Snowflake is going big on one of the world’s most popular programming languages – TechRadar

Snowflake has announced plans to bring Python "to the forefront of its Data Cloud platform with upgrades that extend support for the programming language.

At its annual user conference, Snowflake Summit, the database company announced an expansion of its Snowpark developer framework that will give users easy access to a bounty of open source Python packages and libraries.

Now moving from private beta to public preview, Snowpark for Python promises to "improve programmability for data scientists, data engineers and app developers", Snowflake says.

Snowflake first introduced Snowpark in preview back in January 2021, before pushing the service to general availability earlier this year. Broadly, the objective was to give developers a simple and efficient way to program data in their language of choice.

"Our goal was to eliminate inefficient data pipelines and optimize processes and tasks that companies may be using just to get everyone on the same (data) page, said the firm, at the time of the launch.

Ultimately, Snowpark enables teams with different skill sets to collaborate and work on the same data, process data faster and more easily, and make data security and governance a top priority.

When it first went live, the Snowpark sandbox offered support for Java and Scala only, but the latest update now brings another of the world's most popular programming languages into the fray.

To supplement the rollout of Snowpark for Python, Snowflake also lifted the lid on a series of related upgrades that are currently under development. These include a native integration with Streamlit and other facilities designed to support the development and deployment of machine learning products written in Python.

Separately, the firm announced a private preview for a new service that will allow customers to access data stored in on-premise servers from within the Snowflake ecosystem, affording organizations the benefits of the cloud-based platform without the hassle of data migration.

"We are investing in Python to make it easier for data scientists, data engineers and application developers to build even more in the Data Cloud, without governance trade-offs," said Christian Kleinerman, SVP Product at Snowflake.

"Our latest innovations extend the value of our customers' data-driven ecosystems, enabling them with more access to data and new watts to develop with it in Snowflake. [These capabilities] are changing the way teams experiment, iterate and collaborate with data to drive value."

Disclaimer: Our flights and accommodation for Snowflake Summit 2022 were funded by Snowflake, but the organization had no editorial control over the content of this article.

See more here:
Snowflake is going big on one of the world's most popular programming languages - TechRadar

Top 7 ‘Hot’ Programming Languages of 2022 – ITPro Today

What's the most important programming language to learn in 2022? That's an open question, but one way to answer it is to look at languages that are currently trending.

Some of them are well-established coding languages that have long been popular. Others are newer languages that are just now entering their heyday. Either way, they're languages worth familiarizing yourself with.

Related: Is PHP Dying? No, but It Has an Image Problem

Here's a roundup of what are arguably the trendiest programming languages in 2022.

1. Python: When talking about hot programming languages in 2022, the list must start with Python. Probably no language is having a better year than Python, which recently slid into first place to become the very most popular language of all. You could argue that Python doesn't quite deserve that status, but the fact is that it enjoys it.

Related: COBOL Language Still in Demand as Application Modernization Efforts Take Hold

2. Go: Go (or Golang, as it's formally known) has long been a "cool" programming language partly because it traces its roots to Google (which is a hotbed of coolness, technologically speaking) and partly because it's fast to write, fast to compile, and fast to run.

3. OPA: Open Policy Agent, or OPA, isn't technically a programming language. It's a policy language that lets you define resources using code. That makes it a hot language, however, in a world increasingly obsessed with doing "everything as code."

4. Swift: If you develop anything for the world of Apple whether on macOS, iOS, or any other *OS platform Swift is a language you absolutely need to know today. It's also a relatively easy language to code in, by many accounts.

5. C: C, which turns 50 this year, may be old, but it remains relevant as ever and is still a hot programming language in 2022. It's messy, it's fast, and it's essential for a wide variety of programming tasks.

6. Java: It's arguably hard to get excited about Java a language that is tedious to code in and whose code is relatively slow. But the fact is that Java was the most popular programming language for years, and tons of stuff are still written in it. Whether you actually enjoy coding in Java or not, it remains an important language as of 2022.

7. JavaScript: JavaScript is not the same as Java, but they're similar in that tons of stuff are written in JavaScript, too. If you are creating web apps in particular, JavaScript is probably the most important language for you to learn today.

About the author

Read more:
Top 7 'Hot' Programming Languages of 2022 - ITPro Today

Mayor Bowser Breaks Ground on Modernization of Stead Park Recreation Center | mayormb – Executive Office of the Mayor

