEO Sam Altman, Alex Blania and Max Novendstern. It aims to address income inequality through its unique World ID feature, which will serve as “proof-of-personhood,” as described by Sam Altman. After two years in development and amid high anticip...]]></description>
            <content:encoded><![CDATA[<p><em>An ambitious project with a confluence of cryptocurrencies, blockchain and artificial intelligence technologies to build a biometric global identity and financial system.</em></p><p>Worldcoin is a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/blockchain-for-beginners/what-is-a-cryptocurrency-a-beginners-guide-to-digital-money">cryptocurrency</a> and digital identity project co-founded by OpenAI CEO <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/top-people-in-crypto-and-blockchain-2023/sam-altman">Sam Altman</a>, Alex Blania and Max Novendstern. It aims to address income inequality through its unique World ID feature, which will serve as “proof-of-personhood,” as described by Sam Altman. After two years in development and amid high anticipation, the project was launched on July 24, 2023.</p><p>The crypto-focused project was co-founded by the trio with a three-part mission: to create a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/explained/what-is-decentralized-identity-in-blockchain">global unique digital identity</a>, a global currency (Worldcoin token) and an app that enables payment, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/learn/how-to-trade-cryptocurrencies-the-ultimate-beginners-guide">purchases and transfers using its token alongside other cryptocurrencies</a> and traditional assets.</p><p>Tools for Humanity (TFH) is the company building Worldcoin and raised $115 million in a Series C round led by Blockchain Capital in May 2023. Prior rounds included investments from a16z, Khosla ventures and others.</p><p>Worldcoin is an open-source, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/learn/what-is-web-3-0-a-beginners-guide-to-the-decentralized-internet-of-the-future">decentralized protocol</a> embraced by a worldwide community of developers and technologists and aims to be self-sufficient, fostering a true decentralized vision.</p><h2 id="h-how-does-worldcoin-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How does Worldcoin work?</h2><p><em>Scan your retina in exchange for cryptocurrencies and generate a unique digital identity establishing one’s proof-of-personhood among the growing sea of AI robots.</em></p><p>At the heart of the Worldcoin project is the concept of proof-of-personhood established by an eye-scanning device called the Orb. With the rise of artificial intelligence (AI), proving identity in the future will be more important than ever and the question — human or machine? — will definitely take center stage.</p><p>Worldcoin’s white paper highlights that specialized biometric gear might be the only long-term practical way to provide AI-safe proof-of-personhood verifications, which led to the creation of the Orb. The Orb is of high importance in Worldcoin’s ecosystem:</p><ul><li><p>Every individual will need to get their retina scanned via the Orb for biometric verification.</p></li><li><p>Anyone across the globe can sign up regardless of their location or background.</p></li><li><p>Worldcoin is expanding its “orbing” of people by setting up centers across 35 countries and growing.</p></li><li><p>The “Orb,” a special silver ball about the size of a bowling ball, is used to conduct in-person iris scans on individuals. The Orb scans the person’s iris to confirm their human identification before generating their unique World ID.</p></li><li><p>Worldcoin collected 2 million users in its beta and is ramping up its operations to onboard more users. Early adopters are being awarded Worldcoin (WLD), the native token of the Worldcoin protocol.</p><p>Individuals need to download the World app, scan their retinas at Orb centers, and generate a unique World ID, which will give them access to the decentralized Worldcoin ecosystem. As the network grows, so will various <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/learn/what-are-dapps-everything-there-is-to-know-about-decentralized-applications">decentralized applications (DApps)</a> and utilities on it. Developers can create online and mobile applications on the Worldcoin protocol using the World ID Software Development Kit (SDK).</p></li><li><p>What is a Worldcoin token, and how can I get token incentives?</p><p><em>The Worldcoin Orb gives WLD tokens to those who get their eyes scanned. Token incentives will be on the Optimism mainnet.</em></p><p>Worldcoin (WLD) is an ERC-20 token on Ethereum mainnet. Prior to its official launch, Worldcoin Protocol successfully migrated to the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/news/can-the-optimism-blockchain-win-the-battle-of-the-rollups">OP mainnet</a>, which was formerly referred to as the Ethereum layer-2 blockchain Optimism. The transition means the Worldcoin protocol is now on Ethereum with bridges for Optimism and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/learn/proof-of-stake-vs-proof-of-work:-differences-explained">Polygon PoS</a>.</p></li><li><p>During the beta phase, WLD was only available to early adopters as incentives for their participation in getting their eyes scanned. WLD was allocated to as many as 2 million unique new users during the beta. Worldcoin will continue these incentives post-launch, with the amount diminishing as more people are onboarded. Apart from this, Orb Operators are also rewarded with WLD issuance.</p><p>WLD’s supply will be capped to 10 billion tokens for a duration of 15 years. However, after the 15-year period, the governance committee of the Worldcoin Protocol will have the authority to decide whether or not to increase the token supply, set at a maximum rate of 1.5% per year (the default rate is set at 0%). Additionally, the governance team will also determine how these newly minted tokens will be allocated or distributed within the network.</p><p>As per the tokenomics, 75% of the tokens have been earmarked for the community, 9.8% to the initial development team, 13.5% to the investors of Tools for Humanity and 1.7% in reserve. The combination of World ID and the WLD token will hold a significant <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/news/what-are-governance-tokens-and-how-do-they-work">role in protocol governance</a>. Users will actively engage in shaping the future of the Worldcoin ecosystem, establishing it as a true community-driven initiative.</p></li><li><p>How to buy Worldcoin tokens</p><p><em>WLD token is listed and available via various avenues allowing people to choose the option of purchasing that best suits their needs. Prices are subject to market trends.</em></p><p>WLD is available for purchase on all major centralized exchanges (CEXs), such as Binance, KuCoin, OKX, Bybit and Huobi. CEXs, such as Binance, offer multiple purchase options via credit card or bank deposit, or buying a stablecoin like Tether (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/tether-price-index">USDT</a>) or Binance USD (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/binance-usd-busd-price-index">BUSD</a>), and then using that coin to buy WLD.</p><p>It is also available for swaps on decentralized finance (DeFi) platforms like <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/news/how-to-use-uniswap-a-step-by-step-beginner-s-guide">Uniswap</a> and PancakeSwap. The levels of security, dependability and liquidity vary among platforms. Sam Altman and co-founder Alex Blania expressed in an open letter that the WLD token would only be accessible in regions of the world where legal compliance is more feasible.</p><p>At the time of launch on July 24, 2023, WLD was unavailable in United States, with the company clearly stating that the use, purchase or access of WLD tokens is not <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://vault.pactsafe.io/s/8a18d792-fd76-44db-9b92-b0bb7981c248/legal.html#contract-byutjvtyt">intended</a> for U.S. persons, including U.S. citizens, residents, individuals located within the U.S., as well as companies incorporated, located or registered in the United States. Moreover, anyone who completes an Orb scan in the U.S. would not be eligible for the token drop.</p></li><li><p>Is it worth investing in Worldcoin?</p><p><em>Worldcoin has sparked interest globally, with some expressing bullish forecasts, while others fearing privacy risks. One must educate themself on all aspects before making any investments.</em></p><p>Worldcoin has received mixed reviews — from criticism and controversy to futuristic and cool. When news of the retina scanners became public in late 2021, renowned whistleblower Edward Snowden expressed resistance to the concept of scanning human eyes as a requirement for receiving cryptocurrency. The project has drawn severe criticism globally over perceived privacy risks.</p><p>On the other hand, Silicon Valley investors have shown massive interest in the project and confidence in the founding team. In the era of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/news/generative-ai">generative AI</a> and human-like interaction by bots, Worldcoin is a unique project poised to serve as a differentiator source between humans and AI bots in the digital world. The company’s own AI-based prediction models have estimated that over 1 billion people will have gazed into the Orb by 2023.</p></li></ul>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/83469051cbc4ae2b002d8569245063689ef237450979da3f2ea307ba4e4cad27.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Are Blockchain Bridges and How Do They Work?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-are-blockchain-bridges-and-how-do-they-work</link>
            <guid>HH96dk04CjUi0CPRpFNc</guid>
            <pubDate>Sat, 05 Aug 2023 02:47:21 GMT</pubDate>
            <description><![CDATA[If you want to move tokens from one blockchain to another, you’ll likely need a blockchain bridge to allow those assets to travel. A blockchain bridge is a tool that lets you port assets from one blockchain to another, solving one of the main pain points within blockchains – a lack of interoperability. Since blockchain assets are often not compatible with one another, bridges create synthetic derivatives that represent an asset from another blockchain. If you use a bridge to send one Solana c...]]></description>
            <content:encoded><![CDATA[<p><strong>If you want to move tokens from one blockchain to another, you’ll likely need a blockchain bridge to allow those assets to travel.</strong></p><p>A blockchain bridge is a tool that lets you port assets from one <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/what-is-blockchain-technology/">blockchain</a> to another, solving one of the main pain points within blockchains – a lack of interoperability.</p><p>Since blockchain assets are often not compatible with one another, bridges create synthetic derivatives that represent an asset from another blockchain.</p><p>If you use a bridge to send one <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/solana/">Solana</a> coin to an <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/price/ethereum/">Ethereum</a> wallet, that wallet will receive a token that has been “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/what-are-wrapped-tokens/">wrapped</a>” by the bridge – converted to a token based on the target blockchain. In this case, the Ethereum wallet would receive a &quot;bridge&quot; version of Solana that has been converted to an <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/tech/2021/02/09/what-is-the-erc-20-ethereum-token-standard/">ERC-20 token</a> – the generic token standard for fungible tokens on the Ethereum blockchain.</p><p>While bridges open up new markets and work toward a brighter multi-chain future, they come with their own security challenges, as proven by a huge <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/tech/2022/02/02/blockchain-bridge-wormhole-suffers-possible-exploit-worth-over-250m/">$326 million exploit on the nascent Wormhole bridge</a> in February 2022.</p><h2 id="h-types-of-blockchain-bridges" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Types of blockchain bridges</strong></h2><p>Some bridges, known as unidirectional or one-way bridges, allow you to port assets only to the target blockchain and not the other way around. For instance, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/price/wrapped-bitcoin/">Wrapped Bitcoin</a> allows you to send <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/what-is-bitcoin/">bitcoin</a> to the Ethereum blockchain – to convert BTC to an ERC-20 stablecoin – but it doesn’t let you send ether to the Bitcoin blockchain.</p><p>Other bridges like Wormhole and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/business/2021/12/21/anyswap-rebrands-to-multichain-raises-60m-led-by-binance-labs/">Multichain</a> are bidirectional, or two-way, meaning you can freely convert assets to and from blockchains. Just as you can send Solana to Ethereum’s blockchain, you can send ether to Solana.</p><p><strong>Read more: </strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/solana/"><strong>What is Solana?</strong></a></p><p>Bridges are either custodial (also known as centralized or trusted) or noncustodial (decentralized or trustless). The difference explains who controls the tokens that are used to create the bridged assets. All wrapped bitcoin (WBTC) is held in custody by BitGo, making it a centralized bridge. Conversely, bridged assets on Wormhole are held by the protocol, meaning it is more decentralized.</p><p>While hardline advocates of decentralization might venture that the custodial nature of WBTC makes it less secure than decentralized alternatives, bridges that decentralize custody over bridged assets aren&apos;t necessarily safer, as shown by the Wormhole bridge exploit.</p><h2 id="h-why-use-a-blockchain-bridge" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why use a blockchain bridge?</strong></h2><p>Porting assets from one blockchain to another blockchain comes with a myriad of benefits. First, the blockchain onto which you port assets might be cheaper and faster than its native blockchain. This is certainly true for Ethereum, where high transaction <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/what-are-ethereum-gas-fees/">fees</a> and slow throughput make it difficult for newcomers to get involved in decentralized finance (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/what-is-defi/">DeFi)</a>.</p><p>If investors ported assets to a layer 2 network – a faster blockchain that sits atop the Ethereum blockchain, like Arbitrum or <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/polygon-and-matic-whats-the-difference/">Polygon</a> – they could trade ERC-20 tokens for a fraction of the cost without sacrificing exposure to Ethereum tokens.</p><p>Other investors might use bridges to make the most of markets that exist only on another blockchain. For instance, the DeFi protocol Orca is available only on Solana, but supports a wrapped version of ETH.</p><p>Bridges are becoming easier to use. Many DeFi protocols have integrated bridges to let their users swap tokens from different protocols without having to leave the platform. This makes the process of converting tokens through bridges less cumbersome.</p><h2 id="h-what-are-the-biggest-blockchain-bridges" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What are the biggest blockchain bridges?</strong></h2><p>According to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://defillama.com/protocols/Bridge">DeFi Llama</a>, there was $21.8 billion worth of crypto locked in bridges as of March 2022. The largest blockchain bridge is Wrapped Bitcoin, accounting for almost half of the bridge market, with $10.2 billion in <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/why-tvl-matters-in-defi-total-value-locked-explained/">total value locked (TVL)</a>. DeFi Llama pegs Multichain as the largest cross-chain bridge, with about $7 billion in TVL.</p><p>A <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dune.xyz/queries/145067/285735">dashboard on Dune Analytics</a> shows that the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/business/2021/12/14/avalanche-adds-native-minting-of-usdc-stablecoin-in-continued-defi-push/">Avalanche</a> Bridge is the largest Ethereum bridge, with about $6 billion in TVL, followed by Polygon ($5 billion TVL) and the Fantom Anyswap Bridge ($4.2 billion TVL).</p><h2 id="h-are-blockchain-bridges-safe" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Are blockchain bridges safe?</strong></h2><p>Like with all of crypto, your capital is at risk. Some novel decentralized bridges are relatively untested and even those that have been tested are subject to exploits. The most notable recent example is Wormhole, but a week before that attack, a bridge called <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/markets/2022/01/28/defi-protocol-qubit-finance-exploited-for-80m/">Qubit was exploited for $80 million</a>.</p><p><strong>Read More:</strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coindesk.com/learn/how-to-stay-safe-in-defi-red-flags-and-risks-you-need-to-know/"><strong> How to Stay Safe in DeFi</strong></a></p><p>According to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.elliptic.co/blog/325-million-stolen-from-wormhole-defi-service">analysis</a> from blockchain analytic firm Elliptic, the Wormhole attack occurred because Wormhole allowed the attacker to mint 120,000 worth of wrapped ethereum without having to stake any ETH. The attacker then withdrew the free WETH. A high-frequency trading firm called Jump Trading <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/JumpCryptoHQ/status/1489301013408497666?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1489301013408497666%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fdecrypt.co%2F">covered the losses</a> to bail out the protocol.</p><pre data-type="codeBlock" text="Trusted bridges have different risk profiles. Instead of the risk that an attacker exploits the protocol and drains it of funds, the risk is that the company that holds staked assets is corrupt or negligent or loses control over the assets because of incompetence or because of orders from a third party, such as if a government requests that the company freeze assets.
