Companies Venture Capitalist Explains How Quantum Computers Harness Parallel Universes Published 4 years ago on July 7, 2015 By Giulio Prisco Recently quantum computing company D-Wave Systems announced that it had broken the 1000 qubit barrier – an important breakthrough, according to experts who speculate on the really weird physics behind quantum computing. Quantum computers encode information in quantum bits, or qubits, which can be in a quantum superposition of zero and one states, and therefore they can process information in ways that have no equivalent in classical computing by exploiting subtle quantum phenomena such as quantum entanglement. Computing With Parallel Universes In fact, the exotic and really weird fringes of fundamental quantum physics play a role of growing importance in practical applications. In a short video released in January before the recent D-Wave announcement, venture capitalist Steve Jurvetson, a Managing Director of Draper Fisher Jurvetson who sits on the D-Wave Board of Directors, explains in simple terms how quantum computers can be so efficient: they harness the computing power of a huge number of parallel universes. First introduced in 1957 by theoretical physicist Hugh Everett, the Many-Worlds Interpretation (MWI) of quantum physics says that the weird and counter-intuitive quantum superpositions extend across parallel universes. A qubit in a quantum superposition of zero and one states exists in two parallel universes. Similarly, two qubits require four parallel universes, and so forth. Doing the math, it’s easy to see that a system of 1000 qubits spans a huge number of parallel universes. Jurvetson notes that Google bought the first D-Wave quantum computers, and Google researchers consider quantum computing as a path to Artificial Intelligence (AI), with first practical applications to image recognition, machine learning and deep learning. Then he moves on to explain, sort of, how quantum computers work. The only physical explanation of how quantum computing works is that it uses the computational resources of parallel universes, says Jurvetson in the video. This interpretation is often mentioned by science writers, but it’s mostly ignored by those professional scientists who are afraid to of losing reputation by showing too much imagination. Venture capitalists see nothing wrong with imagination, if they can use it to make more money. Of course, imagination is good, but quantum physics is counter-intuitive and “visual” explanations should be taken with caution. A Moore’s Law On Top of Moore’s Law Since the number of parallel universes whose computing power is harnessed by a quantum computer increases exponentially with the number of qubits, a quantum computer with a few thousands of qubits could have a computing power greater than all existing computers combined, and adding even more qubits could result in a machine with more computational power than the entire universe. If quantum computers keep doubling the number of qubits every few years, Moore’s Law – the observed doubling in performance of computer systems every two years – would become even faster. “It’s a Moore’s Law on top of Moore’s Law,” says Jurvetson commenting the image above, titled “Rose’s Law” after D-Wave’s founder and CTO Geordie Rose. But also the practical difficulty of building quantum computers increases exponentially with the number of qubits, so there is the possibility that quantum computing research might run into a barrier. Jurvetson spaaks of “a 10 percent chance that it doesn’t hit some roadblock.” Images from Steve Jurvetson, D-Wave and Wikimedia Commons. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (0 votes, average: 0.00 out of 5)You need to be a registered member to rate this. Loading... Giulio Prisco Giulio Prisco is a freelance writer specialized in science, technology, business and future studies. Follow @HackedCom Feedback or Requests? Related Topics:D-WaveParallel UniversesQuantumquantum computingSteve Jurvetson Up Next Google Has Self-Driving Cars on the Road in Texas Don't Miss Citizen Science Project Develops Nanotube Filtration Systems For Clean Water You may like Quantum Threat Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption Researchers in Australia Claim a Breakthrough for Quantum Communications Acronis and ID Quantique to Bring Quantum-Safe Encryption to Cloud Data Protection Physicists Crack Quantum Teleportation of Data Is Quantum Space-Time a Scale-Free Network Like Facebook? 