However, once a level of trust and security has been achieved, Donegan believes that in a year or two we could start to see a complete blockchain product evolve.
Brian Donegan, from the Isle of Man... Read More
The installation of HDFC Bank’s humanoid is part of an artificial intelligence program that was launched last year. By doing so, the bank is hoping to improve their customer service as well as its mar... Read More
The announcement comes following a two-month trial that saw over a hundred real business transactions executed on a blockchain developed using the open-source Hyperledger fabric. The trial saw transac... Read More
“The original content creator can assign special benefits to the community for this effort, and since everything happens through transactions, it is an immutable record of people who bought your song,... Read More
The sweeping Fintech drive will also see South Korea introduce bitcoin regulation in 2017. A digital currency task force was set up by the FSC in late 2016 to focus on regulatory and licensing paramet... Read More
Gibraltar Will Take Market-Driven Approach to ICO Rules
Gibraltar may be moving to regulate initial coin offerings (ICOs), but officials say it will be up to the market to determine what a "good" token sale looks like.
The U.K. overseas territory announ
Venezuela Claims $735 Million Raised in First Cryptocurrency Sale
Venezuelan president Nicolas Maduro is claiming that the country has raised $735 million in the first day of a sale for its controversial "petro" cryptocurrency.
Announced late Tuesday night, Madur
500 Startups, Huobi Labs to Incubate Blockchain Projects
500 Startups, the Silicon Valley startup accelerator, announced today that it is partnering with cryptocurrency exchange Huobi's incubator wing, Huobi Labs.
The two companies will support startups
Tesla's Cloud Hit By Crypto Mining Malware Attack
Electric vehicle maker Tesla has reportedly fallen victim to a cryptocurrency mining malware attack.
On Tuesday, cybersecurity software firm RedLock reported that hackers had exploited an insecure