"><code>Trusted bridges have different risk profiles. Instead of the risk that an attacker exploits the protocol and drains it of funds, the risk <span class="hljs-keyword">is</span> that the company that holds staked assets <span class="hljs-keyword">is</span> corrupt or negligent or loses control over the assets because of incompetence or because of orders <span class="hljs-keyword">from</span> a third party, such <span class="hljs-keyword">as</span> <span class="hljs-keyword">if</span> a government requests that the company freeze assets.
</code></pre>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/b43a600cbe706bb1907eb076d13e317b1d2652fb0380e9f5a23dccb7f3c576aa.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Are Crypto Wallets?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-are-crypto-wallets</link>
            <guid>xjtLRD0Q4qO5oy0CsQF3</guid>
            <pubDate>Sat, 22 Jul 2023 10:22:59 GMT</pubDate>
            <description><![CDATA[Unlike traditional securities that are typically bought, sold and held through a brokerage house, cryptocurrencies allow investors to manage and transfer their assets entirely peer-to-peer. For some, a major attraction of the digital-asset ecosystem is the ability to take custody of assets without the need for intermediaries like banks and brokers. Unfortunately, that means if you lose the seed phrase or private key to the wallet that holds your tokens– equivalent to passwords for online inve...]]></description>
            <content:encoded><![CDATA[<p>Unlike traditional securities that are typically bought, sold and held through a brokerage house, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/sites/digital-assets/article/what-is-crypto/">cryptocurrencies</a> allow investors to manage and transfer their assets entirely peer-to-peer. For some, a major attraction of the digital-asset ecosystem is the ability to take custody of assets without the need for intermediaries like banks and brokers. Unfortunately, that means if you lose the seed phrase or private key to the wallet that holds your tokens– equivalent to passwords for online investment accounts–you lose your crypto. There is no email recovery or customer support in the world of self-custodied cryptocurrency wallets.</p><p>Luckily, there is a wide range of wallet options that lie on a spectrum from completely self-controlled to completely outsourced. Digital-asset holders should consider what is best for their personal situations. With options like cold storage (explained below), your personal security practices can matter greatly.</p><p>For the extremely risk-averse, there are ways to gain exposure to cryptocurrencies via traditional financial markets that provide third-party custody, usually through a broker. These include futures contracts and exchange-traded funds that invest in them, over-the-counter trust and publicly traded companies with crypto holdings or a dedicated business strategy in the industry including MicroStrategy<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/companies/microstrategy">MSTR</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/companies/microstrategy">-0.9%</a>, a business-software company that keeps buying bitcoin; money-transfer specialist Square; and miners Riot Blockchain and Marathon Digital.</p><p>For those who elect to hold their digital assets outside of the traditional financial arena, deciding what kind of wallet to use is a must. The main options are: custodial versus non-custodial and hot versus cold. Users then have to select a specific wallet from those possibilities. Each option provides trade-offs between ownership, ease of use, and security.</p><h2 id="h-custodial-wallets" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Custodial Wallets</strong></h2><p>Custodial wallets are those that are held by someone on your behalf. If you keep assets on centralized exchanges like Coinbase, Kraken or Gemini, you have to use a custodial wallet. Custodial wallets are by far the most convenient because accessing your crypto is the same as a login experience for an online broker.</p><p>Custodial wallets can be appropriate for the average crypto investor whose digital assets make up a small percentage of an overall portfolio. It also makes sense if you do not trust in your ability to store crypto. Having a custodial wallet involves opening an account with a third party. You use a username, password and typically a two-tier verification system like a personal-identification number or randomized authentication code. Users can also easily link<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/link-link/">link</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/link-link/">-0.2%</a> a bank account to make instant purchases and verify one’s identity to increase spending limits or send and receive crypto. Instead of share price, these wallets show the number of digital assets held and the portfolio value.</p><p>The biggest risk to custodial wallets are exchange hacks and the custodian becoming insolvent. Sophisticated exchanges will typically hold most of their coins in cold storage, have multifaceted authenticity measures and use complex firewalls. However, this does not mean that they are immune to attack. In 2019, hackers stole $40 million of bitcoin in an orchestrated attack that used phishing scams and viruses against the popular Binance exchange. Furthermore, as seen with centralized finance lending platforms and exchanges like Celsius<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/celsius-cel/">CEL</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/celsius-cel/">0.0%</a>, Voyager, and FTX, these institutions can freeze accounts and withdrawals if they face liquidity issues. Relying on third parties is easy, but it brings its own set of risks.</p><h2 id="h-non-custodial-wallets" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Non-Custodial Wallets</strong></h2><p>This category comes in two temperatures: hot and cold. Hot wallets are those that require an internet connection to access. They can be in desktop, web or mobile form. Cold wallets do not rely on the internet. Cold wallets are physical devices that are nearly impossible to compromise because they are not connected to the internet.</p><h2 id="h-hot-wallets" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Hot Wallets</strong></h2><p>Hot wallets are sometimes referred to as software wallets.</p><p>Desktop wallets keep a user’s private keys stored on the computer’s hard drive. Desktop wallets are relatively easy to use. Examples include Exodus Wallet and Atomic Wallet for multiple digital assets or Electrum and Bitcoin<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/bitcoin-bitcoin/">bitcoin</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/bitcoin-bitcoin/">+0.5%</a><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/bitcoin-btc/">BTC</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/bitcoin-btc/">0.0%</a> Core specifically for the Bitcoin network.</p><p>Unfortunately, desktop wallets can be susceptible to malware. A trend with non-custodial wallets is that your assets are as secure as your individual security practices– and people fall victim to phishing scams quite regularly. Between 2019 and 2020, hackers stole over $22 million of bitcoin from Electrum wallets by sending users fake messages telling them to update their software. When this was done, malware was installed that stole their funds the next time they logged into their desktop wallets. Such events can be avoided by retaining the official version of the software or only downloading updates from the official website.</p><p>Another kind of hot wallet is web-based. Web wallets include MetaMask, Phantom and Trust Wallet. Coinbase also offers a version for users that prefer self-custody. These wallets do not store private keys or personal information. They also allow users to sign transactions and interact with blockchain protocols. In addition, many popular decentralized applications have built integrations with these wallets to make it easy for users to access their crypto holdings when using them. For these reasons, they are the most popular type of non-custodial wallet. Like desktop wallets, they can also be subject to phishing scams and malware.</p><h2 id="h-cold-wallets" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Cold Wallets</strong></h2><p>Storing your digital assets offline begins with choosing a hardware wallet. The most popular manufacturers are Ledger and Trezor. Though nefarious actors have been known to try to steal crypto by tampering hardware wallet devices, sometimes by compromising their supply chains, offline storage is by far the most secure because there is no internet connection involved.</p><p>With cold wallets, your crypto is as safe as your personal security practices. Theft, loss and physical destruction of the device does not have to mean a permanent loss of assets, as the seed phrase coupled with a new device can be used to recover the funds on a new device. However, theft or loss of both seed phrase and device usually means the assets are not recoverable. If maintaining physical custody sounds stressful, perhaps a custodial wallet or desktop wallet are options to consider.</p><p>One common security approach is to rely on custodial or software wallets for digital assets that will be used in the near<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/near-protocol-near/">near</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/digital-assets/assets/near-protocol-near/">-2%</a> future and cold storage for long-term savings in a manner similar to checkings and savings accounts with a bank.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Conclusion</strong></h2><p>Crypto wallet options are a lot like storing physical gold. Some people don’t trust in their own ability to keep the metal secure in a safe at home. They can forget the combination or a thief who found it written down could access the gold. To avoid such anxiety, this kind of person would outsource crypto storage to a third party and have a custodial wallet, though that brings the risk of government confiscation.</p><p>“Not your keys, not your coins” is a common refrain among digital-asset aficionados who dislike third-party custody; but let’s be honest, the horror stories of people losing millions of dollars worth of bitcoin by misplacing their private keys are enough for anyone to second guess their ability to self-custody their tokens.</p><p>Crypto owners should know their priorities and limitations. For those that only have or want a small amount of exposure, some exchanges are heavily regulated and prioritize security. Dealing with private keys and cold wallets is not for everyone. At the same time, having all your eggs in one basket may not be the safest bet, especially if it involves a large part of your net worth.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/5e0afbcc9e9e14b48f6bb5863450caab24b550baf9a86f33b61566273a6f9688.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Cryptocurrencies, Digital Dollars, and the Future of Money]]></title>
            <link>https://paragraph.com/@1nspiredbylife/cryptocurrencies-digital-dollars-and-the-future-of-money</link>
            <guid>h9Tfw9dTaW7x93ufSUzU</guid>
            <pubDate>Sat, 15 Jul 2023 10:09:56 GMT</pubDate>
            <description><![CDATA[Since the creation of Bitcoin in 2009, cryptocurrencies have exploded in popularity and are today collectively worth over $1 trillion.Critics say a lack of regulation has contributed to volatility in the nascent industry. In 2022, several cryptocurrencies and crypto firms collapsed, including industry heavyweight FTX, causing trillions of dollars in losses.Meanwhile, many governments are seeking to capitalize on the technology that powers cryptocurrencies by investing in their own digital cur...]]></description>
            <content:encoded><![CDATA[<ul><li><p>Since the creation of Bitcoin in 2009, cryptocurrencies have exploded in popularity and are today collectively worth over $1 trillion.</p></li><li><p>Critics say a lack of regulation has contributed to volatility in the nascent industry. In 2022, several cryptocurrencies and crypto firms collapsed, including industry heavyweight FTX, causing trillions of dollars in losses.</p></li><li><p>Meanwhile, many governments are seeking to capitalize on the technology that powers cryptocurrencies by investing in their own digital currencies.</p></li></ul><h2 id="h-introduction" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Introduction</h2><p>In the span of a few years, cryptocurrencies have grown from digital novelties to trillion-dollar technologies with the potential to disrupt the global financial system. Bitcoin and hundreds of other cryptocurrencies are increasingly held as investments and used as currencies to buy a swath of goods and services, such as software, digital real estate, and illegal drugs.</p><p>To their proponents, cryptocurrencies are a democratizing force, wresting the power of money creation and control from central banks and Wall Street. Critics, however, say that a lack of regulation for cryptocurrencies empowers criminal groups, terrorist organizations, and rogue states, while the assets themselves stoke inequality, suffer from drastic market volatility, and consume vast amounts of electricity. Regulations vary considerably around the world, with some governments embracing cryptocurrencies and others banning or limiting their use. As of February 2023, 114 countries, including the United States, are considering introducing their own central bank digital currencies (CBDCs) to compete with the cryptocurrency boom.</p><h2 id="h-what-are-cryptocurrencies" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What are cryptocurrencies?</h2><p>So called for their use of cryptography principles to mint virtual coins, cryptocurrencies are typically exchanged on decentralized computer networks between people with virtual wallets. These transactions are recorded publicly on distributed, tamper-proof ledgers <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.youtube.com/watch?v=_160oMzblY8">known as blockchains</a>. This open-source framework prevents coins from being duplicated and eliminates the need for a central authority such as a bank to validate transactions. Bitcoin, created in 2009 by the pseudonymous software engineer Satoshi Nakamoto, is by far the most prominent cryptocurrency, and its market capitalization has peaked at over $1 trillion. Numerous others, including Ethereum, the second-most popular, have proliferated in recent years.</p><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"></h3><p>Cryptocurrency users send funds between digital wallet addresses. These transactions are then recorded into a sequence of numbers known as a “block” and confirmed across the network. Blockchains do not record real names or physical addresses, only the transfers between digital wallets, and thus confer a degree of anonymity on users. Some cryptocurrencies, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.getmonero.org/">such as Monero</a>, claim to provide additional privacy. However, if the identity of a wallet owner becomes known, their transactions can be traced.</p><p>Bitcoin “miners” earn coins by organizing these blocks, thereby validating transactions on the network; the process requires a system known as “proof of work,” based on using computers to solve math problems. Many cryptocurrencies use this method, but Ethereum and some others instead use a validation mechanism known as “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/">proof of stake</a>.” In Bitcoin’s case, a transaction block is added to the chain every ten minutes, at which point new Bitcoin is awarded. (The reward decreases steadily over time.) The total supply of Bitcoin is capped at twenty-one million coins, but not all cryptocurrencies have such a constraint.</p><p>The prices of Bitcoin and many other cryptocurrencies vary based on global supply and demand. However, the values of some cryptocurrencies are fixed because they are backed by other assets, thus earning them the name “stablecoins.” While these coins tend to claim a peg to a traditional currency, such as $1 per coin, many such currencies were knocked from their pegs during a spate of volatility in 2022.</p><h2 id="h-why-are-they-popular" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why are they popular?