11 Comments 11 Comments Orchideric July 7, 2015 at 8:06 pm So, in other words, 90% chance it WILL “hit some kind of roadblock”. But interesting nonetheless. Log in to Reply Giulio Prisco July 8, 2015 at 6:35 am The fact that the practical difficulty of building a quantum computer increases exponentially with the number of qubits is a roadblock in itself – at some point the curve becomes practically vertical. But the interesting question is how far we can go before it becomes practically impossible to go further. Another problem is software – at this moment quantum computing is only suitable for certain very specific applications, and the challenge is how to extend its application scope. Log in to Reply Matthew Paul Chapdelaine July 21, 2015 at 12:05 am “how far we can go before it becomes practically impossible to go further.” I’ll bet they said the same thing about technology back in the 1700’s. There are always breakthroughs. History has shown that. I wouldn’t start worrying about a world where we hit a ceiling until our little human civilization goes type III galactic. Log in to Reply Brad Arnold July 8, 2015 at 11:10 am What we need now is talented programmers to harness the power of the D-Wave. Cognitive computing directly via the D-Wave is better than optimizing AI algorithms with the D-Wave for use on conventional computer processors. Mark my words: the Singularity is coming faster than the experts think. Log in to Reply Giulio Prisco July 8, 2015 at 4:29 pm But slower that the enthusiasts think, in my opinion. Halfway between. Log in to Reply Lish Lash July 8, 2015 at 5:21 pm “It gets pretty weird pretty quickly.” Ha ha, go go fast talking Venture Conman, best Tony Stark impressionist yet. Log in to Reply Benjamin Philips July 8, 2015 at 7:39 pm “…but it’s mostly ignored by those professional scientists who are afraid to of losing reputation by showing too much imagination. Venture capitalists see nothing wrong with imagination…” So you’re saying we should thank VCs for all that scientific innovation, including quantum computing. What parallel universe are YOU living in? Log in to Reply Giulio Prisco July 9, 2015 at 6:46 am I am saying that VCs have also a role to play. The sad truth is that, in today’s sedate world, scientists and researchers know that their career will stagnate (or worse) if they even mention imaginative ideas. Especially young researchers with families to feed learn to shut up, or else. Yes, I wish I lived in a parallel universe where imaginative science is respected by the (parallel) establishment. Log in to Reply btcusury July 14, 2015 at 12:04 pm In “today’s sedate world”? “A new scientific truth does not triumph by convincing its opponents and making them see the light, but rather because its opponents eventually die, and a new generation grows up that is familiar with it.” – Max Planck, 1948 Log in to Reply Giulio Prisco July 15, 2015 at 1:36 pm Exactly. The problems is that some “bureaucrats of science” don’t move away fast enough. I don’t wish anyone to die, but perhaps retirement in a tropical paradise would be a win-win deal. 😉 Log in to Reply Optimist911 August 18, 2015 at 11:29 pm “Showing too much imagination” sounds like a good euphemism for “making crazy science-fiction claims.” Is there yet a definitive answer as to whether D-Wave’s system is actually a quantum computer, even in some weak sense? As I gather, classical algorithms perform just as well even on the very specific problem D-Wave was designed to solve. 1000 qubits on a real quantum computer would start to threaten RSA, but D-Wave doesn’t do factoring. I guess unlike bits, not all qubits are equal or even mean the same thing. The D-Wave system is a bit reminiscent of those crazy analog or electrical machines that engineers are given as puzzles to figure out why they don’t work in practice. Log in to Reply You must be logged in to post a comment Login Leave a Reply Cancel replyYou must be logged in to post a comment. Business ICE Has Raised $182.5 Million for Upcoming Bakkt Trading Platform Published 2 weeks ago on December 31, 2018 By Sam Bourgi The downturn in crypto has not deterred high-profile investors from betting big on the future of the market. Intercontinental Exchange (ICE), the world’s largest stock exchange operator, has raised $182.5 million in support of its Bakkt cryptocurrency venture. Bakkt: Institutional Support Grows The Bakkt startup has raised $182.5 million from more than a dozen high-profile investors and venture capital firms, CEO Kelly Loeffler announced Monday. First-round investors include: Boston Consulting Group, CMT Digital, Eagle Seven, Galaxy Digital, Goldfinch Partners, Alan Howard, Horizons Ventures, Microsoft’s venture capital arm, M12, Pantera Capital, PayU, Naspers’ fintech arm and Protocol Ventures. “Our work today is centered on driving institutional access for digital assets, along with merchant and consumer uses, and we’re already expanding on this vision, collaborating with great companies like Starbucks in these efforts,” Loeffler said. Further details on Bakkt’s 2019 objectives will be announced sometime next month, though Loeffler indicated that the focus is on developing new infrastructure for the nascent market. This includes the “industry’s first institutional grade regulated exchange, clearing and warehousing services for physical delivery and storage.” What is Bakkt? Preparing for the Physical Bitcoin Futures Market Bakkt is scheduled to