The Latest in IT Security

Posts Tagged ‘computational power’

A single bitcoin mining network has repeatedly supplied more than half the computational power necessary to mint new bitcoins, undermining the decentralized nature of the digital currency and creating new security concerns. Ars Technica reports on new research from Cornell University showing that GHash, a top mining pool whose leaders are unknown, performed more than 51 percent […]

Read more ...

17
Jun
2011

A digital currency known as Bitcoin (BTC) has been causing a bit of a media stir of late due to its use for illicit purposes. Some readers of this blog will be familiar with and have used a digital currency of some form in the past to purchase goods online. Some may even remember failed […]

Read more ...


Categories

FRIDAY, APRIL 04, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments