In general, blockchains can be permissionless, permissioned or both. This classification is based on the blockchain’s access policies and rights management. To join a permissionless blockchain, you do not need permission. In other words, permissionless blockchains enable anybody to join the blockchain anonymously and do not limit the privileges of the nodes on the network. A permissioned blockchain, on the other hand, requires permission from a central authority to join.
In first part of this blog series, I outlined some fundamental concepts pertaining to blockchain technology. Now I would like to dive deeper into how Blockchain actually works and see the inner workings of the technology itself.
After the introduction of digital pictures in the 50s, computer scientists begged the question: can a computer analyzing a picture understand the world? Computer vision is a field of artificial intelligence (AI) which enables computers and systems to extract important information from digital pictures, videos, and other visual inputs. Computer vision then either takes actions from the data it has collected or gives suggestions on the basis of that data.
When I joined the FIYU development team I already had 5 years of experience working as a .NET developer, mainly backend, but this time I was joining the project as a front-end developer with almost no front-end experience. It was time to learn. Since FIYU is a platform for rapid development I guess it was no surprise that the academy was an efficient and rapid introduction.
Today’s media and social networks are full of news, posts, and articles about Bitcoin and other cryptocurrencies, NFTs and similar topics. This increasing popularity of Bitcoin and other cryptocurrencies made me wonder what exactly lies behind it, and how these things actually work. In this blog series we will explain what blockchain is and how it actually works.
With increasing project complexity and with the COVID-19 pandemic many companies have been driven to reexamine and improve their risk management techniques, technologies, and processes. This short article should help you better understand how to apply risk management in agile projects and help you take steps to reduce risks in the future.
Computer vision is an area of artificial intelligence that deals with extracting and analyzing valuable information from images. It can be used to read texts and numbers. For example, we can cite the translation of text visible through a camera in real-time or the evaluation of handwritten equations. Reding text in images has attracted increasing attention in computer vision due to many practical applications in document analysis, scene understanding, robot navigation, and image retrieval.
When we start creating a new application, we should adhere to the basic postulates: that the code we write is simple, easy to test, that it can be maintained, and that it is readable and understandable for the colleagues we work with or to those will subsequently take over maintaining our application. Furthermore, at the very beginning, we should think about how complex the structure of our application is and how we will manage the data we have without our application being fast, user friendly, or reliable.
XML is a widely used markup language in various environments. It is easily human and machine readable. Although it has recently been replaced by JSON in some usages, it still appears very frequently. In this post we will make an overview of automated XML data handling in .NET environment, using C# programming language.