launch its bitcoin futures market Jan. 24 but delays in regulatory approvals could see that date get pushed back by a week or more. Further details can be found in the following article from Dec. 22. Disrupting Traditional Finance Bakkt has been described as the world’s first physically-backed bitcoin futures market, but its mandate stretches far beyond that. When ICE first unveiled the crypto startup in August, the goal was to broaden institutional access and consumer adoption of digital assets. Through high-profile partnerships with Starbucks and Microsoft and with the support of early investors like Susquehanna International and Fortress Investment, Bakkt is aiming to bring “regulated, connected infrastructure together with institutional and consumer applications for digital assets,” according to Jeffrey Sprecher, the founder and chairman of ICE. NYSE Owner Is Betting Big on Cryptocurrency with Bakkt The launch of a physically-settled bitcoin futures market as early as next month means institutional investors can access digital assets through a trusted custodian. On the consumer side, Starbucks will be the flagship retailer of Bakkt with the goal of developing practical applications for commercial use. According to Starbucks senior executive Maria Smith, consumers will one day be able to convert cryptocurrencies into dollars at various Starbucks locations. Starbucks will play an important role in helping Bakkt disrupt the traditional payments market. One of Bakkt’s stated goals is to move consumers away from credit cards toward crypto applications. Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (2 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... Sam Bourgi 4.6 stars on average, based on 736 rated postsSam Bourgi is Chief Editor to Hacked.com, where he leads content development for one of the world's foremost cryptocurrency resources. Over the past eight years Sam has authored more than 10,000 articles and over 40 whitepapers in the fields of labor market economics, emerging technologies, cryptocurrency and traditional finance. Sam's work has been featured in and cited by some of the world's leading newscasts, including Barron's, CBOE and Forbes. Contact: firstname.lastname@example.org Twitter: @hsbourgi Follow @HackedCom Feedback or Requests? Continue Reading Business Project to Watch: Sentinel Protocol Published 1 month ago on December 13, 2018 By VlaSem The creators of Sentinel Protocol set themselves the goal of overcoming the current disadvantages of decentralization in the field of cryptocurrency technologies, turning this ecosystem into a safe and protected environment from hacker threats. Using a collective intelligence system created by using decentralization, the project combines cryptographic functions and threat analysis algorithms based on artificial intelligence to create a secure, innovative platform. Creation History and Team The creators of the project note the current difference in the level of protection against security threats between individual users and business users. The latter can afford to spend large amounts of money to ensure their IT security. According to the SANS Institute, in 2016 the largest category of costs for financial institutions was to ensure cyber security (10-12% of the annual budget of organizations). The report of Cybersecurity Ventures argues that the size of the market of protection systems in this area will grow by $ 1 trillion from 2017 to 2021 since the constant increase in the number of cybercrime led to a critical level. The DAO case in 2016 was the first serious incident in the field of a security breach in blockchain technology and gave the developers of the Singapore-based Uppsala Foundation idea to create the Sentinel Protocol project. Core team: Patrick Kim (founder and CEO, has experience with Cisco, Palo Alto Networks, Fortinet, F5 Network and Darktrace). HM Park (co-founder, head of operations, worked at F5 Networks, Darktrace, Penta Security Systems). John Kirch (chief evangelist, worked at Darktrace, Watchguard, Softbank, Bank of America). Dayeol Lee (Lead Developer, graduated from the University of California, Berkeley, received a doctorate in computer science, a security systems specialist, and previously worked at companies such as Penta Security Systems, Inc. and WINS Co., Ltd.). Guo Feng (lead developer, worked on the Singapore Exchange, Accenture, and NCS). Overview of Main Features Although blockchain technology is aimed at ensuring the confidentiality of personal data, the lack of a guarantee of confirmation of the user’s identity does not allow him to take part in financial services and projects. A blockchain consortium could be a way out of this situation, although it is associated with some drawbacks of public decentralization. The creators of the Sentinel Protocol offer their approach to solving this problem. The Security Intelligence Platform for Blockchain (SIPB or Sentinel Protocol) has the following security features: Threat