(Washington, DC) Today, Mayor Muriel Bowser and community members broke ground on the Stead Park Recreation Center in the Dupont Circle Historic District. The $15.4 million project will preserve the history of Stead Park while modernizing the grounds and expanding the facility to create more accessible, integrated spaces for exercise, play, and community engagement. The project will also deliver the first Net Zero Energy-Ready recreation space within the Department of Parks and Recreation (DPR) portfolio, project-managed by the Department of General Services (DGS). Families in DC love our parks and open spaces, and we love delivering spaces and facilities that meet the needs of our communities which is what we will do right here at Stead Park, said Mayor Bowser. These continued investments and improvements are why the District, for the past two years, has been recognized for having the best park system in the nation. The project consists of a 1.5-acre park and an existing historic carriage house named for Mary Force Stead as the primary building entry. Upon completion in 2023, the project will offer additional indoor recreational spaces, improved playgrounds and outdoor gathering spaces, and improved lighting. The recreation center will also have a solar canopy that includes a high-performing renewable energy system to offset all or most of its annual energy consumption, operating with a net zero energy consumption to save tax dollars.Starting in 2017 we have been engaged with the community on what the future of Stead Park will become, said DGS Director Keith A. Anderson. I am pleased that we are breaking ground on a project that has recreational elements for everyone and that will save on energy costs for the District.The Stead Park modernization will honor Mary Force Steads wish that the space be maintained for the perpetual use of the children of Washington, as noted from the carriage house plaque honoring her memory. The Friends of Stead Park donated $500,000 to support this project.We at DPR are incredibly excited about the modernization of the existing carriage house at Stead and the construction of an addition to the recreation center that will help foster community engagement and provide quality recreational programming in this vibrant neighborhood of Dupont Circle, said DPR Director Delano Hunter.Mayor Bowsers Fiscal Year 2023 Fair Shot Budget invests over $365 million over the next six years to improve parks and recreation facilities across the District. Additionally, the Mayor invested $13.5 million for Recreation for A.L.L. a new DPR initiative to expand recreation offerings and ensure all District residents, particularly young people, have access to high-quality recreational programming.To learn more, visit https://dgs.dc.gov/page/stead-park-recreation-center-project.

Social Media:Mayor Bowser Twitter:@MayorBowserMayor Bowser Instagram:@Mayor_BowserMayor Bowser Facebook:facebook.com/MayorMurielBowserMayor Bowser YouTube:https://www.bit.ly/eomvideos

Continue reading here:
Mayor Bowser Breaks Ground on Modernization of Stead Park Recreation Center | mayormb - Executive Office of the Mayor

Iterative Introduces First Machine Learning Experiment Tracking Extension for Microsoft Visual Studio Code – Business Wire

SAN FRANCISCO--(BUSINESS WIRE)--Iterative, the MLOps company dedicated to streamlining the workflow of data scientists and machine learning (ML) engineers, today announced a free extension to Visual Studio Code (VS Code), a source-code editor made by Microsoft, for experiment tracking and machine learning model development.

VS Code is a coding editor that helps users to start coding quickly in any programming language. The DVC Extension for Visual Studio Code allows users of all technical backgrounds to create, compare, visualize, and reproduce machine learning experiments. Through Git and Iteratives DVC, the extension makes experiments easily reproducible, unlike traditional experiment tracking tools that just stream metrics.

This is an open source VS Code extension for machine learning practitioners looking to accelerate their model development experience, said Ivan Shcheklein, co-founder and CTO of Iterative. It simplifies data scientists' machine learning model development workflows and meets ML modelers where they work. This extension eliminates the need for costly SaaS solutions for experiment tracking, turning VS Code into a native ML experimentation tool, built for developers.

The extension complements the existing VS Code UX with features using the Command Palette, Source Control view, File Tree explorer, and even custom in-editor webviews, to aid data scientists in their model development and experimentation workflows. Users can pull and push versioned data, run and reproduce experiments, and view tables and metrics.

"Beyond the tracking of ML models, metrics, and hyperparameters, this extension also makes ML experiments reproducible by tracking source code and data changes," said Dmitry Petrov, CEO of Iterative. Iteratives experiment versioning technology that was implemented in DVC last year makes this reproducibility possible."

The VS Code extension offers data scientists the ability to view, run, and instantly reproduce experiments with parameters, metrics, and plots all in a single place, as well as manage and version data sets and models. The extension also provides resource tracking so that data scientists can see which data sets and models have changed and allows exploration of all files of a project or model. Other features include live tracking to see how metrics change in real-time, cloud-agnostic data versioning and management, and native plot visualization.

The VS Code extension helps organizations:

DVC, the underlying open-source technology behind the extension, brings agility, reproducibility, and collaboration into the existing data science workflow. It provides users with a Git-like interface for versioning data and models, bringing version control to machine learning and solving the challenges of reproducibility. DVC is built on top of Git and creates lightweight metafiles, which enable the data science and ML teams to efficiently handle large files that otherwise cant be stored.

To learn more about the VS Code extension, check out the blog and get started today.

About Iterative

Iterative.ai, the company behind Iterative Studio and popular open-source tools DVC, CML, and MLEM, enables data science teams to build models faster and collaborate better with data-centric machine learning tools. Iteratives developer-first approach to MLOps delivers model reproducibility, governance, and automation across the ML lifecycle, all integrated tightly with software development workflows. Iterative is a remote-first company, backed by True Ventures, Afore Capital, and 468 Capital. For more information, visit Iterative.ai.

