Sentences with phrase «chain networks using»

SUMMARY: An innovative and critical thinking Industrial Engineer with expertise in procurement, budgeting, project management, forecasting, lean manufacturing, e - commerce, big box retail, and transportation solutions to supply chain networks using best industry practices.

Not exact matches

With most businesses using smart equipment in the office and their employees using personal smartphones, a hacker could easily enter the network through a daisy chain of devices.
The coffee chain operator has opted to use Google Wi - Fi to give U.S. customers up to 10 - times faster network speeds.
These transactions are verified by network nodes through the use of cryptography and recorded in a public distributed ledger called a block - chain.
BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry, and the company's previously disclosed review of strategic alternatives.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
«If you ask any of the developers, they will typically want to see 18 months or two years lead time, for something with as wide an impact on all the software and hardware out there as a hard fork,» Blockstream co-founder and Hashcash inventor Dr. Adam Back noted during a Q&A session.And if the chain does split into different networks and currencies — one following the current Bitcoin protocol and one adopting the hard fork — the question becomes which of the two gets to use the name «Bitcoin.»
A previous Bitcoin Magazine article provides a step - by - step explanation of a simple example where two users agree to swap agreed amounts of BTC and LTC and use the multisig and time lock features available in both Bitcoin and Litecoin basic scripting to synchronize two transactions on two independent blockchains without having to trust each other.It's worth noting that Lightning Network payment channels, now enabled by SegWit, make atomic swaps more powerful and easier to implement, and permit adding support for off - chain swaps.
With a global value chain that includes more than 460 crop procurement locations, 300 ingredient manufacturing facilities, 40 innovation centers and the world's premier crop transportation network, we connect the harvest to the home, making products for food, animal feed, chemical and energy uses.
(b) transmit chain letters, bulk or junk email or interfere with, disrupt, or create an undue burden on the Sites or the Applications or the networks or services connected to the Sites or the Applications, including without limitation, hacking into the Sites or the Applications, or using the system to send unsolicited or commercial emails, bulletins, comments or other communications;
Within its home base in the Chicago area, the company uses an in - house distribution network for independent stores and partners with full - service specialty food distributors for large chains.
FoodLogiQ, a software solutions company that measures food safety, has joined with the product information network, 1World Sync, to create a tool that allows food service managers to trace products that they use daily across the supply chain to ensure...
With a global value chain that includes 428 crop procurement locations, 280 ingredient manufacturing facilities, 39 innovation centers, and the world's premier crop transportation network, we connect the harvest to the home, making products for food, animal feed, industrial and energy uses.
Instead of using the chemically linked long - chain molecules found in traditional rubbers, Ludwik Leibler and his colleagues at the Centre National de la Recherche Scientifique in Paris thought they could make stretchy materials from much smaller building blocks that associate with each other in a network.
(b) Observational study of space weather using the Solar Magnetic Activity Research Telescope (SMART) and the international ground - based solar observation network (CHAIN).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
There are occasions when I'm tempted to think that travel was purer before the ubiquity of smart phones and social networking (which have a tendency to chain your travel experience to certain aspects of home), but I have to remind myself that travelers have always made use of whatever technology was available, and that I can't base my prejudices on how I traveled 10 or 15 years ago.
SEGA Networks has just teased a new mobile game going under the name of «Chaos Dragon `, this game seems to be using mechanics that seem straight out of Chain Chronicles.
From the algorithmic chain mail in Angela Eames» work to the physical web shot through with electricity by Cadi Froehlich, the network of 3D polygons used by Bryan Benge and David Theobald, to the drawn matrices of James Faure Walker and Erika Winstone, there are meshes throughout the show.
Using peer - to - peer networks to chain together blocks of records, blockchain creates an immutable ledger of transactions that is extremely difficult if not impossible to modify.
Each block is chained to the previous block and recorded across a peer - to - peer network, using cryptographic trust and assurance mechanisms.»
On the value configuration side, the matrix tracks the three generic value configurations developed by Stabell and Fjeldstad and used by Christensen — solution shops, value chains, and networks.
But while other developers have been tinkering away on several off - chain solutions, which are in the testing phase right now, Loom Network's platform uses so - called «dappchains,» which can be thought of as mini blockchains, that they say are ready today.
Users can now send test transactions over the so - called «off - chain» network using Colu's demo, which perhaps offers the first user - experience for a Lightning Network pnetwork using Colu's demo, which perhaps offers the first user - experience for a Lightning Network pNetwork project.
The node will have to pay a bitcoin fee to do so, even if they use the on - chain transaction to re-establish a channel with the profits from fees reinvested back into the Lightning Network.