database (TRDB); Built-in secure wallet with machine learning (S-Wallet); Split Isolated Malware Analysis Environment (D-Sandbox). Threat Database TRDB immediately solves two problems related to current cyber security threats. The first is a centralized database of security companies. Storing information about threats in one centralized location makes the data vulnerable to manipulation and abuse. The database becomes an obvious target of the Sybil attack, a server is hacked, and the service is interrupted. This is the fundamental problem of the centralized client-server model in the modern Internet. The second problem is the lack of common knowledge among companies specializing in providing IT security. The more risk information collected, the higher the likelihood of preventing cyber crime. This is due to the lack of incentives for such companies to join and collaborate to create one comprehensive database. Thanks to the collective intelligence, TRDB is able to efficiently collect data about hackers, malicious links, phishing addresses, virus software, etc. TRDB is updated only by security experts to eliminate systematic errors, such as false positives. However, ordinary users can also participate in this process in two ways – through the functions of automatic and manual reporting. In the first case, unknown threats will be automatically detected by the security system of the wallet based on the machine learning mechanism and sent to the database. Manual reporting allows the user to report risks. The community will subsequently verify this information. TRDB will be provided in the form of an API so that this information will be available to any person or organization. S-Wallet S-Wallet has the functionality of antivirus software, but it also has a fundamental difference. Antivirus software responds best to new threats only after receiving the latest updates via a centralized server. This approach is ineffective against new unknown threats, such as zero-day attacks. S-Wallet analyzes threats, their trends, and history to respond to unknown attacks. S-Wallet uses collective intelligence by connecting to TRDB and provides essential security services, such as cryptocurrency address filtering; URL/URI filtering; data analysis; search and detect fraud risk. The fraud detection system (FDS) is based on machine learning technology operates on all distributed registers and identifies transactions that could potentially be fraudulent, thereby preventing secondary damage. D-Sandbox D-Sandbox is a security mechanism for running untested programs and code on a separate virtual machine without risk to the entire system or host. This feature is based on analysis using the collective mind. D-Sandbox has two key benefits. Firstly, this approach has significant economic benefits. This ensures infinite scaling across distributed systems and is limited in operation only by the potential of virtual machines. The second advantage is that D-Sandbox is not only able to solve the problem of loss of computing power using the PoW algorithm, but is also capable of creating a better security ecosystem. The computational capability of the Sentinel Protocol network nodes can be used for additional analysis to detect malware. In the end, the advantage of a decentralized system is that free resources can be used where they are needed. Moreover, individual users will help by using D-Sandbox through a virtual machine to improve the overall security of the ecosystem. Sentinel Protocol Ecosystem One of the biggest obstacles to business continuity in the cryptocurrency industry is security. Recently, the number of customer hacking incidents and costs has increased significantly, and security systems could not cope with a threat level. The Sentinel Protocol overcomes this problem, which security experts are working on in the field of cryptocurrency technologies by combining collective intelligence. By joining the Sentinel Protocol community, users of digital currencies can easily get knowledge and help on all security issues. They can also use security solutions provided by the Sentinel Protocol. This approach is aimed at ensuring the overall security of the cryptographic world and its prosperity based on the fundamental principle of decentralization. Theft Protection System While a large number of cryptocurrency applications are entering the market every day, there is currently no system for checking the integrity of digital assets. This means that it is impossible to track and identify the stolen virtual money. To fight this, the Sentinel Protocol will act like bank card providers that block plastic cards in case they are stolen or lost. The system will track all stolen cryptocurrencies and pass this information to providers of crypto resources. Then, stolen digital assets will be tagged and will not be used to exchange, pay, or convert to fiat money. Prevent Transaction Distortion Addresses registered as fraudulent and all related addresses