Link:
Iterative Introduces First Machine Learning Experiment Tracking Extension for Microsoft Visual Studio Code - Business Wire

Particles: The Beginning of a New Age in Decentralization – PR Newswire

CINCINNATI and BERLIN, June 16, 2022 /PRNewswire/ -- Pre-seed round tech startup Anomaly Scienceannounced its patent-pending business proposal for "Particles" - a method for the management and fiscal sponsorship of open-source projects, Web3 initiatives, decentralized projects, and tokenization of intellectual property rights through the creation and utilization of smart contracts and blockchain technologies.

"Anomaly Science is headquartered in Cincinnati, Ohio," explained 19-year-old CEO Jacob Haap, "But I knew we needed to be ready to do business in multiple countries. That's why I moved to the European Union."

Haap's vision is to lower the entry-level to computer programming, and potentially other types of business, for people who have ideas but no corporate structure for support.

"(Jacob Haap) is going to make it so that everybody, anybody, can create any kind of breakthrough software with a variety of different programmers who are all going to work independently, and together, at the same time,"said American venture capitalist Tim Draper. "And it's going to be really awesome because all of those programmers (won't) have to deal with the SEC and all that other stuff because they are all under one corporate roof, but they can operate as entrepreneurs. They can have ownership in what they do. I think if you're a programmer, you should talk to Jacob."

Haap is a 2021 graduate of Draper's Hero Training program through Draper University, one of the top pre-accelerator programs in the world.

"I didn't know what to expect when I enrolled forDraper's Hero program," says Haap. This year's cohortfeatured over 80 entrepreneurs from an original applicant pool of over 2,000. The average age of the participants was 29. "As someone who just graduated from high school, I originally felt different from people who had been actively working in the business for years. But very quickly, I realized I was onto an idea with real potential."

During an event called Demo Day, over 80 entrepreneursgathered in San Mateo, California to give pitches to an audience of investors. A panel of judges ranked Haap's presentation third place, adding even more traction to his startup. Since then, Haap took his initial investment, continued to develop his business plan, and built proof-of-concept interfaces for linking crypto walletswith his hybrid source-code repository. "We are ready to take the next step with an investor who sees the amazing potential in the model we have built around Particles," explained Haap.

"Particles open a new door," continued Haap, "enabling greater collaboration and sharing of work, creating knowledge pools and hybrid-source codebases, and a means to do business in our growingly decentralized world that can function across international borders nearly seamlessly."

Anomaly Science is currently trying to start seed round funding with a goal of 500k. This is an opportunity for investors to become part of a transformational approach to doing business.

About Anomaly Science

Anomaly Science is a company building the bridge to Web3, making it easier for decentralized projects to take flight, lowering the level of entry to software development, and giving power back to software developers.

To learn more about Anomaly Science, you can reach us via email:[emailprotected]or visit our websiteanomsci.comto join the waitlist.

Media ContactJacob Haap[emailprotected]+49 175 2954140

SOURCE Anomaly Science

See original here:
Particles: The Beginning of a New Age in Decentralization - PR Newswire

This Week In Security: Pacman, Hetzbleed, And The Death Of Internet Explorer – Hackaday

Theres not one, but two side-channel attacks to talk about this week. Up first is Pacman, a bypass for ARMs Pointer Authentication Code. PAC is a protection built into certain ARM Processors, where a cryptographic hash value must be set correctly when pointers are updated. If the hash is not set correctly, the program simply crashes. The idea is that most exploits use pointer manipulation to achieve code execution, and correctly setting the PAC requires an explicit instruction call. The PAC is actually indicated in the unused bits of the pointer itself. The AArch64 architecture uses 64-bit values for addressing, but the address space is much less than 64-bit, usually 53 bits or less. This leaves 11 bits for the PAC value. Keep in mind that the application doesnt hold the keys and doesnt calculate this value. 11 bits may not seem like enough to make this secure, but keep in mind that every failed attempt crashes the program, and every application restart regenerate the keys.

What Pacman introduces is an oracle, which is a method to gain insight on data the attacker shouldnt be able to see. In this case, the oracle works via speculation attacks, very similar to Meltdown and Spectre. The key is to attempt a protected pointer dereference speculatively, and to then observe the change in system state as a result. What you may notice is that this requires an attack to already be running code on the target system, in order to run the PAC oracle technique. Pacman is not a Remote Code Execution flaw, nor is it useful in gaining RCE.

One more important note is that an application has to have PAC support compiled in, in order to benefit from this protection. The platform that has made wide use of PAC is MacOS, as its a feature baked in to their M1 processor. The attack chain would likely start with a remote execution bug in an application missing PAC support. Once a foothold is established in uprivileged userspace, Pacman would be used as part of an exploit against the kernel. See the PDF paper for all the details.

The other side-channel technique is a new take on an old idea. Hertzbleed is based on the idea that its possible to detect the difference between a CPU running at base frequency, and that CPU running at a boost frequency. The difference between those two states can actually leak some information about what the CPU is doing. Theres a pre-release PDF of their paper to check out for the details. The biggest result is that the standard safeguard against timing attacks, constant-time programming, is not always a reliable security measure.