The talk is likely to be notable as it is slated to be given by the creator of the Lightning Network, the best - known off - chain payment channel network, but one that is envisioned for use on the bitcoin blocNetwork, the best - known off - chain payment channel network, but one that is envisioned for use on the bitcoin blocnetwork, but one that is envisioned for use on the bitcoin blockchain.
Mr. Cohn spoke to the transparent nature of the blockchain and ability for on - chain analysis to identify potential repeat malicious actors, adding, «Blockchain can be used as a foundation for network analysis for payments... Before you go about paying a ransom, reach out to the (blockchain) industry.
Both the original Bitcoin and Bitcoin Cash adhere to this notion, while the Segwit chain and the Segwit Core developers believe that capacity should be artificially limited, even if the demand to use the network is greater than the available capacity.
Lombrozo has outlined multiple use cases of the Lightning Network, which is empowered by these new protocol changes, and Dorier noted how his own company, Metaco, will combine payment hubs with the Open Asset protocol to allow colored coins to be sent for free in an off - chain environment.
«Long before the network gets anywhere near as large as that, it would be safe for users to use Simplified Payment Verification (section 8) to check for double spending, which only requires having the chain of block headers, or about 12 KB per day.
Longer - term, blockchain engineers on many of the largest blockchains are working on a range of «off - chain» solutions that could help the technology scale to more users, all while slashing the cost of using the network, and your transaction fees.
Lightning Network effectively makes Bitcoin Scaling possible by conducting such transactions off - chain using Bitcoin scripting, with enforcement done through broadcasting signed multi-signature transactions on the blockchain itself.
Proposed by Bitcoin Core's developers, SegWit's main goal is to send transactions off - chain and onto second layers like the Lightning Network or sidechains, but it has already drawn a lot of criticism over its use of a 1:4 ratio, which some miners pointed out as a political decision that will bind bitcoin's trajectory for years regardless of technical factors.
If you can create a couple of blocks without the payment to the vendor, then the network will invoke the «longest chain rule» and ignore / orphan the first block and use your longer chain instead.
Through this type of smart - contracting system, Bitcoin smart contracts that rely on the use of an oracle can potentially be made more secure than they are today, and the less - trusted oracles can also be used off - chain by way of the Lightning Network.
The partners will help each other develop the foundations for different use cases, such as post-trade settlement, payments between banks, and supply chain tracking, while competing on applications and services built atop the networks.
A Liquidity Network founder has demoed how an ethereum wallet could function using a new off - chain scaling solution.
In particular, state channels — a generalization of the lightning network concept in Bitcoin — would permit conducting most transactions off - chain between parties directly, using the blockchain only as a kind of final arbiter in case of disputes.
For those who are unfamiliar, the Lightning Network is a proposed method of conducting off - chain bitcoin transactions using time - locked payment channel smart contracts (BINGO!).
Financial services, supply chains, IoT, risk management, digital rights management and healthcare are some of the areas that are poised for dramatic change using Blockchain networks.
This would increase the scalability of using bitcoin for payments by reducing the number of transactions that must be confirmed by the Bitcoin network and added to the blockchain, with the main benefit being that bitcoin does not need to be entrusted with a central third party as with other off - chain payment solutions.
The protocol stores data in a decentralized, off chain network identified by hashes on the blockchain that can be used in queries and application design.
State channels a generalization of the Lightning Network concept in Bitcoin would permit conduct of most transactions off - chain, between parties directly, using the blockchain only as a kind of final arbiter in case of disputes.
This momentum validates that ChainLink is already providing value to industry leaders and solidifies our belief in the ability of the network to securely connect smart contracts to the key off - chain resources they need to become useful for the majority of real world use cases.»
The independent retail chain established in 1976, now allows shoppers to pay for purchases using bitcoin across its network of 45 corporate stores.
The Lightning Network is a «second layer» to the Bitcoin network that offers users the ability to conduct off - chain transactions, with the Bitcoin blockchain used only as a settlement sNetwork is a «second layer» to the Bitcoin network that offers users the ability to conduct off - chain transactions, with the Bitcoin blockchain used only as a settlement snetwork that offers users the ability to conduct off - chain transactions, with the Bitcoin blockchain used only as a settlement service.
By using multiple chains, users can avoid the network issues which plague other public blockchains like bitcoin and ethereum, the former JP Morgan Chase blockchain developer told CoinDesk.
If you're interested in blockchain networks, you've probably heard of «smart contracts» — programs that can control on - chain resources using custom logic executed as part of blockchain validation.
The lightning network uses off - chain technology, which, simply put, means that not every transaction is recorded on the blockchain.
a b c d e f g h i j k l m n o p q r s t u v w x y z