will be entered into the database, which will be available to all system participants in real time. One of the examples of this approach is an ICO fishing, in which thousands of people participate in a short period of time. Even if the hacker changes his address and transfers his funds to him, all users will be automatically notified of the new suspicious address. This can completely change the security industry paradigm, as there is currently no such platform that could provide users with such information. As of today, there is merely no systematic approach to identifying suspicious persons and ensuring the protection of users from potential damage. Sentinel Protocol Consensus The platform uses a delegated proof of stake algorithm (DPoS), presented by BitShares and invented by Daniel Larimer. The “guards” appointed by employees of the Uppsala Foundation are a group of trusted institutions or individuals with the necessary qualifications, including security teams on servers, employees of specialized research firms or a group of white hackers. All of them will be certified to confirm their status and experience. They will receive points for work performed, such as identifying threats and fraudsters. Based on their effectiveness, users will be able to vote for a particular “guard,” increasing or decreasing its reputation. If the actions of the “guard” dishonest in his hand are harmful, he will lose his reputation. Trading and Liquidity Ticker – UBT Major exchanges – Bitrex, Ubbit UPP token price $0.0134082748 (+3.82%); 0.0001487522 ETH; 0.00000391 BTC 24h Volume $649,370 Market Cap $3,092,586 Returns since ICO: 0.11x USD; 0.73x ETH; 0.24x BTC Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (1 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... VlaSem 4.9 stars on average, based on 41 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017. Follow @HackedCom Feedback or Requests? Continue Reading Business Project to Watch: Eximchain Published 1 month ago on December 6, 2018 By VlaSem The Eximchain project is designed to help companies organize supply chains. The solutions that will be implemented on the platform are aimed at ensuring the possibility of establishing effective and reliable business connections, transactions and information exchange. Team The American project Eximchain (Export and import on Blockchain) was founded in 2015 at the Massachusetts Institute of Technology. Since then, its authors have created a set of key-based toolkits to transform the global supply chain by integrating it into a platform. The ideas proposed by the project developers are aimed at improving the transparency of the ecosystem. A group of 20 experts and consultants is working on the creation of the platform, including: Hope Lew – Co-founder and CEO, received a bachelor’s degree from Peking University and an MBA from the Massachusetts Institute of Technology, handled international transactions at the Asian branch of UBS for 6.5 years, is the head of the laboratory of the Association of Office Supplies of North America. Juan Sebastian Huertas -Co-founder and technical director, received a bachelor’s degree in computer science from the Massachusetts Institute of Technology, began studying programming at age 13, previously advised many startups on technical aspects. Jiang Xu – Business architect, previously worked at IBM for 14 years, with previous roles as executive project manager and enterprise software distribution manager. Jia Zhang – Business analyst, has been in the supply business since 1994, has been managing global trade finance and international settlement at ICBC for seven years, then took the position of Chief Representative of MS Textiles in China, where she has been working successfully for about ten years. Strategic partners of the project include: blockseed.vc alphabit.fund fbg.capital hashed.com inblockchain.co kenetic.capital signum.capital emurgo.io enuma.io gbic.io YOOsourcing Main Project Goals Eximchain’s authors intend to innovate and change the current supply chain organization system by overcoming barriers, strengthening coordination and increasing confidence in cross-border operations using blockchain technology. The Eximchain platform will offer ample opportunities, from networking with suppliers to inventory management. The product will operate from a public blockchain with a high level of confidentiality. It is ideal for corporate use by supply chain organizations and application developers who need blockchain technology. All stakeholders involved in creating effective supply chains will be able to more effectively and securely cooperate, carry out mutual settlements and exchange information. Partnership with YOOsourcing Eximchain developers have developed a partnership with the YOOsourcing platform, which allows users to verify the authenticity and reliability of suppliers. Thanks to the YOOsourcing partnership, users of mobile applications will be able to fulfill requests from suppliers