It works because max frequency is dependent on the processor Thermal Design Power (TDP), the maximum amount of power a CPU is designed to use and amount of heat to dissipate. Different instructions will actually use different amounts of power and generate more or less heat based on this. More heat means earlier throttling. And throttling can be detected in response times. The details of this are quite fascinating. Did you know that even running the same instructions, with different register values, results in slightly different power draw? They picked a single cryptographic algorithm, SIKE, a quantum-safe key exchange technique, and attempted to extract a servers secret key through timing attacks.

There is a quirk in SIKE, also discovered and disclosed in this research, that its possible to short-circuit part of the algorithm, such that a series of internal, intermediary steps result in a value of zero. If you know multiple consecutive bits of the static key, its possible to construct a challenge that hits this quirk. By extension, you can take a guess at the next unknown bit, and it will only fall into the quirk if you guessed correctly. SIKE uses constant-time programming, so this odd behavior shouldnt matter. And here the Hertzbleed observation factors in. The SIKE algorithm consumes less power when doing a run containing this cascading-zero behavior. Consuming less power means that the processor can stay at full boost clocks for longer, which means that the key exchange completes slightly more quickly. Enough so, that it can be detected even over a network connection. They tested against Cloudflares CIRCL library, and Microsofts PQCrypto-SIDH, and were able to recover secret keys from both implementations, in 36 and 89 hours respectively.

There is a mitigation against this particular flaw, where its possible to detect a challenge value that could trigger the cascading zeros, and block that value before any processing happens. It will be interesting to see if quirks in other algorithms can be discovered and weaponized using this same technique. Unfortunately, on the processor side, the only real mitigation is to disable boost clocks altogether, which has a significant negative effect on processor performance.

[Frdric Basse] has a Google Nest Hub, and he really wanted to run his own Linux distro on it. Theres a problem, though. The Nest uses secure boot, and theres no official way to unlock the bootloader. Since when would a dedicated hacker let that stop him? The first step was finding a UART interface, hidden away on some unterminated channels of a ribbon cable. A custom breakout board later, and he had a U-Boot log. Next was to run through the bootup button combinations, and see what U-Boot tried to do with each. One of those combinations allows booting from a recovery.img, which would be ideal, if not for secure boot.

The great thing about U-Boot is that its Open Source under the GPL, which means that the source code should be available for perusal. Find a bug in that source, and you have your secure boot bypass. Open Source also allows some fun approaches, like running portions of the U-Boot code in userspace, and exercising it with a fuzzer. Thats the approach that found a bug, where a block size greater than 512 bytes triggers a buffer overflow. Its a generally safe assumption, as there arent really any USB storage devices with a block size greater than 512.

Never fear, a device like the Raspberry Pi Pico can run TinyUSB, which allows emulating a USB device with whatever block size you specify. A test determined that this approach did result in a repeatable crash on the real device. The code execution is fairly straightforward, writing a bunch of instructions that are essentially noop codes pointing to a payload, and then overwriting the return pointer. Code execution in the can, all that remained was to overwrite the command list and execute a custom U-Boot script. A thing of beauty.

The lowly ping command. How much can a single pair of packets tell us about a network and remote host? According to [HD Moore], quite a bit. For example, take the time given for a ping response, and calculate a distance based on 186 miles per millisecond. Thats the absolute maximum distance away that host is, though a quarter and half of that amount are reasonable lower and upper limits for a distance estimate. TTL very likely started at 64, 128, or 255, and you can take a really good guess at the hops encountered along the way. Oh, and if that response started at 64, its likely a Linux machine, 128 for Windows, and 255 usually indicates a BSD-derived OS.

Receiving a destination host unreachable message is interesting in itself, and tells you about the router that should be able to reach the given IP. Then theres the broadcast IP, which sends the message to every IP in the subnet. Using something like Wireshark for packet capture is enlightening here. The command itself may only show one response, even though multiple devices may have responded. Each of those responses have a MAC address that has can be looked up to figure out the vendor. Another interesting trick is to spoof the source IP address of a ping packet, using a machine you control with a public IP address. Ping every device on the network, and many of them will send the response via their default gateway. You might find an Internet connection or VPN that isnt supposed to be there. Who knew you could learn so much from the humble ping.

Internet Explorer is Really, Truly, Dead. If you were under the impression, as I was, that Internet Explorer was retired years ago, then it may come as a surprise to know that it was finally done in only this past week. This months patch Tuesday was the last day IE was officially supported, and from now on its totally unsupported, and is slated to eventually be automatically uninstalled from Windows 10 machines. Also coming in this months patch drop was finally the fix for Follina, as well as a few other important fixes.

Theres a new record for HTTPS DDOS attacks, set last week: Cloudflare mitigated an attack consisting of 26 million requests per second. HTTPS attacks are a one-two punch consisting of both raw data saturation, as well as server resource exhaustion. The attack came from a botnet of VMs and servers, with the largest slice coming from Indonesia.