</h2><p>Once dismissed as a fringe interest of tech evangelists, cryptocurrencies—particularly Bitcoin—have skyrocketed to mainstream popularity and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/en/global-charts">trillion dollar valuations</a>. In November 2021, the price of Bitcoin surged to more than $60,000 for the first time. (By February 2023, it had fallen to $23,000.) As of mid 2022, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cnbc.com/2022/03/31/cryptocurrency-news-21percent-of-adults-have-traded-or-used-crypto-nbc-poll-shows.html">an estimated 20 percent</a> of U.S. adults polled by NBC News had invested in, traded, or used cryptocurrency.</p><p>Different currencies have different appeals, but the popularity of cryptocurrencies largely stems from their decentralized nature: They can be transferred relatively quickly and anonymously, even across borders, without the need for a bank that could block the transaction or charge a fee. Dissidents in authoritarian countries <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.themoscowtimes.com/2021/02/11/russian-opposition-finds-refuge-in-bitcoin-a72907">have raised funds</a> in Bitcoin to circumvent state controls, including to avoid <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/in-brief/one-year-war-ukraine-are-sanctions-against-russia-making-difference">U.S. sanctions on Russia</a>.</p><p>Some experts say that digital assets are primarily tools for investment. People buy cryptocurrencies “because of a speculative belief that these tokens are going to go up in the future, because a new future is being built on the blockchain,” says CFR Senior Fellow Sebastian Mallaby. “It’s a very risky bet, as the last twelve months have shown.”</p><p>The price of Bitcoin and other cryptocurrencies fluctuates wildly, and some experts say this limits their usefulness as a means of transaction. (Most buyers and sellers don’t want to accept payment in something whose value can change dramatically from day to day.) Nevertheless, some businesses accept Bitcoin. Many investors see Bitcoin as a speculative asset to hold over time, rather than make payments with, and it <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://seekingalpha.com/article/4434857-why-gold-and-bitcoin-are-popular">often draws comparisons to gold</a>. Some see Bitcoin as a hedge against inflation because the supply is permanently fixed unlike those of fiat currencies, which central banks can expand indefinitely. However, after Bitcoin plummeted amid stock market volatility in 2022, many <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cnbc.com/2022/07/08/why-bitcoin-doesnt-seem-to-be-a-hedge-against-inflation.html">experts questioned this argument</a>. The valuation of other cryptocurrencies can be harder to explain, though many are associated with a larger project within the digital asset industry. Some cryptocurrencies, such as Dogecoin, were created as jokes, but have retained value and garnered investment from high profile investors.</p><p>In countries with historically weak currencies, including several Latin American and African countries, Bitcoin has become popular with populist leaders. In 2021, El Salvador made waves by becoming the first country to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/in-brief/what-does-cryptocurrency-decline-mean-bitcoin-countries">make Bitcoin legal tender</a> (residents can pay taxes and settle debts with it), though the move has sparked protests. Some politicians in other parts of the region have <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://fortune.com/2021/06/28/free-bitcoin-legal-tender-el-salvador-mexico-panama-how-can-i-use-spend-crypto-uses/">expressed support for the idea</a>.</p><p>Stablecoins, meanwhile, have the potential to rival fiat currencies as the dominant form of payments, experts say. Their value is relatively stable, and they can be sent instantly without the transaction fees associated with credit cards or international remittance services such as Western Union. In addition, because stablecoins can be used by anyone with a smartphone, they represent an opportunity to bring millions of people who lack traditional bank accounts into the financial system. However, they have drawn increased scrutiny from regulators, especially after <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.richmondfed.org/publications/research/economic_brief/2022/eb_22-24">several stablecoins sunk below their $1 pegs</a> during 2022’s market volatility.</p><h2 id="h-what-is-defi" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What is “DeFi”?</h2><p>Cryptocurrencies and blockchains have given rise to a new constellation of “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://ethereum.org/en/defi/">decentralized finance</a>” or DeFi businesses and projects. Essentially the cryptocurrency version of Wall Street, DeFi aims to offer people access to financial services—borrowing, lending, and trading—without the need for legacy institutions such as banks and brokerages, which often take large commissions and other fees. Instead, “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.ibm.com/topics/smart-contracts">smart contracts</a>” automatically execute transactions when certain conditions are met. DeFi is <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.wsj.com/articles/defi-is-helping-to-fuel-the-crypto-market-boomand-its-recent-volatility-11622712602?mod=article_inline">surging in popularity</a>, with investors pouring tens of billions of dollars into the sector.</p><p>Most DeFi apps are built on the Ethereum blockchain. Because of its usefulness in tracking transactions, blockchain technology has a range of potential applications beyond cryptocurrency, experts say, such as facilitating real estate deals and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.mercatus.org/system/files/mcdaniel-blockchain-trade-mercatus-research-v2.pdf">international trade</a> [PDF].</p><p>“You can imagine a new kind of financial system being constructed out of blockchain-based tokens that have advantages over the old, centralized kinds of money. You trust the code, and you trust the blockchain and the decentralized ledger, and it’s a new way of organizing finance,” says CFR’s Mallaby.</p><h4 id="h-are-cryptocurrencies-still-the-future-of-money" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">Are Cryptocurrencies Still the Future of Money?</h4><h2 id="h-what-challenges-has-this-created" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What challenges has this created?</h2><p>Cryptocurrencies have also given rise to a new set of challenges for governments to contend with, including concerns over criminal activity, environmental harms, and consumer protection.</p><p><em>Illicit activities.</em> In recent years, cybercriminals have increasingly carried out ransomware attacks, by which they infiltrate and shut down computer networks and then demand payment to restore them, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.npr.org/2021/06/10/1004874311/how-bitcoin-has-fueled-ransomware-attacks">often in cryptocurrency</a>. Drug cartels and money launderers are also “increasingly incorporating virtual currency” into their activities, according to the U.S. Drug Enforcement Agency’s (DEA) most recent annual assessment. U.S. and European authorities <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.wired.com/2013/11/silk-road/">have shut down</a> a number of so-called darknet markets—websites where anonymous individuals can use cryptocurrency to buy and sell illegal goods and services, primarily narcotics. Critics say these <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/blog/north-koreas-cryptocurrency-craze-and-its-impact-us-policy">enforcement efforts have fallen short</a>, exemplified by the theft of over $1 billion in cryptocurrency by a North Korean hacking group in 2022.</p><p><em>Terrorism and sanctions evasion.</em> The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/backgrounder/dollar-worlds-currency">primacy of the U.S. dollar</a> has provided the United States unrivaled power to impose crippling economic sanctions. However, states including Iran, North Korea, and Russia are increasingly <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.csis.org/analysis/cryptocurrencies-and-us-sanctions-evasion-implications-russia">using cryptocurrency to evade U.S. sanctions</a>. Meanwhile, terrorist groups such as the self-proclaimed Islamic State, al-Qaeda, and the military wing of the Palestinian organization Hamas also traffic in cryptocurrency.</p><p><em>Environmental harms.</em> Bitcoin mining is an enormously energy-intensive process: the network now consumes <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.nytimes.com/interactive/2021/09/03/climate/bitcoin-carbon-footprint-electricity.html">more electricity than many countries</a>. This has sparked fears about the cryptocurrency’s contribution to climate change. Cryptocurrency proponents say this problem can be solved using renewable energy; El Salvador’s president has pledged to use volcanic energy to mine Bitcoin, for example. Environmental concerns reportedly prompted Ethereum’s move to a proof of stake model, which uses less energy.</p><p><em>Volatility and lack of regulation.</em> The rapid rise of cryptocurrencies and DeFi enterprises means that billions of dollars in transactions are now taking place in a relatively unregulated sector, raising concerns about fraud, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cnbc.com/2021/05/31/cryptocurrency-poses-a-significant-risk-of-tax-evasion.html">tax evasion</a>, and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bbc.com/news/technology-58331959">cybersecurity</a>, as well as broader financial stability. If cryptocurrencies become a dominant form of global payments, they could limit the ability of central banks, particularly those in smaller countries, to set monetary policy through control of the money supply.</p><p>After high levels of volatility diminished the value of several prominent cryptocurrencies in 2022, a handful of crypto firms were unable to pay back their lenders, which were primarily other crypto firms. Many borrowers and lenders declared bankruptcy, including FTX, at the time the world’s third-largest cryptocurrency exchange. The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.forbes.com/sites/qai/2022/12/13/what-happened-to-crypto-giant-ftx-a-detailed-summary-of-what-we-actually-know-here/?sh=392b04df60fa">collapse of FTX</a> and other firms resulted in tens of billions of dollars in losses to investors, though traditional financial firms were relatively unscathed.</p><h2 id="h-what-are-governments-doing-about-this" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What are governments doing about this?</h2><p>Many governments have taken a hands-off approach to crypto, but its rapid ascent and evolution, coupled with the rise of DeFi, has forced regulators to begin <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.nytimes.com/2021/09/05/us/politics/cryptocurrency-banking-regulation.html">crafting rules for the emerging sector</a>. Regulations vary widely around the world, with some governments embracing cryptocurrencies and others banning them outright. The challenge for regulators, experts say, is to develop rules that limit traditional financial risks without stifling innovation.</p><p>In the United States, policymakers have indicated they are slowly <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.vox.com/recode/22663312/coinbase-sec-cryptocurrency-bitcoin">moving to regulate </a>cryptocurrencies and the emerging DeFi sector. However, cryptocurrencies do not fit neatly into the existing regulatory framework, creating ambiguity that lawmakers will likely have to resolve. U.S. Securities and Exchange Commission (SEC) Chairman Gary Gensler has called the cryptocurrency sector a “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.reuters.com/technology/us-sec-chair-gensler-calls-congress-help-rein-crypto-wild-west-2021-08-03/">Wild West</a>,” and urged Congress to give the SEC greater powers. Federal Reserve Chairman Jerome Powell and Treasury Secretary Janet Yellen have both <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bloomberg.com/news/articles/2021-07-19/yellen-tells-regulators-to-act-quickly-on-stablecoin-rules?sref=vxSzVDP0">called for stronger regulations</a> of stablecoins. But regulators have thus far been reluctant to extend crypto investors the same protections that exist in more traditional finance, such as deposit insurance. “If you buy crypto-assets and the price goes to zero at some point, please don’t be surprised and don’t expect taxpayers to socialize your losses,” the Federal Reserve Board of Governors’ Christopher J. Waller said in 2023.</p><p>To limit illicit activities, authorities have targeted the exchanges that allow users to convert cryptocurrencies to U.S. dollars and other national currencies. Under <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.federalreserve.gov/newsevents/speech/waller20230210a.htm">pressure from regulators</a>, major exchanges including Coinbase, Binance, and Gemini adhere to “know your customer” and other anti–money laundering requirements. Law enforcement and intelligence agencies, meanwhile, have learned to leverage the traceability of most cryptocurrencies by using blockchains to analyze and track criminal activity. For example, some of the ransom paid to the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/podcasts/colonial-pipeline-hack-robert-k-knake">Colonial Pipeline hackers</a> was later recovered by the FBI. In August 2022, the Treasury Department <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://home.treasury.gov/news/press-releases/jy0916">announced a crackdown</a> on so-called cryptocurrency mixers that criminals can use to anonymize transactions on the blockchain, calling them a “threat to U.S. national security.”</p><p>China, which accounts for most of the world’s Bitcoin mining, has moved aggressively to crack down on cryptocurrencies. In September 2021, Chinese authorities announced a sweeping ban on all crypto transactions and mining, causing the price of some cryptocurrencies to fall sharply in the immediate aftermath. According to the U.S. Law Library of Congress, eight other countries (Algeria, Bangladesh, Egypt, Iraq, Morocco, Nepal, Qatar, and Tunisia) have <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://tile.loc.gov/storage-services/service/ll/llglrd/2021687419/2021687419.pdf">banned cryptocurrencies</a> [PDF], while dozens more have sought to restrict adoption of digital assets. Still, most governments have so far taken a relatively limited approach.</p><h2 id="h-what-is-a-central-bank-digital-currency" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What is a central bank digital currency?</h2><p>In an effort to assert sovereignty, many central banks, including the U.S. Federal Reserve, are considering <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.economist.com/special-report/2021/05/06/when-central-banks-issue-digital-money">introducing their own digital cash</a>, known as a central bank digital currency (CBDC). For proponents, CBDCs promise the speed and other benefits of cryptocurrency without the associated risks. Dozens of countries—together representing more than 90 percent of the global economy—are <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.atlanticcouncil.org/cbdctracker/">exploring CBDCs</a>. Eleven countries have fully launched CBDCs. All are lower-income and ten are in the Caribbean (Nigeria is the eleventh). Since piloting a digital yuan in 2019, China is now expected to extend its CBDC pilot program to its population of over one billion by the end of 2023. In the United States, there is reportedly <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.nytimes.com/2021/08/05/business/economy/fed-digital-currency.html">disagreement among Fed officials</a> over the need for a digital dollar.</p><p>Experts say interest in CBDCs intensified in 2019 when Facebook announced it would <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://techcrunch.com/2019/06/18/facebook-libra/">create its own digital currency</a> called Libra, potentially offering a new payment option for its more than two billion users. (The company has since <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.ft.com/content/79376464-72b5-41fa-8f14-9f308acaf83b">scaled back the project</a>, renamed Diem.) China is another motivating factor: A digital yuan could give Beijing <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.wired.co.uk/article/digital-yuan-china-bitcoin-libra">even more control</a> over its economy and citizens, and threaten the U.S. dollar’s status as the favored international reserve currency, experts say.