directly from the supplier’s company profile. The platform has a built-in verification system designed to ensure the accuracy of the displayed information. This will allow suppliers using the Eximchain platform to track their requests, promote new products and develop tactics to attract future business leaders. Using the blockchain technology in the platform will increase confidence in accountability, data storage and agreements between suppliers and buyers on the YOOSourcing platform. Token Digital coins on the platform will be based on the standard ERC-20 protocol. The purpose of their creation is to act as a valid register for the genesis file of the Eximchain main network. The ERC-20 routers will be distributed across the Ethereum blockchain by the corresponding ERC-20 smart contract. They are repurchased for Eximchain’s internal tokens after the network has been launched. With the launch of the main network, Eximchain’s internal tokens will be used to pay for network charges, check state changes, and management functions. They are also designed to access applications built on the Eximchain network, such as smart contracts and products developed using the SDK platform. Advantages of Smart Contract SDK The use of smart contracts for developers provides many advantages and opportunities: Financing. It is carried out through instant and transparent order confirmation and check on the blockchain. Suppliers will be able to receive prepayments, and buyers will be able to use the option of arbitration. Procure-to-Pay. Users will be able to conduct an audit through a finally agreed contract at each stage of the payment procedure. This process will be carried out in real time via the network without the need for trust and the use of a secure protocol. Platforms of suppliers or rating agents will be able to use the “Proof of Existence” (PoE) algorithm to control time, check the integrity of documents and other purposes. This will allow independent verification without the need for data disclosure. Inventory Management. Conducted by sharing real-time demand information to create a supply chain. This will allow participants to improve their inventory plans and automate the alignment process in different registers and systems to save time and reduce costs. Risk mitigation. Eximchain will allow for real-time dynamic monitoring of processes within the supply chain to ensure the visibility of all operations. Participants will be able to control risks through a single function. Price and Liquidity The EXC token price is currently valued at $0.0274281298 (-13.52%), which is equivalent to 0.0002654258 ETH and 0.00000712 BTC. Its 24-hour volume is$18,756 and has an overall market cap of $1,846,090. Returns since ICO: 0.08x USD, which is equivalent to 0.70x ETH and 0.19x BTC. The token is listed on Bilaxy and Idex. Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (1 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... VlaSem 4.9 stars on average, based on 41 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017. Follow @HackedCom Feedback or Requests? Continue Reading Ethereum Price Analysis: ETH/USD at Risk of Fast M... Top 3 Price Prediction Bitcoin, Ripple, Ethereum:... GBP Price Prediction: British Pound Jumps on Growi... Crypto Update: 5 Altcoins to Watch This Week Tron Price Breaks Even For Week After 52% Growth;... Trade Recommendation: NEO Bitcoin’s Price Recovery Stalls as BitMEX Shuts Do... Recent Posts U.S. Stocks Rise on China Stimulus; Theresa May’s Brexit Deal Falters in British Parliament January 15, 2019 Futures Update: Deeper Correction Looms for S&P 500 January 15, 2019 Crypto Update: Coins Retreat After Rally Attempt January 15, 2019 ETH/USD Price Analysis: Ethereum’s “Thirdening” Approaches January 15, 2019 Top 3 Price Prediction Bitcoin, Ripple, Ethereum: The pump doesn’t get any quality jump January 15, 2019 Oil Price Gets Support from China Stimulus Push January 15, 2019 Bitcoin’s Price Recovery Stalls as BitMEX Shuts Down U.S. Accounts January 15, 2019 EOS Price Analysis: EOS/USD Back in Unsettled Territory, as Price Runs into Sellers Again January 15, 2019 Trade Recommendation: NEO January 15, 2019 Moment of Truth January 15, 2019 A part of CCN Hacked.com is Neutral and Unbiased Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com. Trending Altcoins1 week ago Will Ethereum Continue Rally Ahead Of Constantinople Hard Fork? Ethereum1 week ago Price Prediction: Ethereum Relaxes on Its Journey to Constantinople Bitcoin1 week ago Bitcoin Will Reach New Record High in 2019, XRP Could Compete with SWIFT: Weiss Ratings Cryptocurrencies1 week ago 2018 Crypto Crash: Here’s What Actually Caused It Altcoins1 week ago Holochain (HOT) Up 25% On Rising Volume and Positive Weiss Predictions Blockchain1 week ago Your Guide to Precious Metals on the Blockchain Altcoins1 week ago Cardano ADA Jumps 5% as Mainstream Attention Grows Altcoins6 days ago XRP Price Analysis: XRP/USD Explosive Breakout a Matter of Days?