Running the free tier of Travis CI? Did you know that your logs are accessible to the whole world via a Travis API call? And on top of that, the whole history of runs since 2013 seems to be available. It might be time to go revoke some access keys. Travis makes an attempt to censor access tokens, but quite a few of them make it through the sieve anyways.

Ever wonder what the risk matrix looks like for TPM key sniffing on boot? Its not pretty. Researchers at Secura looked at six popular encryption and secure boot applications, and none of them used the parameter encryption features that would encrypt keys on the wire. The ironic conclusion? discrete TPM chips are less secure than those built in to the motherboards firmware.

See more here:
This Week In Security: Pacman, Hetzbleed, And The Death Of Internet Explorer - Hackaday

Division of the Arts Opens Two Opportunities for Artists – State of Delaware News – news.delaware.gov

Division of the Arts Opens Two Opportunities for Artists - State of Delaware News

Read the latest news on coronavirus in Delaware. More Info

COVID-19 Vaccines For Children 6 Months to 5 Years Receives Federal Authorization; DE Vaccines to Begin Week of June 20Date Posted: June 18, 2022

DPH Prepares for CDC to Authorize Vaccines for Children Under 5; Urges Safety During Event-Filled WeekendDate Posted: June 18, 2022

DOJ, Wilmington PD Indict Gun Offenders on 75 ChargesDate Posted: June 17, 2022

New Castle Court House MuseumDate Posted: June 16, 2022

John Dickinson Plantation Receives Award of ExcellenceDate Posted: June 15, 2022

Growing Horseshoe Crab Population Supports Migratory Shorebirds along Delaware Bay, Including Threatened Red KnotsDate Posted: June 15, 2022

Division of the Arts Opens Two Opportunities for ArtistsDate Posted: June 14, 2022

Delaware Mortgage Relief Program Approved By U.S. Department Of The TreasuryDate Posted: June 14, 2022

Heritage Commission Book of the Week: GATHs Literary Work and FolkDate Posted: June 13, 2022

Suspected Overdose Deaths for May in Delaware Set New Monthly High TotalDate Posted: June 8, 2022

Student State Board of Education Member Application Due June 24Date Posted: June 8, 2022

Delaware Natural Resources Police Youth Fishing Tournament Winners AnnouncedDate Posted: June 8, 2022

Summer of OpportunityDate Posted: June 8, 2022

Funding Available for Tree-Planting ProjectsDate Posted: June 7, 2022

Heritage Commission Book of the Week: William Hare Master PotterDate Posted: June 6, 2022

DNREC to Present Living Shoreline Social Marketing Webinar June 16Date Posted: June 6, 2022

Governor Carney Announces Judicial NominationsDate Posted: June 3, 2022

State Auditor McGuiness Releases The First of Nineteen Reports on Delawares Public School Staffing LevelsDate Posted: June 3, 2022

DNREC to Propose Major Source Air Pollution Permit Renewal for Delaware City Refining CompanyDate Posted: June 3, 2022

Governor Carney, Members of the General Assembly Announce Gun Safety PackageDate Posted: June 2, 2022

Delaware African and Caribbean Affairs Commission Celebrates National Caribbean-American Heritage MonthDate Posted: June 2, 2022

New Website Helps Families Find Summer Opportunities for Their ChildrenDate Posted: June 2, 2022

FREE New Castle History Camp, July 2529, 2022Date Posted: June 2, 2022

Prohibicin ampliada de las bolsas de plstico para llevar en vigor el 1. de julio de 2022Date Posted: June 2, 2022

Enhanced Plastic Carryout Bag Ban in Effect July 1, 2022Date Posted: June 2, 2022

Stay Cool, Hydrated, And Informed to Prevent Heat-Related IllnessDate Posted: June 1, 2022

Division Of Public Health Launches New Delaware WIC Educational WebsiteDate Posted: June 1, 2022

El Programa P-EBT de Delaware se Expandi a Nios Menores de 6 Aos en Hogares Que Reciben SNAPDate Posted: June 1, 2022

Delawares P-EBT Program Expanded to Children Under Age 6 in Households Receiving SNAPDate Posted: June 1, 2022

DNREC, Division of Public Health Offer Tips About TicksDate Posted: June 1, 2022

The Mezzanine Gallery to Exhibit Explorations through Materiality by Samara WeaverDate Posted: June 1, 2022

Program to Help Foster Youth Pursue Higher EducationDate Posted: May 31, 2022

Governor Carney, First Lady Tracey Quillen Carney Announce Compassionate Champion AwardeesDate Posted: May 31, 2022

Heritage Commission Book of the Week: Pierre S. du Pont IV: Governor of Delaware 1977-1985Date Posted: May 31, 2022

Delaware State Parks Expected to Set Visitation RecordDate Posted: May 27, 2022

Division of the Arts Announces the 2022 Award Winners Exhibition DatesDate Posted: May 27, 2022

Delaware Child Care Professional Bonus Registry Now OpenDate Posted: May 27, 2022

New DMV Support Pollinator Plate Creating a BuzzDate Posted: May 26, 2022

Milford School Psychologist Delaware 2022 Behavioral Health Professional Of YearDate Posted: May 26, 2022