</p><p>One way to implement CBDCs would be for citizens to have <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.gwlr.org/wp-content/uploads/2021/01/89-Geo.-Wash.-L.-Rev.-113.pdf">accounts directly with the central bank</a> [PDF]. This would give governments powerful new ways of managing the economy—stimulus payments and other benefits could be credited to people directly, for example—and the central bank’s imprimatur would make CBDCs a safe digital asset to hold. But their introduction could also create new problems, experts say, by centralizing an enormous amount of power, data, and risk within a single bank and potentially compromising privacy and cybersecurity.</p><p>Some experts say the potential for CBDCs to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.economist.com/finance-and-economics/2020/12/05/will-central-bank-digital-currencies-break-the-banking-system">cut out commercial banks</a> as intermediaries carries risks, because these banks perform a critical economic role by creating and allocating credit (i.e., making loans). If people chose to bank directly with the Fed, that would require the central bank to either facilitate consumer borrowing, which it might not be equipped to do, or find new ways of injecting credit. For these reasons, some experts say private, regulated digital currencies are preferable to CBDCs.</p><h2 id="h-recommended-resources" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Recommended Resources</h2><p>In <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://bitcoin.org/bitcoin.pdf">this 2008 paper</a> [PDF], pseudonymous engineer Satoshi Nakomoto proposes Bitcoin, the first cryptocurrency.</p><p>In this free <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://ocw.mit.edu/courses/sloan-school-of-management/15-s12-blockchain-and-money-fall-2018/">Massachusetts Institute of Technology class</a>, SEC Chair Gary Gensler explores Bitcoin, blockchains, and money.</p><p>The <em>Economist</em> examines the potential <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.economist.com/briefing/2021/09/18/adventures-in-defi-land">benefits and risks of DeFi</a>.</p><p>For CFR’s <em>Asia Unbound</em> blog, Saher Naumaan <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cfr.org/blog/north-koreas-cryptocurrency-craze-and-its-impact-us-policy">assesses potential U.S. policy responses</a> to North Korean cryptocurrency theft.</p><p>The Atlantic Council <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.atlanticcouncil.org/cbdctracker/">tracks the status</a> of CBDCs around the world.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/bcd30e04140c272239380051de5acea19555e043d2ab0137fbdd4c7f22e1a284.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Is Cyberpunk?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-is-cyberpunk</link>
            <guid>e6oVbF0uLw1zHybLbHo9</guid>
            <pubDate>Sat, 15 Jul 2023 10:01:40 GMT</pubDate>
            <description><![CDATA[Cyberpunk is a sub-genre of science fiction that features advanced science and technology in an urban, dystopian future. On one side you have powerful mega-corporations and private security forces, and on the other you have the dark and gritty underworld of illegal trade, gangs, drugs, and vice. In between all of this is politics, corruption, and social upheaval.“High tech. Low life.”Cyberpunk is also a culture with attitude and a distinct style. Anti-authoritarian, brand-averse, tech-literat...]]></description>
            <content:encoded><![CDATA[<p><em>Cyberpunk is a sub-genre of science fiction that features advanced science and technology in an urban, dystopian future.  On one side you have powerful mega-corporations and private security forces, and on the other you have the dark and gritty underworld of illegal trade, gangs, drugs, and vice.  In between all of this is politics, corruption, and social upheaval.</em></p><blockquote><p><strong><em>“High tech.  Low life.”</em></strong></p></blockquote><p><em>Cyberpunk is also a culture with attitude and a distinct style.  Anti-authoritarian, brand-averse, tech-literate; these are just some of the qualities you may find in a cyberpunk.</em></p><p>It’s all there; high-tech, hard-boiled detective, femme fatale, a city at night.</p><p><em>Looking for a long answer?  Read on!</em></p><h1 id="h-cyberpunk-origins" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Cyberpunk Origins</h1><p><em>Cyberpunk began as a literary movement but has become a subcultural organism. “What is Cyberpunk?” is a complex and multi-layered question, whose answer is ever-changing as the subculture and our perception of the future changes. The tendrils, that began in the written word, have infiltrated beyond movies to all forms of art, fashion and philosophy generating an all-encompassing and ever-growing subculture.</em></p><p><em>There are number of ways to examine the origins of the cyberpunk movement. The term “cyberpunk” itself can be traced to the short story </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://www.infinityplus.co.uk/stories/cpunk.htm"><em>Cyberpunk</em></a><em> by Bruce Bethke. Then of course, there are the core cyberpunk authors that are generally accepted to have laid the ground work of the cyberpunk movement </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/William_Gibson"><em>William Gibson</em></a><em> (Gibson is considered the founder of Cyberpunk), </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Bruce_Sterling"><em>Bruce Sterling</em></a><em>, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Pat_Cadigan"><em>Pat Cadigan</em></a><em>, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Rudy_Rucker"><em>Rudy Rucker</em></a><em>, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/John_Shirley"><em>John Shirley</em></a><em> and </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Lewis_Shiner"><em>Lewis Shiner</em></a><em>. There are also a number of precursor novels that had strong themes and imagery that would be later associated with the cyberpunk genre such as The Demolished Man (1953) and The Stars My Destination (1956) by Alfred Bester, Do Androids Dream of Electric Sheep? (1968) by Phillip K. Dick, Dr. Adder (Written in 1972, but not published until 1984) by K.W. Jeter, Gravity’s Rainbow (1973) by Thomas Pynchon, The Shockwave Rider (1975) by John Brunner, and True Names (1981) by Vernor Vinge. More recently Neal Stephenson, author of Snow Crash (1992), is largely credited with bringing cyberpunk into the post-cyberpunk era.</em></p><p>William Gibson</p><p>Blade Runner</p><blockquote><p><strong><em>“I was afraid to watch Blade Runner in the theater because I was afraid the movie would be better than what I myself had been able to imagine. In a way, I was right to be afraid, because even the first few minutes were better.”</em></strong></p><p><strong><em>“I met Ridley Scott years later, maybe a decade or more after Blade Runner was released. I told him what Neuromancer was made of, and he had basically the same list of ingredients for Blade Runner.” – William Gibson</em></strong></p></blockquote><p><em>Blade Runner and Neuromancer were a convergence event that created the filmological and literary birth of a movement. Blade Runner influenced, and still does, all cyberpunk that would come after it visually, the same way that Neuromancer influenced, and still does, all cyberpunk literature. Cyberpunk never was just a literary genre.</em></p><h1 id="h-finding-a-definition" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Finding A Definition</h1><p><em>We can break down a basic definition of cyberpunk by dissecting the word itself. Cyber refers to technology, and is most often associated with cyberspace (this word was originally coined by William Gibson himself), and cybernetic enhancements to the body. But this can can also refer to other technologies such as biotechnology and nanotechnology for instance.</em></p><p><em>Punk, on the other hand, refers to the people and the attitude that cyberpunk has. Protagonists in cyberpunk tend to be outsiders, anti-heros, outcasts, criminals, visionaries, dissenters, and misfits. The underlying aspect that applies to all of these groups is their subversive nature.</em></p><p>One version of a cyberpunk from the in-development Cyberpunk 2077 game.</p><p><em>To subvert is to overthrow or undermine something. The cyberpunk genre itself subverted science fiction, and we never looked back. To be punk is to question authority, and to actively subvert any of that authority you don’t agree with. Different people do this in different ways, just as our cyberpunk protagonists do. An example is Motoko Kusanagi from the Ghost in the Shell franchise. On the surface she seems to be a tool and agent for the Japanese government.  This is true, but this is not what defines her, nor how she defines herself. Throughout the series she is not afraid to go rogue and take things into her own hands if it will get her closer to what she thinks is right – fuck the politicians. She is a subversive element within the government.</em></p><h1 id="h-the-essence-of-cyberpunk" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Essence Of Cyberpunk</h1><p><em>There are a number of quotes that help to illustrate the essence of cyberpunk:</em></p><blockquote><p><strong><em>“The future is already here — it’s just not very evenly distributed.” – William Gibson</em></strong></p></blockquote><p><em>This quote puts the cyber/punk and the “High Tech, Low Life,” dichotomy into context. There exists today high technology, but this technology has failed to erode away social divisions leaving a disparity between the classes which leads to social strife. In addition, although this technology exists the low class does not have the means by which to benefit from it, thus widening the divide as the rich elite get richer and thus have more access to technology.</em></p><p>The physically divided city of Hengsha from Deus Ex: Human Revolution.</p><blockquote><p><strong><em>“Anything that can be done to a rat can be done to a human being.” – Bruce Sterling</em></strong></p></blockquote><p><em>This is an important concept. We do terrible things to rats in the pursuit of progress, and we are not impervious to any of them. Many cyberpunk plots resolve around some sort of drug effect or brain tampering that we have, in reality, already done to rats. It’s just a matter of time before we start tampering with ourselves in the same ways. Rats are just the preview.</em></p><blockquote><p><strong><em>“The street finds it’s own use for things.” – William Gibson</em></strong></p></blockquote><p><em>This gets down to the punk/low life aspect of cyberpunk and puts it into the context of the open source, maker, and DIY movements. The rate of technological development is so fast that we generate a lot of stuff that is just there, and obsolete. These things lose their perceived value and are discarded, but then this refuse can be repurposed and used in ways that the original creators never would have imagined. Like </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://www.popsci.com/technology/article/2013-04/dvd-player-tests-hiv"><em>using a DVD player to test for HIV.</em></a></p><h1 id="h-cyberpunk-off-shoots" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Cyberpunk Off-Shoots</h1><p><em>Biopunk is a subgenre of cyberpunk, that focuses more on the biological technologies such as genetic manipulation. Often cited examples are Gattaca, and Dark Angel. These can be considered cyberpunk because although Biopunk tends to lack the cyberspace and cybernetic aspects that cyberpunk sports, it is faithful to the “High Tech, Low Life,” aspects. It is a different visualization of the same ideas.</em></p><p><em>Post-Cyberpunk is a modern reaction to the now antiquated visual qualities of ’80s inspired cyberpunk. Post-Cyberpunk tends to have a greater focus on Transhumanism, space travel, and emerging technologies that weren’t imagined at the time of the ’80s.</em></p><h1 id="h-being-cyberpunk" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Being Cyberpunk</h1><p><em>A cyberpunk has attitude. This attitude is culturally and socially aware, just like the fiction from which they take their name. They question everything and anyone and decide for themselves what they believe is true. This path to understanding yields different world views and opinions, but diversity is key to a successful population. A cyberpunk knows that the system isn’t in your favor, and the deck is stacked against you. A cyberpunk knows how to hack the system so that doesn’t matter. Don’t fuck with a cyberpunk.</em></p><p><em>A cyberpunk has style. This style can be different for each person. It can be practical (Mil-Tec) or flashy (Cybergoth). The style often mirrors the cyberpunk personal philosophy and thus can vary drastically. There are recurring themes such as traditional punk, Blade Runner-inspired, Matrix-inspired, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://cyborganthropology.com/Cayce_Pollard_Unit"><em>CPUs</em></a><em>, Mil-Tec, and Cybergoth.</em></p><h1 id="h-when-is-cyberpunk" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">When Is Cyberpunk?</h1><p><em>Cyberpunk is now. Many of the things that were predicted in cyberpunk are coming to pass today. Improvements in prosthetics and brain computer interface have resulted in brain controlled prosthetics, a mainstay of cyberpunk. Corporations increasing dominate global politics, and influence culture creating a situation ripe for subversion. The poor are getting poorer and the rich are getting richer, creating a larger and larger divide. The cyberworld is ever merging with the real world through things such as the Internet of Things, social media, mobile technology, virtual reality, and augmented reality. Hackers have brought gangs, corporations, governments, and individuals to their knees. We have entered the cyberpunk age. Welcome.</em></p><p><em>Cyberpunk has spread to all forms of media, creating a subculture rather a simple genre. There are cyberpunk movies, television, comics, music, and art everywhere. All you have to do is look. Cyberpunk has influenced fashion, architecture, and philosophy. Cyberpunk has become much more than what it was when it began. And it will continue to evolve and become more relevant as we move further from the Cyberpunk Now into the Cyberpunk Future.</em></p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/8958740dc33cb2172cbe0b24e55a87c97bed4d31b98818425970328907d7b4cc.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[ Artificial Intelligence(AI)]]></title>
            <link>https://paragraph.com/@1nspiredbylife/artificial-intelligence-ai</link>
            <guid>eCdyfPEnGUFDTuCoJu41</guid>
            <pubDate>Sun, 09 Jul 2023 05:44:15 GMT</pubDate>
            <description><![CDATA[How does AI work?As the hype around AI has accelerated, vendors have been scrambling to promote how their products and services use it. Often, what they refer to as AI is simply a component of the technology, such as machine learning. AI requires a foundation of specialized hardware and software for writing and training machine learning algorithms. No single programming language is synonymous with AI, but Python, R, Java, C++ and Julia have features popular with AI developers. In general, AI ...]]></description>
            <content:encoded><![CDATA[<h3 id="h-how-does-ai-work" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>How does AI work?</strong></h3><p>As the hype around AI has accelerated, vendors have been scrambling to promote how their products and services use it. Often, what they refer to as AI is simply a component of the technology, such as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML">machine learning</a>. AI requires a foundation of specialized hardware and software for writing and training machine learning algorithms. No single programming language is synonymous with AI, but Python, R, Java, C++ and Julia have features popular with AI developers.</p><p>In general, AI systems work by ingesting large amounts of labeled training data, analyzing the data for correlations and patterns, and using these patterns to make predictions about future states. In this way, a chatbot that is fed examples of text can learn to generate lifelike exchanges with people, or an image recognition tool can learn to identify and describe objects in images by reviewing millions of examples. New, rapidly improving <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/generative-AI">generative AI</a> techniques can create realistic text, images, music and other media.</p><p>AI programming focuses on cognitive skills that include the following:</p><ul><li><p><strong>Learning.</strong> This aspect of AI programming focuses on acquiring data and creating rules for how to turn it into actionable information. The rules, which are called <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/algorithm"><em>algorithms</em></a>, provide computing devices with step-by-step instructions for how to complete a specific task.</p></li><li><p><strong>Reasoning.</strong> This aspect of AI programming focuses on choosing the right algorithm to reach a desired outcome.</p></li><li><p><strong>Self-correction.</strong> This aspect of AI programming is designed to continually fine-tune algorithms and ensure they provide the most accurate results possible.</p></li><li><p><strong>Creativity.</strong> This aspect of AI uses neural networks, rules-based systems, statistical methods and other AI techniques to generate new images, new text, new music and new ideas.</p></li></ul><h4 id="h-differences-between-ai-machine-learning-and-deep-learning" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>Differences between AI, machine learning and deep learning</strong></h4><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/tip/AI-vs-machine-learning-vs-deep-learning-Key-differences"><em>AI</em>, <em>machine learning</em> and <em>deep learning</em> are common terms</a> in enterprise IT and sometimes used interchangeably, especially by companies in their marketing materials. But there are distinctions. The term <em>AI,</em> coined in the 1950s, refers to the simulation of human intelligence by machines. It covers an ever-changing set of capabilities as new technologies are developed. Technologies that come under the umbrella of AI include machine learning and deep learning.</p><p>Machine learning enables software applications to become more accurate at predicting outcomes without being explicitly programmed to do so. Machine learning algorithms use historical data as input to predict new output values. This approach became vastly more effective with the rise of large data sets to train on. Deep learning, a subset of machine learning, is based on our understanding of how the brain is structured. Deep learning&apos;s use of artificial neural networks structure is the underpinning of recent advances in AI, including self-driving cars and ChatGPT.</p><h3 id="h-why-is-artificial-intelligence-important" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Why is artificial intelligence important?</strong></h3><p>AI is important for its potential to change how we live, work and play. It has been effectively used in business to automate tasks done by humans, including customer service work, lead generation, fraud detection and quality control. In a number of areas, AI can perform tasks much better than humans. Particularly when it comes to repetitive, detail-oriented tasks, such as analyzing large numbers of legal documents to ensure relevant fields are filled in properly, AI tools often complete jobs <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/feature/6-key-benefits-of-AI-for-business">quickly and with relatively few errors</a>. Because of the massive data sets it can process, AI can also give enterprises insights into their operations they might not have been aware of. The rapidly expanding population of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/feature/AI-content-generators-to-explore">generative AI tools</a> will be important in fields ranging from education and marketing to product design.</p><p><strong>THIS ARTICLE IS PART OF</strong></p><h3 id="h-a-guide-to-artificial-intelligence-in-the-enterprise" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/Ultimate-guide-to-artificial-intelligence-in-the-enterprise"><strong>A guide to artificial intelligence in the enterprise</strong></a></h3><ul><li><p>Which also includes:</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/tip/The-future-of-AI-What-to-expect-in-the-next-5-years"><strong>The future of AI: What to expect in the next 5 years</strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/tip/Types-of-AI-algorithms-and-how-they-work"><strong>Types of AI algorithms and how they work</strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/feature/AI-regulation-What-businesses-need-to-know"><strong>AI regulation: What businesses need to know in 2023</strong></a></p></li></ul><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/pro/Ultimate-Guide-to-Artificial-Intelligence-in-The-Enterprise?offer=Content_OTHR-PillarPage_Aguidetoartificialintelligenceintheenterprise">DOWNLOAD1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/pro/Ultimate-Guide-to-Artificial-Intelligence-in-The-Enterprise?offer=Content_OTHR-PillarPage_Aguidetoartificialintelligenceintheenterprise"><strong>Download this entire guide for FREE now!</strong></a></p><p>Indeed, advances in AI techniques have not only helped fuel an explosion in efficiency, but opened the door to entirely new business opportunities for some larger enterprises. Prior to the current wave of AI, it would have been hard to imagine using computer software to connect riders to taxis, but Uber has become a Fortune 500 company by doing just that.</p><p>AI has become central to many of today&apos;s largest and most successful companies, including Alphabet, Apple, Microsoft and Meta, where AI technologies are used to improve operations and outpace competitors. At Alphabet subsidiary Google, for example, AI is central to its search engine, Waymo&apos;s self-driving cars and Google Brain, which invented the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/feature/Transformer-neural-networks-are-shaking-up-AI">transformer neural network</a> architecture that underpins the recent breakthroughs in natural language processing.</p><h3 id="h-what-are-the-advantages-and-disadvantages-of-artificial-intelligence" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>What are the advantages and disadvantages of artificial intelligence?</strong></h3><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/neural-network">Artificial neural networks</a> and deep learning AI technologies are quickly evolving, primarily because AI can process large amounts of data much faster and make predictions more accurately than humanly possible.</p><p>While the huge volume of data created on a daily basis would bury a human researcher, AI applications using machine learning can take that data and quickly turn it into actionable information. As of this writing, a primary disadvantage of AI is that it is expensive to process the large amounts of data AI programming requires. As AI techniques are incorporated into more products and services, organizations must also be attuned to AI&apos;s potential to create biased and discriminatory systems, intentionally or inadvertently.</p><h4 id="h-advantages-of-ai" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">Advantages of AI</h4><p>The following are some advantages of AI.</p><ul><li><p><strong>Good at detail-oriented jobs.</strong> AI has proven to be as good or better than doctors at diagnosing certain cancers, including <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.nytimes.com/2023/03/05/technology/artificial-intelligence-breast-cancer-detection.html">breast cancer</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.curemelanoma.org/blog/article/artificial-intelligence-and-melanoma-detection-closing-the-gaps">melanoma</a>.</p></li><li><p><strong>Reduced time for data-heavy tasks.</strong> AI is widely used in data-heavy industries, including banking and securities, pharma and insurance, to reduce the time it takes to analyze big data sets. Financial services, for example, routinely use AI to process loan applications and detect fraud.</p></li><li><p><strong>Saves labor and increases productivity.</strong> An example here is the use of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/feature/How-warehouse-automation-robotics-transformed-the-supply-chain">warehouse automation</a>, which grew during the pandemic and is expected to increase with the integration of AI and machine learning.</p></li><li><p><strong>Delivers consistent results.</strong> The best AI translation tools deliver high levels of consistency, offering even small businesses the ability to reach customers in their native language.</p></li><li><p><strong>Can improve customer satisfaction through personalization.</strong> AI can personalize content, messaging, ads, recommendations and websites to individual customers.</p></li><li><p><strong>AI-powered virtual agents are always available.</strong> AI programs do not need to sleep or take breaks, providing 24/7 service.</p></li></ul><h4 id="h-disadvantages-of-ai" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">Disadvantages of AI</h4><p>The following are some disadvantages of AI.</p><ul><li><p>Expensive.</p></li><li><p>Requires deep technical expertise.</p></li><li><p>Limited supply of qualified workers to build AI tools.</p></li><li><p>Reflects the biases of its training data, at scale.</p></li><li><p>Lack of ability to generalize from one task to another.</p></li><li><p>Eliminates human jobs, increasing unemployment rates.</p></li></ul><h3 id="h-strong-ai-vs-weak-ai" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Strong AI vs. weak AI</strong></h3><p>AI can be categorized as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/narrow-AI-weak-AI">weak</a> or <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/artificial-general-intelligence-AGI">strong</a>.</p><ul><li><p><strong>Weak AI</strong>, also known as <em>narrow AI</em>, is designed and trained to complete a specific task. Industrial robots and virtual personal assistants, such as Apple&apos;s Siri, use weak AI.</p></li><li><p><strong>Strong AI</strong>, also known as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/artificial-general-intelligence-AGI"><em>artificial general intelligence (AGI)</em></a>, describes programming that can replicate the cognitive abilities of the human brain. When presented with an unfamiliar task, a strong AI system can use <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/fuzzy-logic">fuzzy logic</a> to apply knowledge from one domain to another and find a solution autonomously. In theory, a strong AI program should be able to pass both a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/Turing-test">Turing test</a> and the Chinese Room argument.</p></li></ul><h3 id="h-what-are-the-4-types-of-artificial-intelligence" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>What are the 4 types of artificial intelligence?</strong></h3><p>Arend Hintze, an assistant professor of integrative biology and computer science and engineering at Michigan State University, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.govtech.com/computing/Understanding-the-Four-Types-of-Artificial-Intelligence.html">explained</a> that AI can be categorized into four types, beginning with the task-specific intelligent systems in wide use today and progressing to sentient systems, which do not yet exist. The categories are as follows.</p><ul><li><p><strong>Type 1: Reactive machines.</strong> These AI systems have no memory and are task-specific. An example is Deep Blue, the IBM chess program that beat Garry Kasparov in the 1990s. Deep Blue can identify pieces on a chessboard and make predictions, but because it has no memory, it cannot use past experiences to inform future ones.</p></li><li><p><strong>Type 2: Limited memory.</strong> These AI systems have memory, so they can use past experiences to inform future decisions. Some of the decision-making functions in <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/driverless-car">self-driving cars</a> are designed this way.</p></li><li><p><strong>Type 3: Theory of mind.</strong> Theory of mind is a psychology term. When applied to AI, it means the system would have the social intelligence to understand emotions. This type of AI will be able to infer human intentions and predict behavior, a necessary skill for AI systems to become integral members of human teams.</p></li><li><p><strong>Type 4:</strong> <strong>Self-awareness.</strong> In this category, AI systems have a sense of self, which gives them consciousness. Machines with self-awareness understand their own current state. This type of AI does not yet exist.</p></li></ul><p>DAVID PETERSSON</p><p>These are commonly described as the four main types of AI.</p><h3 id="h-what-are-examples-of-ai-technology-and-how-is-it-used-today" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>What are examples of AI technology and how is it used today?</strong></h3><p>AI is incorporated into a variety of different types of technology. Here are seven examples.</p><p><strong>Automation.</strong> When paired with AI technologies, automation tools can expand the volume and types of tasks performed. An example is robotic process automation (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcio/definition/RPA">RPA</a>), a type of software that automates repetitive, rules-based data processing tasks traditionally done by humans. When combined with machine learning and emerging AI tools, RPA can automate bigger portions of enterprise jobs, enabling RPA&apos;s tactical bots to pass along intelligence from AI and respond to process changes.</p><p><strong>Machine learning.</strong> This is the science of getting a computer to act without programming. Deep learning is a subset of machine learning that, in very simple terms, can be thought of as the automation of predictive analytics. There are three types of machine learning algorithms:</p><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/supervised-learning"><strong>Supervised learning</strong></a><strong>.</strong> Data sets are labeled so that patterns can be detected and used to label new data sets.</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/unsupervised-learning"><strong>Unsupervised learning</strong></a><strong>.</strong> Data sets aren&apos;t labeled and are sorted according to similarities or differences.</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/reinforcement-learning"><strong>Reinforcement learning</strong></a><strong>.</strong> Data sets aren&apos;t labeled but, after performing an action or several actions, the AI system is given feedback.</p></li></ul><p><strong>Machine vision.</strong> This technology gives a machine the ability to see. Machine vision captures and analyzes visual information using a camera, analog-to-digital conversion and digital signal processing. It is often compared to human eyesight, but machine vision isn&apos;t bound by biology and can be programmed to see through walls, for example. It is used in a range of applications from signature identification to medical image analysis. <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/ehandbook/Computer-vision-AI-looks-beyond-the-narrow-into-the-mainstream">Computer vision</a>, which is focused on machine-based image processing, is often conflated with machine vision.</p><p><strong>Natural language processing (NLP).</strong> This is the processing of human language by a computer program. One of the older and best-known examples of NLP is spam detection, which looks at the subject line and text of an email and decides if it&apos;s junk. Current approaches to NLP are based on machine learning. NLP tasks include text translation, sentiment analysis and speech recognition.</p><p><strong>Robotics.</strong> This field of engineering focuses on the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/robotics">design and manufacturing of robots</a>. Robots are often used to perform tasks that are difficult for humans to perform or perform consistently. For example, robots are used in car production assembly lines or by NASA to move large objects in space. Researchers also use machine learning to build robots that can interact in social settings.</p><p><strong>Self-driving cars.</strong> Autonomous vehicles use a combination of computer vision, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/image-recognition">image recognition</a> and deep learning to build automated skills to pilot a vehicle while staying in a given lane and avoiding unexpected obstructions, such as pedestrians.</p><p><strong>Text, image and audio generation.</strong> Generative AI techniques, which create various types of media from text prompts, are being applied extensively across businesses to create a seemingly limitless range of content types from photorealistic art to email responses and screenplays.