DNREC Announces Beach Access Closures Due to Storm DamageDate Posted: May 26, 2022

Memorial Day Ceremonial EventsDate Posted: May 26, 2022

Governor Carney Formally Extends Public Health EmergencyDate Posted: May 26, 2022

In Another Likely Consequence of Pandemic, Delaware Overdose Deaths Increase 15% in 2021Date Posted: May 25, 2022

Governor Carney Terminates Limited State of Emergency in Kent CountyDate Posted: May 25, 2022

Delaware Emitir Beneficios de Emergencia Mensuales el 26 de MayoDate Posted: May 25, 2022

Delaware Will Issue Monthly Emergency Benefits On May 26Date Posted: May 25, 2022

Governor Carney Announces Governors Summer Fellowship Program Date Posted: May 25, 2022

New Tram Path, Other Improvements to Greet Fort Delaware State Park Visitors This SeasonDate Posted: May 25, 2022

Historical Affairs Programs In June 2022Date Posted: May 25, 2022

May 29th is 529 DayDate Posted: May 25, 2022

Take A Kid Fishing! Events AnnouncedDate Posted: May 25, 2022

Flag Lowering for the Victims at Robb Elementary School in Uvalde, TexasDate Posted: May 24, 2022

Governor Carney Activates Emergency Management Assistance Compact to Support Emergency Response to Barge FireDate Posted: May 24, 2022

Governor Carney Vetoes House Bill 371Date Posted: May 24, 2022

Crews Work to Contain Fire on Barge in Delaware BayDate Posted: May 23, 2022

Heritage Commission Book of the Week: East of the Mason-Dixon Line by Roger E. NathanDate Posted: May 23, 2022

DPH Encourages Delawareans To Consider Masking In Public Amid Rising Covid-19 CasesDate Posted: May 21, 2022

2021 U.S. Road Fatalities Projected Highest in 16 Years, Delaware at 15-year HighDate Posted: May 20, 2022

DHSS to Partner with Habitat for Humanity on Pilot Program for Minor Home Repairs for Older DelawareansDate Posted: May 19, 2022

Click It or Ticket Campaign Reminds Drivers: Buckle Up Every Trip, Every TimeDate Posted: May 19, 2022

Public Encouraged to Avoid Rescuing Young WildlifeDate Posted: May 19, 2022

Nonprofit Security Grant Applications Due June 1, 2022Date Posted: May 17, 2022

Delawares Plastic Carryout Bag Ban July 1, 2022Date Posted: May 17, 2022

DPH Offers Guidance And Resources On How To Navigate The Infant Formula Supply ShortageDate Posted: May 17, 2022

DNREC Names Two to Leadership RolesDate Posted: May 17, 2022

Governor Carney Honors Four Century Farm Families, 2022 Marks 35th Year of Delaware Century Farm ProgramDate Posted: May 16, 2022

Governor Carney Tests Positive for COVID-19Date Posted: May 16, 2022

Holodick Names Top High School Seniors 2022 Secretary ScholarsDate Posted: May 16, 2022

With Delaware Bay Beach Nourishment Projects Complete, DNREC Now Works Toward Restoring Atlantic CoastlineDate Posted: May 16, 2022

DE Heritage Commission Book of the Week: Captain Thomas MacdonoughDate Posted: May 16, 2022

School Behavioral Health Professionals HonoredDate Posted: May 16, 2022

The Wooden World Revealed at Lewes Zwaanendael MuseumDate Posted: May 13, 2022

Concord Pond to Be Treated for Invasive Aquatic Weed HydrillaDate Posted: May 13, 2022

DNREC To Update Vehicle Emission Testing RequirementsDate Posted: May 13, 2022

Dr. Karyl Rattay Announces Departure From Delaware Division Of Public Health Effective June 30, 2022Date Posted: May 13, 2022

Governor Carney Orders Lowering of FlagsDate Posted: May 13, 2022

Delaware Extends Electric Vehicle Rebate ProgramDate Posted: May 12, 2022

High Path Avian Influenza Confirmed In Black Vultures, Poultry Producers Encouraged To Take PrecautionsDate Posted: May 11, 2022

Governor Carney Signs Paid Family Leave LegislationDate Posted: May 11, 2022

Tonieboxes Now Available for Children at Delaware LibrariesDate Posted: May 11, 2022

McGuinesss National COVID-19 Data Quality Audit Template Shapes Public Emergency Response Efforts CountrywideDate Posted: May 10, 2022

DNREC, Delaware Center for the Inland Bays To Host Water Family Fest Saturday, May 14Date Posted: May 10, 2022

ICYMI: Dolly Parton in Delaware for the Imagination Library Statewide CelebrationDate Posted: May 9, 2022

DPH Diabetes & Heart Disease Prevention & Control Program Sponsors 20th Annual Diabetes Wellness ExpoDate Posted: May 9, 2022

Heritage Commissions Book of the Week: Allen McLane Patriot, Solider, Spy, Port CollectorDate Posted: May 9, 2022

US Wind and rsted Conducting Offshore Wind ResearchDate Posted: May 9, 2022

Gov. Carney Celebrates 150th Arbor Day in Rehoboth BeachDate Posted: May 6, 2022

Division of Small Business Launches Innovative New Website Service Designed to Support Delawares Small BusinessesDate Posted: May 6, 2022

DNREC, DEMA Sponsor Delaware Flood Awareness WeekDate Posted: May 6, 2022

Delaware Changes Summer Flounder, Scup and Black Sea Bass Recreational Fishing RegulationsDate Posted: May 5, 2022

DHSS Releases Second Annual Health Care Benchmark Trend ReportDate Posted: May 5, 2022

Drivers Needed for DARTs Upcoming Beach Bus SeasonDate Posted: May 5, 2022

DHSS Launches State Health Care Provider Loan Repayment ProgramDate Posted: May 5, 2022

DTI Announces New Chief Of Administration And Broadband ManagerDate Posted: May 5, 2022

DNRECs Monitoring Shows Overall Good Air Quality in DelawareDate Posted: May 4, 2022

Columbus Organization Will Continue to Connect Individuals to Services, SupportsDate Posted: May 4, 2022

May Is Viral Hepatitis Awareness Month; May 19 Hepatitis Testing DayDate Posted: May 4, 2022

Governor Carney Proclaims May 2022 as Trauma Awareness MonthDate Posted: May 4, 2022

The rest is here:
Division of the Arts Opens Two Opportunities for Artists - State of Delaware News - news.delaware.gov

The prospect of jobs in Web3.0 – The Financial Express

By Guneet Kaur

The new version of the Internet called decentralized web or Web3 or a blockchain-based Internet is trending these days. Recent graduates, as well as professionals from various industries, seem really curious to find out how to land a career in Web3 and its sub-sectors, including Metaverse, Digital assets, and Non fungible tokens (NFTs).

Although there is no hard and fast rule in joining or switching to a new career, what matters is your knowledge and skills. So, anyone looking for a job in Web3 needs to acquire the necessary education or real-world expertise. That said, this article will help you grasp essential insights on how to land a career in Web3.

Learn the basics

Understanding how blockchain technology and cryptocurrency function will put you ahead of the competition. You dont have to be an expert, simply learn the fundamentals. You can learn the basics by doing free courses on Coursera (accessible through financial aid).

Additionally, look for freely available MOOCs (Massive Open Online Courses) such as the one offered by the University of Nicosia titled Introduction to Digital Currencies. The next start date is September 2022, so hurry up! Cointelegraphs Cryptopedia articles may also help you transform from a beginner to an expert in various fields like DeFi, Metaverse, NFTs, etc.

While such courses and MOOCs are more suitable for beginners or non-developers, software engineers and blockchain developers need to learn programming languages like Solidity, Python, Rust, JavaScript, Vyper, etc. GitHub is a great place to store your projects and let others assess and authenticate them.

Get involved and improve your visibility

There are an increasing variety of ways to get involved and help companies discover you. These include meetups, conferences, mentoring programs, and events that exist globally. If you do some research, you should be able to join your first conference this month, such as ETH NYC.

Also, you can apply for a scholarship to join an 18-Week mentoring program called NFT Talents by the Frankfurt School Blockchain Center. The first cohort has already started on 7th June 2022. Stay tuned for the next one!

In addition to the above, you can also start writing blog posts on Medium so that people know that you are contributing to the Web3 space. Consistent engagement on CryptoTwitter is also an ideal way to help others discover your potential. As a developer, you can also add open-source libraries on GitHub (the ones developed by you), and contribute to other projects.

Join communities

Joining Discord, Reddit or Telegram channels of projects in the Web3 space can help you be aware of the opportunities (both paid and non-paid). And if you can add value to the project, such as finding a bug (if you are a developer) or voluntarily promoting a decentralized automated organization or DAO (if you are a marketer), dont be surprised if you get a full-time job offer (of course, a paid one).

Look for employment openings on job sites and platforms

Relying upon someone to send you a job opportunity may not help you get your dream job. In order to be successful in your job hunt, look for open job positions at Web3-centric job boards like web3.career or cryptocurrencyjobs.io. Also, actively apply for jobs on LinkedIn and Indeed. Finally, freelancers can search for opportunities on Upwork, Fiverr, etc.

Start by applying for internships if you are a recent graduate or a beginner in this space. Something is better than nothing; remember! However, do not go for something you wont be working on for long! Consistency is the key to becoming an expert in your area of interest.

Key takeaways

Millions of people have been empowered by blockchain technology to pick how they make a living, providing them options that never existed before. Web3 defies all of the conventional wisdom about how people earn money and spend their time. That said, remote work and getting paid in cryptocurrencies is the new normal!

As Web3 attracts the brightest minds, it will undoubtedly have a juggernaut effect, resulting in the creation of a decentralized Internet unlike anything weve ever seen before. Opportunities are many; you just need to leave your comfort zone and prepare yourself to land a career in Web3.