</p><p>AI is not just one technology.</p><h3 id="h-what-are-the-applications-of-ai" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>What are the applications of AI?</strong></h3><p>Artificial intelligence has made its way into a wide variety of markets. Here are 11 examples.</p><p><strong>AI in healthcare.</strong> The biggest bets are on improving patient outcomes and reducing costs. Companies are applying machine learning to make better and faster medical diagnoses than humans. One of the best-known healthcare technologies is IBM Watson. It understands natural language and can respond to questions asked of it. The system mines patient data and other available data sources to form a hypothesis, which it then presents with a confidence scoring schema. Other AI applications include using online virtual health assistants and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcustomerexperience/definition/chatbot">chatbots</a> to help patients and healthcare customers find medical information, schedule appointments, understand the billing process and complete other administrative processes. An array of AI technologies is also being used to predict, fight and understand <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchbusinessanalytics/feature/AI-tools-in-analytics-software-key-in-fighting-COVID-19">pandemics such as COVID-19</a>.</p><p><strong>AI in business.</strong> Machine learning algorithms are being integrated into analytics and customer relationship management (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcustomerexperience/definition/CRM-customer-relationship-management">CRM</a>) platforms to uncover information on how to better serve customers. Chatbots have been incorporated into websites to provide immediate service to customers. The rapid advancement of generative AI technology such as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/ChatGPT">ChatGPT</a> is expected to have far-reaching consequences: eliminating jobs, revolutionizing product design and disrupting business models.</p><p><strong>AI in education.</strong> AI can automate grading, giving educators more time for other tasks. It can <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcio/podcast/Cognitive-tutor-could-teach-employees-new-skills">assess students and adapt to their needs</a>, helping them work at their own pace. AI tutors can provide additional support to students, ensuring they stay on track. The technology could also change where and how students learn, perhaps even replacing some teachers. As demonstrated by ChatGPT, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/Google-Bard">Bard</a> and other large language models, generative AI can help educators craft course work and other teaching materials and engage students in new ways. The advent of these tools also forces educators to rethink student homework and testing and revise policies on plagiarism.</p><p><strong>AI in finance.</strong> AI in personal finance applications, such as Intuit Mint or TurboTax, is disrupting financial institutions. Applications such as these collect personal data and provide financial advice. Other programs, such as IBM Watson, have been applied to the process of buying a home. Today, artificial intelligence software performs much of the trading on Wall Street.</p><p><strong>AI in law.</strong> The discovery process -- sifting through documents -- in law is often overwhelming for humans. Using AI to help automate the legal industry&apos;s labor-intensive processes is saving time and improving client service. Law firms use machine learning to describe data and predict outcomes, computer vision to classify and extract information from documents, and NLP to interpret requests for information.</p><p><strong>AI in entertainment and media.</strong> The entertainment business uses AI techniques for targeted advertising, recommending content, distribution, detecting fraud, creating scripts and making movies. Automated journalism helps newsrooms streamline media workflows reducing time, costs and complexity. Newsrooms use AI to automate routine tasks, such as data entry and proofreading; and to research topics and assist with headlines. How journalism can reliably use ChatGPT and other generative AI to generate content is <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://reutersinstitute.politics.ox.ac.uk/news/chatgpt-threat-or-opportunity-journalism-five-ai-experts-weigh">open to question</a>.</p><p><strong>AI in software coding and IT processes.</strong> New generative AI tools can be used to produce application code based on natural language prompts, but it is early days for these tools and unlikely they will replace software engineers soon. AI is also being used to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchitoperations/news/365532540/How-ChatGPT-and-generative-AI-will-affect-IT-operations">automate many IT processes</a>, including data entry, fraud detection, customer service, and predictive maintenance and security.</p><p><strong>Security.</strong> AI and machine learning are at the top of the buzzword list security vendors use to market their products, so buyers should approach with caution. Still, AI techniques are being successfully applied to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/tip/How-AI-is-used-to-ensure-cybersecurity">multiple aspects of cybersecurity</a>, including anomaly detection, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchnetworking/tip/Reducing-false-positives-in-network-monitoring">solving the false-positive problem</a> and conducting behavioral threat analytics. Organizations use machine learning in security information and event management (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM">SIEM</a>) software and related areas to detect anomalies and identify suspicious activities that indicate threats. By analyzing data and using logic to identify similarities to known malicious code, AI can provide alerts to new and emerging attacks much sooner than human employees and previous technology iterations.</p><p><strong>AI in manufacturing.</strong> Manufacturing has been at the forefront of incorporating robots into the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcio/definition/workflow">workflow</a>. For example, the industrial robots that were at one time programmed to perform single tasks and separated from human workers, increasingly function as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/collaborative-robot-cobot">cobots</a>: Smaller, multitasking robots that collaborate with humans and take on responsibility for more parts of the job in warehouses, factory floors and other workspaces.</p><p><strong>AI in banking.</strong> Banks are successfully employing chatbots to make their customers aware of services and offerings and to handle transactions that don&apos;t require human intervention. AI virtual assistants are used to improve and cut the costs of compliance with banking regulations. Banking organizations use AI to improve their decision-making for loans, set credit limits and identify investment opportunities.</p><p><strong>AI in transportation.</strong> In addition to AI&apos;s fundamental role in operating autonomous vehicles, AI technologies are used in transportation to manage traffic, predict flight delays, and make ocean shipping safer and more efficient. In supply chains, AI is replacing traditional methods of forecasting demand and predicting disruptions, a trend accelerated by COVID-19 when many companies were caught off guard by the effects of a global pandemic on the supply and demand of goods.</p><h3 id="h-augmented-intelligence-vs-artificial-intelligence" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Augmented intelligence vs. artificial intelligence</strong></h3><p>Some industry experts have argued that the term <em>artificial intelligence</em> is too closely linked to popular culture, which has caused the general public to have improbable expectations about how AI will change the workplace and life in general. They have suggested using the term <em>augmented intelligence</em> to differentiate between AI systems that act autonomously -- popular culture examples include Hal 9000 and The Terminator -- and AI tools that support humans.</p><ul><li><p><strong>Augmented intelligence.</strong> Some researchers and marketers hope the label <em>augmented intelligence</em>, which has a more neutral connotation, will help people understand that most implementations of AI will be weak and simply improve products and services. Examples include automatically surfacing important information in business intelligence reports or highlighting important information in legal filings. The rapid adoption of ChatGPT and Bard across industry indicates a willingness to use AI to support human decision-making.</p></li><li><p><strong>Artificial intelligence.</strong> True AI, or AGI, is closely associated with the concept of the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/Singularity-the">technological singularity</a> -- a future ruled by an <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/artificial-superintelligence-ASI">artificial superintelligence</a> that far surpasses the human brain&apos;s ability to understand it or how it is shaping our reality. This remains within the realm of science fiction, though some developers are working on the problem. Many believe that technologies such as quantum computing could play an important role in making AGI a reality and that we should reserve the use of the term AI for this kind of general intelligence.</p></li></ul><h3 id="h-ethical-use-of-artificial-intelligence" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Ethical use of artificial intelligence</strong></h3><p>While AI tools present a range of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/tip/9-top-applications-of-artificial-intelligence-in-business">new functionality for businesses</a>, the use of AI also raises ethical questions because, for better or worse, an AI system will reinforce what it has already learned.</p><p>This can be problematic because machine learning algorithms, which underpin many of the most advanced AI tools, are only as smart as the data they are given in training. Because a human being selects what data is used to train an AI program, the potential for <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-bias-algorithm-bias-or-AI-bias">machine learning bias</a> is inherent and must be monitored closely.</p><p>Anyone looking to use machine learning as part of real-world, in-production systems needs to factor ethics into their AI training processes and strive to avoid bias. This is especially true when using AI algorithms that are inherently unexplainable in <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/deep-learning-deep-neural-network">deep learning</a> and generative adversarial network (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/generative-adversarial-network-GAN">GAN</a>) applications.</p><p>Explainability is a potential stumbling block to using AI in industries that operate under strict <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcio/definition/regulatory-compliance">regulatory compliance</a> requirements. For example, financial institutions in the United States operate under regulations that require them to explain their credit-issuing decisions. When a decision to refuse credit is made by AI programming, however, it can be difficult to explain how the decision was arrived at because the AI tools used to make such decisions operate by teasing out subtle correlations between thousands of variables. When the decision-making process cannot be explained, the program may be referred to as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/black-box-AI">black box AI</a>.</p><p>In summary, AI&apos;s ethical challenges include the following: <strong>bias</strong>, due to improperly trained algorithms and human bias; <strong>misuse</strong>, due to deepfakes and phishing; <strong>legal concerns</strong>, including AI libel and copyright issues; <strong>elimination of jobs</strong>; and <strong>data privacy concerns</strong>, particularly in the banking, healthcare and legal fields.</p><p>These components make up responsible AI use.</p><h3 id="h-ai-governance-and-regulations" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>AI governance and regulations</strong></h3><p>Despite potential risks, there are currently few regulations governing the use of AI tools, and where laws do exist, they typically pertain to AI indirectly. For example, as previously mentioned, U.S. Fair Lending regulations require financial institutions to explain credit decisions to potential customers. This limits the extent to which lenders can use deep learning algorithms, which by their nature are opaque and lack explainability.</p><p>The European Union&apos;s General Data Protection Regulation (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR">GDPR</a>) is considering AI regulations. GDPR&apos;s strict limits on how enterprises can use consumer data already limits the training and functionality of many consumer-facing AI applications.</p><p>Policymakers in the U.S. have yet to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchcio/news/365532338/Experts-call-for-AI-regulation-during-Senate-hearing">issue AI legislation</a>, but that could change soon. A &quot;Blueprint for an AI Bill of Rights&quot; published in October 2022 by the White House Office of Science and Technology Policy (OSTP) guides businesses on how to implement ethical AI systems. The U.S. Chamber of Commerce also called for AI regulations in a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.uschamber.com/technology/artificial-intelligence-commission-report">report</a> released in March 2023.</p><p>Crafting laws to regulate AI will not be easy, in part because AI comprises a variety of technologies that companies use for different ends, and partly because regulations can come at the cost of AI progress and development. The rapid evolution of AI technologies is another obstacle to forming meaningful regulation of AI, as are the challenges presented by AI&apos;s lack of transparency that make it difficult to see how the algorithms reach their results. Moreover, technology breakthroughs and novel applications such as ChatGPT and Dall-E can make existing laws instantly obsolete. And, of course, the laws that governments do manage to craft to regulate AI don&apos;t stop criminals from using the technology with malicious intent.</p><p>AI has had a long and sometimes controversial history from the Turing test in 1950 to today&apos;s generative AI chatbots like ChatGPT.</p><h3 id="h-what-is-the-history-of-ai" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>What is the history of AI?</strong></h3><p>The concept of inanimate objects endowed with intelligence has been around since ancient times. The Greek god Hephaestus was depicted in myths as forging robot-like servants out of gold. Engineers in ancient Egypt built statues of gods animated by priests. Throughout the centuries, thinkers from Aristotle to the 13th century Spanish theologian Ramon Llull to René Descartes and Thomas Bayes used the tools and logic of their times to describe human thought processes as symbols, laying the foundation for AI concepts such as general <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://groups.csail.mit.edu/medg/ftp/psz/k-rep.html">knowledge representation</a>.</p><p>The late 19th and first half of the 20th centuries brought forth the foundational work that would give rise to the modern computer. In 1836, Cambridge University mathematician Charles Babbage and Augusta Ada King, Countess of Lovelace, invented the first design for a programmable machine.</p><p><strong>1940s.</strong> Princeton mathematician John Von Neumann conceived the architecture for the stored-program computer -- the idea that a computer&apos;s program and the data it processes can be kept in the computer&apos;s memory. And Warren McCulloch and Walter Pitts laid the foundation for neural networks.</p><p><strong>1950s.</strong> With the advent of modern computers, scientists could test their ideas about machine intelligence. One method for determining whether a computer has intelligence was devised by the British mathematician and World War II code-breaker Alan Turing. The Turing test focused on a computer&apos;s ability to fool interrogators into believing its responses to their questions were made by a human being.</p><p><strong>1956.</strong> The modern field of artificial intelligence is widely cited as starting this year during a summer conference at Dartmouth College. Sponsored by the Defense Advanced Research Projects Agency (DARPA), the conference was attended by 10 luminaries in the field, including AI pioneers Marvin Minsky, Oliver Selfridge and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.computerweekly.com/news/2240106256/John-McCarthy-father-of-Artificial-Intelligence-and-creator-of-LISP-language-dies-aged-84">John McCarthy</a>, who is credited with coining the term <em>artificial intelligence</em>. Also in attendance were Allen Newell, a computer scientist, and Herbert A. Simon, an economist, political scientist and cognitive psychologist. The two presented their groundbreaking Logic Theorist, a computer program capable of proving certain mathematical theorems and referred to as the first AI program.</p><p><strong>1950s and 1960s.</strong> In the wake of the Dartmouth College conference, leaders in the fledgling field of AI predicted that a man-made intelligence equivalent to the human brain was around the corner, attracting major government and industry support. Indeed, nearly 20 years of well-funded basic research generated significant advances in AI: For example, in the late 1950s, Newell and Simon published the General Problem Solver (GPS) algorithm, which fell short of solving complex problems but laid the foundations for developing more sophisticated cognitive architectures; and McCarthy developed <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/LISP-list-processing">Lisp</a>, a language for AI programming still used today. In the mid-1960s, MIT Professor Joseph Weizenbaum developed ELIZA, an early NLP program that laid the foundation for today&apos;s chatbots.</p><p><strong>1970s and 1980s.</strong> The achievement of artificial general intelligence proved elusive, not imminent, hampered by limitations in computer processing and memory and by the complexity of the problem. Government and corporations backed away from their support of AI research, leading to a fallow period lasting from 1974 to 1980 known as the first &quot;<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/AI-winter">AI Winter</a>.&quot; In the 1980s, research on deep learning techniques and industry&apos;s adoption of Edward Feigenbaum&apos;s expert systems sparked a new wave of AI enthusiasm, only to be followed by another collapse of government funding and industry support. The second AI winter lasted until the mid-1990s.</p><p><strong>1990s.</strong> Increases in computational power and an explosion of data sparked an AI renaissance in the late 1990s that set the stage for the remarkable advances in AI we see today. The combination of big data and increased computational power propelled breakthroughs in NLP, computer vision, robotics, machine learning and deep learning. In 1997, as advances in AI accelerated, IBM&apos;s Deep Blue defeated Russian chess grandmaster Garry Kasparov, becoming the first computer program to beat a world chess champion.</p><p><strong>2000s.</strong> Further advances in machine learning, deep learning, NLP, speech recognition and computer vision gave rise to products and services that have shaped the way we live today. These include the 2000 launch of Google&apos;s search engine and the 2001 launch of Amazon&apos;s recommendation engine. Netflix developed its recommendation system for movies, Facebook introduced its facial recognition system and Microsoft launched its speech recognition system for transcribing speech into text. IBM launched Watson and Google started its self-driving initiative, Waymo.</p><p><strong>2010s.</strong> The decade between 2010 and 2020 saw a steady stream of AI developments. These include the launch of Apple&apos;s Siri and Amazon&apos;s Alexa voice assistants; IBM Watson&apos;s victories on <em>Jeopardy</em>; self-driving cars; the development of the first generative adversarial network; the launch of TensorFlow, Google&apos;s open source deep learning framework; the founding of research lab <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/OpenAI">OpenAI</a>, developers of the GPT-3 language model and Dall-E image generator; the defeat of world Go champion Lee Sedol by Google DeepMind&apos;s AlphaGo; and the implementation of AI-based systems that detect cancers with a high degree of accuracy.</p><p><strong>2020s.</strong> The current decade has seen the advent of generative AI, a type of artificial intelligence technology that can produce new content. Generative AI starts with a prompt that could be in the form of a text, an image, a video, a design, musical notes or any input that the AI system can process. Various AI algorithms then return new content in response to the prompt. Content can include essays, solutions to problems, or realistic fakes created from pictures or audio of a person. The abilities of language models such as ChatGPT-3, Google&apos;s Bard and Microsoft&apos;s Megatron-Turing NLG have wowed the world, but the technology is still in early stages, as evidenced by its tendency to hallucinate or skew answers.</p><h3 id="h-ai-tools-and-services" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>AI tools and services</strong></h3><p>AI tools and services are evolving at a rapid rate. Current innovations in AI tools and services can be traced to the 2012 AlexNet neural network that ushered in a new era of high-performance AI built on GPUs and large data sets. The key change was the ability to train neural networks on massive amounts of data across multiple GPU cores in parallel in a more scalable way.</p><p>Over the last several years, the symbiotic relationship between AI discoveries at Google, Microsoft, and OpenAI, and the hardware innovations pioneered by Nvidia have enabled running ever-larger AI models on more connected GPUs, driving game-changing improvements in performance and scalability.</p><p>The collaboration among these AI luminaries was crucial for the recent success of ChatGPT, not to mention dozens of other breakout AI services. Here is a rundown of important innovations in AI tools and services.</p><p><strong>Transformers.</strong> Google, for example, led the way in finding a more efficient process for provisioning AI training across a large cluster of commodity PCs with GPUs. This paved the way for the discovery of transformers that automate many aspects of training AI on unlabeled data.</p><p><strong>Hardware optimization.</strong> Just as important, hardware vendors like Nvidia are also optimizing the microcode for running across multiple GPU cores in parallel for the most popular algorithms. Nvidia claimed the combination of faster hardware, more efficient AI algorithms, fine-tuning GPU instructions and better data center integration is driving a million-fold improvement in AI performance. Nvidia is also working with all cloud center providers to make this capability more accessible as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/Artificial-Intelligence-as-a-Service-AIaaS">AI-as-a-Service</a> through IaaS, SaaS and PaaS models.</p><p><strong>Generative pre-trained transformers.</strong> The AI stack has also evolved rapidly over the last few years. Previously enterprises would have to train their AI models from scratch. Increasingly vendors such as OpenAI, Nvidia, Microsoft, Google, and others provide generative pre-trained transformers (GPTs), which can be fine-tuned for a specific task at a dramatically reduced cost, expertise and time. Whereas some of the largest models are estimated to cost $5 million to $10 million per run, enterprises can fine-tune the resulting models for a few thousand dollars. This results in faster time to market and reduces risk.</p><p><strong>AI cloud services.</strong> Among the biggest roadblocks that prevent enterprises from effectively using AI in their businesses are the data engineering and data science tasks required to weave AI capabilities into new apps or to develop new ones. All the leading cloud providers are rolling out their own branded AI as service offerings to streamline data prep, model development and application deployment. Top examples include <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchaws/definition/Amazon-AI">AWS AI Services</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/whatis/definition/Google-AI">Google Cloud AI</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/news/365532563/New-Microsoft-Azure-VMs-target-generative-AI-developers">Microsoft Azure AI platform,</a> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/definition/IBM-Watson-supercomputer">IBM AI solutions</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchenterpriseai/news/252526253/Oracle-Cloud-Infrastructure-incorporates-Nvidia-GPUs-and-AI">Oracle Cloud Infrastructure AI Services</a>.</p><p><strong>Cutting-edge AI models as a service.</strong> Leading AI model developers also offer cutting-edge AI models on top of these cloud services. OpenAI has dozens of large language models optimized for chat, NLP, image generation and code generation that are provisioned through Azure. Nvidia has pursued a more cloud-agnostic approach by selling AI infrastructure and foundational models optimized for text, images and medical data available across all cloud providers. Hundreds of other players are offering models customized for various industries and use cases as well.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/6912b61c1ee73272aeaaa5ac7c33f34bf881184efd021289100a987649688543.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[What Does Proof-of-Stake (PoS) Mean in Crypto?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/what-does-proof-of-stake-pos-mean-in-crypto</link>
            <guid>tzW6heT0tKybt69jJffV</guid>
            <pubDate>Sun, 09 Jul 2023 05:21:34 GMT</pubDate>
            <description><![CDATA[What Is Proof-of-Stake (PoS)?Proof-of-stake is a cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain. A consensus mechanism is a method for validating entries into a distributed database and keeping the database secure. In the case of cryptocurrency, the database is called a blockchain—so the consensus mechanism secures the blockchain. Learn more about proof-of-stake and how it is different from proof-of-work. Additionally, find out the issue...]]></description>
            <content:encoded><![CDATA[<h2 id="h-what-is-proof-of-stake-pos" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What Is Proof-of-Stake (PoS)?</strong></h2><p>Proof-of-stake is a cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain. A consensus mechanism is a method for validating entries into a distributed database and keeping the database secure. In the case of cryptocurrency, the database is called a blockchain—so the consensus mechanism secures the blockchain.</p><p>Learn more about proof-of-stake and how it is different from proof-of-work. Additionally, find out the issues proof-of-stake attempts to address within the cryptocurrency industry.</p><h3 id="h-key-takeaways" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">KEY TAKEAWAYS</h3><ul><li><p>Under proof-of-stake (POS), validators are chosen based on the number of staked coins they have.</p></li><li><p>Proof-of-stake (POS) was created as an alternative to proof-of-work (POW), the original consensus mechanism used to validate transactions and open new blocks.</p></li><li><p>While PoW mechanisms require miners to solve cryptographic puzzles, PoS mechanisms require validators to hold and stake tokens for the privilege of earning transaction fees.</p></li><li><p>Proof-of-stake (POS) is seen as less risky regarding the potential for an attack on the network, as it structures compensation in a way that makes an attack less advantageous.</p></li><li><p>The next block writer on the blockchain is selected at random, with higher odds being assigned to nodes with larger stake positions.</p></li></ul><h2 id="h-understanding-proof-of-stake-pos" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Understanding Proof-of-Stake (PoS)</strong></h2><p>Proof-of-stake reduces the amount of computational work needed to verify blocks and transactions. Under proof-of-work, hefty computing requirements kept the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/b/blockchain.asp">blockchain</a> secure. Proof-of-stake changes the way blocks are verified using the machines of coin owners, so there doesn&apos;t need to be as much computational work done. The owners offer their coins as collateral—staking—for the chance to validate blocks and earn rewards.1</p><p>Validators are selected randomly to confirm transactions and validate block information. This system randomizes who gets to collect fees rather than using a competitive rewards-based mechanism like proof-of-work.1</p><p>To become a validator, a coin owner must &quot;stake&quot; a specific amount of coins. For instance, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/e/ethereum.asp">Ethereum</a> requires 32 ETH to be staked before a user can operate a node.1 Blocks are validated by multiple validators, and when a specific number of validators verify that the block is accurate, it is finalized and closed.</p><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"></h3><p><em>To activate your own validator, you&apos;ll need to stake 32 ETH; however, you don&apos;t need to stake that much ETH to participate in validation. You can join validation pools using &quot;liquid staking&quot; which uses an ERC-20 token that represents your ETH.2</em></p><p>Different proof-of-stake mechanisms may use various methods to reach a consensus. For example, when Ethereum introduces sharding, a validator will verify the transactions and add them to a shard block, which requires no more than 128 validators to form a voting &quot;committee.&quot;3 Once shards are validated and a block created, two-thirds of the validators must agree that the transaction is valid, then the block is closed.</p><h2 id="h-how-is-proof-of-stake-different-from-proof-of-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How Is Proof-of-Stake Different From Proof-of-Work?</strong></h2><p>Both consensus mechanisms help blockchains synchronize data, validate information, and process transactions. Each method has proven successful at maintaining a blockchain, although each has pros and cons. However, the two algorithms have very different approaches.</p><p>Under PoS, block creators are called validators. A validator checks transactions, verifies activity, votes on outcomes, and maintains records. Under PoW, block creators are called miners. Miners work to solve for the hash, a cryptographic number, to verify transactions. In return for solving the hash, they are rewarded with a coin.</p><p>To &quot;buy into&quot; the position of becoming a block creator, you need to own enough coins or tokens to become a validator on a PoS blockchain. For PoW, miners must invest in processing equipment and incur hefty energy charges to power the machines attempting to solve the computations.</p><p>The equipment and energy costs under PoW mechanisms are expensive, limiting access to mining and strengthening the security of the blockchain. PoS blockchains reduce the amount of processing power needed to validate block information and transactions. The mechanism also lowers network congestion and removes the rewards-based incentive PoW blockchains have.</p><p>Proof of StakeProof of WorkBlock creators are called validatorsBlock creators are called minersParticipants must own coins or tokens to become a validatorParticipants must buy equipment and energy to become a minerEnergy efficientNot energy efficientSecurity through community controlRobust security due to expensive upfront requirementValidators receive transactions fees as rewardsMiners receive block rewards</p><h2 id="h-goals-of-proof-of-stake" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Goals of Proof-of-Stake</strong></h2><p>Proof-of-stake is designed to reduce network congestion and address <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/nfts-and-the-environment-5220221">environmental sustainability concerns</a> surrounding the proof-of-work (PoW) protocol. <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/p/proof-work.asp">Proof-of-work</a> is a competitive approach to verifying transactions, which naturally encourages people to look for ways to gain an advantage, especially since monetary value is involved.