The author is technology editor, Cointelegraph

Read the original here:
The prospect of jobs in Web3.0 - The Financial Express

BLS signatures on BitcoinPairing-based cryptography: Part 2 – CoinGeek

This post was first published onMedium.

Boneh-Lynn-Shacham(BLS) is a signature scheme based onbilinear pairings.

Compared toECDSAorSchnorrsignatures, it enjoys several salient advantages:

Due to its minimal storage and bandwidth requirements, it has been adopted by multiple blockchains such as Ethereum, Dfinity, Algorand, and Chia. We illustrate how to implement it on Bitcoin natively.

BLS Signatures: the Theory

Hash to Curve: H(m)

In ECDSA, a messagemis hashed into a number. In BLS, we hash it to a point on the elliptic curve.

One naive way is to hash the message and multiply the result with the generator pointGto get a curve point. However, it isinsecure.

To do this securely, we first hash the message using SHA-256 and treat the 256 bit result as the x-coordinate of a point. If no such point exists on the curve, we increment the x-coordinate and try again, till we find the first valid point.

Sign

Signing is trivial. We simply multiply:

pkis the private key andmis the message. Note no random number is needed.Sis just a curve point and can becompressedto 33 bytes, about half the size of an ECDSA signature.

Verify

To verify a signature, we simply compare two pairings:

To see why the verification works,

Bilinear pairingeallows us to move scalarpkfrom the first input to the second.

Implementation on Bitcoin

We have implemented BLS signature verification usingthe pairing library.

Note we let users passy-coordinate directly and verify it, to avoid computing modular square root.

Summary

We have only demonstrated how to verify a single BLS signature on Bitcoin. BLSs main power lies inaggregated signatures and keys. We leave their implementations on Bitcoin as exercises to readers.

***

NOTES:

[1] This approach is called Hash and Pray, which runs in non-constant time. Constant time approach exists, such asFouque and Tibouchi, but are harder to implement.

[2] We assume a curve point with the x-coordinate exists for ease of exposition here. A hash and pray approach can be easily added.

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

Read more:
BLS signatures on BitcoinPairing-based cryptography: Part 2 - CoinGeek

What’s In a Crypto Wallet?: Understanding the Role of Cryptos Essential Tool – Grit Daily

Cryptocurrency is known for not being a beginner-friendly technology, requiring new users to learn a lot of concepts and tools. While this is not surprising due to its highly technical nature, users tend to fall for cognitive biases as they progress through their crypto journey. While not necessarily the case for everybody, it is not uncommon to see clear representations of the Dunning-Kruger effect in so-called veterans.

Probably the greatest example of crypto users overestimating their own knowledge is their understanding of crypto wallets. While Crypto wallets are probably the most important tool when it comes to interacting with crypto and blockchain, most people misunderstand them. Starting with the idea that crypto wallets store cryptocurrency, these misunderstandings can prove disastrous in the long term.

There is also a group of crypto enthusiasts that understand that cryptocurrency wallets dont store crypto but the keys to interact with it. Private and public keys serve different purposes, allowing a range of actions from receiving cryptocurrency to authorizing transactions. To truly understand how these keys allow for such operations, a user would need to have an understanding of cryptography and basic blockchain infrastructure

The understanding of how crypto wallets work gets even more difficult as concepts like custodial, non-custodial, asymmetric cryptography, digital signature, hot/cold wallets, and multisig get thrown around. While it is true that understanding such concepts is not necessary to make use of a cryptocurrency wallet, misunderstanding them must be avoided at all costs. As such, making crypto wallets easy to use without the need to understand the technology is essential.

Making such a wallet might not sound that difficult but in truth, it can be especially complex given the decentralized nature of crypto. Decentralization comes with more freedom of choice at the cost of safeguards, putting developers in a tough spot. With new movements like web3, NFTs, and GameFi gaining momentum, the importance of these decisions continues to increase.

Dilemmas like these are what Robin Guyard, CTO of Laguna; Blake Commagere, Co-founder and COO of Vault12; and Doug Horn, Chief Architect of Telos, sat to discuss during Grit Daily House at Consensus 2022. Rachel Wolfson, Enterprise Blockchain Analyst at CoinTelegraph, moderated the panel titled Whats In a Crypto Wallet? by asking insightful questions on the role wallets are to play in the future of the crypto space.

If you missed the chance to attend Grit Daily House in person and to hear what these experts had to say about this topic, worry not. Not only will you be able to watch the panel in the video below but you can also find other panels on Grit Dailys official YouTube Channel.

Juan Fajardo is a News Desk Editor at Grit Daily. He is a software developer, tech and blockchain enthusiast, and writer, areas in which he has contributed to several projects. A jack of all trades, he was born in Bogota, Colombia but currently lives in Argentina after having traveled extensively. Always with a new interest in mind and a passion for entrepreneurship, Juan is a news desk editor at Grit Daily where it covers everything related to the startup world.

Go here to read the rest:
What's In a Crypto Wallet?: Understanding the Role of Cryptos Essential Tool - Grit Daily