</p><p>Bitcoin miners earn bitcoin by verifying transactions and blocks. However, they pay their operating expenses like electricity and rent with <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/f/fiatmoney.asp">fiat currency</a>. So what&apos;s really happening is that miners exchange energy for cryptocurrency, which causes <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/tech/how-does-bitcoin-mining-work/">PoW mining</a> to use as much energy as some small countries.4</p><p>The PoS mechanism seeks to solve these problems by effectively substituting staking for computational power, whereby the network randomizes an individual&apos;s mining ability. This means there should be a drastic reduction in energy consumption since miners can no longer rely on massive farms of single-purpose hardware to gain an advantage. For example, Ethereum&apos;s transition from PoW to PoS reduced the blockchain&apos;s energy consumption by 99.84%.5</p><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"></h3><p><em>The first </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/c/cryptocurrency.asp"><em>cryptocurrency</em></a><em> to adopt the PoS method was </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/p/peercoin.asp"><em>Peercoin</em></a><em>. It was followed by Nxt, Blackcoin, and ShadowCoin soon after.6</em></p><h2 id="h-proof-of-stake-security" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Proof-of-Stake Security</strong></h2><p>Long touted as a threat to cryptocurrency fans, the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.investopedia.com/terms/1/51-attack.asp">51% attack</a> is a concern when PoS is used, but there is doubt it will occur. Under PoW, a 51% attack is when an entity controls more than 50% of the miners in a network and uses that majority to alter the blockchain. In PoS, a group or individual would have to own 51% of the staked cryptocurrency.</p><p>It&apos;s very expensive to control 51% of staked cryptocurrency. Under Ethereum&apos;s PoS, if a 51% attack occurred, the honest validators in the network could vote to disregard the altered blockchain and burn the offender(s) staked ETH. This incentivizes validators to act in good faith to benefit the cryptocurrency and the network.1</p><p>Most other security features of PoS are not advertised, as this might create an opportunity to circumvent security measures. However, most PoS systems have extra security features in place that add to the inherent security behind blockchains and PoS mechanisms.1</p><h2 id="h-what-is-proof-of-stake-vs-proof-of-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What Is Proof-of-Stake vs. Proof-of-Work?</h2><p>Proof-of-Stake (POS) uses randomly selected validators to confirm transactions and create new blocks. Proof-of-Work (POW) uses a competitive validation method to confirm transactions and add new blocks to the blockchain.</p><h2 id="h-is-proof-of-stake-a-certificate" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Is Proof-of-Stake a Certificate?</h2><p>Proof-of-Stake is a consensus mechanism where cryptocurrency validators share the task of validating transactions. There are currently no certificates issued.</p><h2 id="h-how-do-you-earn-proof-of-stake" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How Do You Earn Proof-of-Stake?</h2><p>Proof of Stake (POS) is a built-in consensus mechanism used by a blockchain network. It cannot be earned, but you can help secure a network and earn rewards by using a cryptocurrency client that participates in PoS validating or becoming a validator.7</p><h2 id="h-can-bitcoin-be-converted-to-proof-of-stake" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Can Bitcoin Be Converted to Proof-of-Stake?</h2><p>It&apos;s possible that Bitcoin can change to proof-of-stake. However, it takes years to implement successfully, and the community would need to agree to the change.</p><h2 id="h-the-bottom-line" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Bottom Line</strong></h2><p>Proof-of-stake is a mechanism used to verify blockchain transactions. It differs from proof-of-work significantly, mainly in the fact that it incentivizes honest behavior by rewarding those who put their crypto up as collateral for a chance to earn more.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/23ea90cf9df1781ef92fca83e6bd1ff4c90786ecd0dedc07f42a8ad4104305df.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Testnets and mainnets: What are they and what’s the difference?]]></title>
            <link>https://paragraph.com/@1nspiredbylife/testnets-and-mainnets-what-are-they-and-what-s-the-difference</link>
            <guid>Gzut4SeCDZof4BXqQPZO</guid>
            <pubDate>Sat, 08 Jul 2023 13:04:39 GMT</pubDate>
            <description><![CDATA[Testnets and mainnets: What are they and what’s the difference?The world of blockchain technologies and cryptocurrency is home to a lot of specialist terms, many of which are incomprehensible to crypto beginners. “Testnet” and “mainnet” are two of them, and we’ll explain what they are in this article.What is a testnet?A testnet is a test version of a network providing a prototype version of a blockchain that can be tested on without having to use real tokens or introduce risk to the functioni...]]></description>
            <content:encoded><![CDATA[<h1 id="h-testnets-and-mainnets-what-are-they-and-whats-the-difference" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Testnets and mainnets: What are they and what’s the difference?</strong></h1><p>The world of blockchain technologies and cryptocurrency is home to a lot of specialist terms, many of which are incomprehensible to crypto beginners. “Testnet” and “mainnet” are two of them, and we’ll explain what they are in this article.</p><h2 id="h-what-is-a-testnet" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What is a testnet?</h2><p>A testnet is a test version of a network providing a prototype version of a blockchain that can be tested on without having to use real tokens or introduce risk to the functioning of the main blockchain. The project tokens do not yet have any real value at this stage.</p><p>Testnets allow developers to make sure there are no bugs or other issues, and if they identify any they can fix them before officially releasing the crypto project to market. This final product is known as the mainnet.</p><p>The test network continues to exist after the final version of the network has been launched. It is used to conduct various experiments and, since blockchains are updated on a regular basis, developers need a safe place where they can test their updates before migrating them to the mainnet.</p><h2 id="h-what-is-a-mainnet-and-how-does-it-differ-from-the-testnet" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What is a mainnet and how does it differ from the testnet?</h2><p>The mainnet represents a crypto project’s core operating network. When developers announce a mainnet launch, this means the blockchain is ready to operate fully. Launch dates can usually be found on a project’s official website, in the roadmap section.</p><p>Key differences between mainnets and testnets:</p><ul><li><p>A mainnet is an official, fully-fledged crypto project with a &quot;live&quot; blockchain. The testnet is the initial stage in the creation of the platform.</p></li><li><p>The mainnet is a complete product that’s ready to be used by the community, while the testnet is an alternative version of the network designed for testing.</p></li><li><p>The coins used on the mainnet have real value, while testnet tokens do not.</p></li><li><p>Crypto projects that are at the testnet stage still have a lot to prove to a community, unlike projects that have officially launched their main blockchain.</p></li></ul><h2 id="h-how-to-make-money-on-a-testnet" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How to make money on a testnet</h2><p>When it comes to earnings, there are two kinds of testnet.</p><ul><li><p>Incentivized. In this case, users are rewarded for assisting with the testing of new crypto projects. Rewards can take the form of native tokens or the possibility of acquiring them even before the official project launch, early access to the beta version, etc.</p></li><li><p>Non-incentivized. Testnet participants are not guaranteed to be rewarded, but the most active testers will often receive bonuses of some kind.</p></li></ul><p>You can make money by testing the technical side of a testnet or its interface.</p><p><strong>Interface testing</strong></p><p>This option doesn’t require any special equipment or knowledge. Testers are given the opportunity to test different features of the platform, find bugs, conduct transactions with test tokens or stake them. If you encounter difficulties or identify errors, all you need to do is describe the problem in detail.</p><p>For example, you may be asked to connect your wallet to the platform. Test tokens will be sent to the wallet and you’ll be required to carry out a transaction with them. You’ll be paid in real coins for this. There are no guarantees, but you can sometimes make good money by doing these kinds of simple actions. For example, at one point ParaSwap testers made $5,000 on test transactions, while Uniswap sent 4,000 tokens to testnet participants (worth $18,960 at the time of writing). Rewards do vary of course, and you may only receive $100, but that doesn’t seem too bad for carrying out basic actions.</p><p><strong>Technical tests</strong></p><p>Making money on technical tests is slightly more difficult. Some degree of relevant knowledge is required, as testers have to run one of the nodes on the blockchain. Simple instructions for setting up and launching nodes may not exist yet, and the technical requirements for hardware and connecting to the network may prove to be quite high.</p><p>You’ll need a computer, a virtual server and money to rent it out. It’s impossible to say for sure how long network tests need to run for – it could be anything from a month to a year.</p><p>How much can you make on this kind of testnet? That also varies. If you’re lucky, you could earn as much as Solana testers, who received 100 SOL per month. That’s currently worth $2,190.</p><h2 id="h-where-to-find-testnets" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Where to find testnets</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://nodes.guru/"><strong>Nodes.Guru</strong></a> — the largest testnet aggregator.</p><p>If you’re a beginner, select a project with one spanner. These are the simplest ones and the least demanding when it comes to hardware.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dropsearn.com/"><strong>DropsEarn</strong></a></p><p>It’s also worth monitoring upcoming crypto projects as well as existing ones, and participating in all the available projects that fit your criteria. You may only earn money on 10–20% of them, but you’ll also gain experience which will help you participate in more complex testnets and earn larger rewards in future.</p><p>Testnets are not always a quick or easy way to earn crypto, but the likelihood of earning a decent amount is fairly high.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/e6a3e57c47814e4a298d9217af4f788d6ecf59d16603a3e7237c7dbadfec923b.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[ ]]></title>
            <link>https://paragraph.com/@1nspiredbylife/QIRbTPLMZz7Gni8bJgyB</link>
            <guid>QIRbTPLMZz7Gni8bJgyB</guid>
            <pubDate>Sat, 08 Jul 2023 12:40:25 GMT</pubDate>
            <description><![CDATA[Exploring Gitcoin Passport: Empowering Developers in the Decentralized Economy Introduction: In recent years, the blockchain and cryptocurrency space has witnessed an explosion of decentralized applications (dApps) and platforms aimed at revolutionizing various industries. One such platform that has gained significant attention is Gitcoin, a community-driven network that incentivizes collaboration and supports open-source projects. Among its innovative features, Gitcoin Passport stands out as...]]></description>
            <content:encoded><![CDATA[<p>Exploring Gitcoin Passport: Empowering Developers in the Decentralized Economy Introduction: In recent years, the blockchain and cryptocurrency space has witnessed an explosion of decentralized applications (dApps) and platforms aimed at revolutionizing various industries. One such platform that has gained significant attention is Gitcoin, a community-driven network that incentivizes collaboration and supports open-source projects. Among its innovative features, Gitcoin Passport stands out as a unique concept that enables developers to showcase their skills, contributions, and reputation in the digital economy. In this article, we will delve into Gitcoin Passport, its functionalities, and the impact it has on developers in the decentralized ecosystem. What is Gitcoin Passport? Gitcoin Passport can be described as a digital identity system built on the Ethereum blockchain. It allows developers to create and manage their professional profiles, including their skills, experiences, and contributions to open-source projects. With Gitcoin Passport, developers can curate a verified reputation that can be easily shared across different platforms, thereby enhancing their visibility and credibility within the community. Key Features and Functionality: Profile Creation and Verification: Developers can create their Gitcoin Passport profiles by linking their Ethereum wallet addresses and providing relevant information about their skills and experience. The verification process ensures that the information provided is accurate and trustworthy. Skills and Contributions: Gitcoin Passport enables developers to showcase their technical skills, programming languages, and specific areas of expertise. They can also highlight their contributions to open-source projects, such as pull requests, bug fixes, or code contributions, creating a comprehensive portfolio of their work. Reputation and Trustworthiness: Through Gitcoin Passport, developers can establish a reputation based on their verified contributions and the feedback received from project maintainers and peers. This reputation score acts as a measure of trustworthiness and can greatly influence opportunities for collaboration and job prospects. Universal Profile: The Gitcoin Passport acts as a universal profile that developers can use across multiple platforms and applications in the decentralized ecosystem. It provides a standardized format for showcasing skills and contributions, making it easier for developers to explore new opportunities and network with potential collaborators. Benefits for Developers: Enhanced Visibility and Credibility: Gitcoin Passport enables developers to stand out in the highly competitive digital landscape. By showcasing their skills, verified contributions, and reputation, developers can attract the attention of potential employers, collaborators, and project maintainers. Seamless Collaboration: With a universal profile and standardized format, Gitcoin Passport simplifies the process of finding like-minded developers and collaborating on open-source projects. It fosters a sense of community and enables efficient communication and coordination among team members. Increased Job Prospects: Developers with an established Gitcoin Passport can leverage their reputation and portfolio to explore job opportunities in the decentralized economy. Employers and project maintainers can easily identify top talents and connect with them, leading to a more efficient and effective hiring process. Skill Development and Learning Opportunities: Gitcoin Passport encourages developers to continuously improve their skills and contribute to open-source projects. By tracking their contributions and receiving feedback, developers can identify areas for growth, gain valuable experience, and expand their knowledge within the community. Conclusion: Gitcoin Passport is a groundbreaking concept that empowers developers in the decentralized economy.</p><p>By providing a platform for creating verified profiles, showcasing skills, and building reputations, Gitcoin Passport enhances visibility, credibility, and collaboration opportunities. It aligns with the ethos of open-source development and fosters a vibrant community of talented individuals working towards common goals. As the decentralized ecosystem continues to evolve, Gitcoin Passport remains a valuable tool for developers to navigate and succeed in this new digital frontier.</p>]]></content:encoded>
            <author>1nspiredbylife@newsletter.paragraph.com (Inspired by life)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/d4bdfb1f2342e7d01f3883d722733742ec34dbc41eecbb26ce8dee1ba8733f07.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>