Name | Sym. | Description ----------------|-------|------------------------------------------ Bitcoin | BTC | Digital gold Ethereum | ETH | Programmable contracts and money Bitcoin Cash | BCH | Bitcoin clone Ripple | XRP | Enterprise payment settlement network Litecoin | LTC | Faster Bitcoin Dash | DASH | Privacy-focused Bitcoin clone NEO | NEO | Chinese-market Ethereum NEM | XEM | Batteries-included digital assets Monero | XMR | Private digital cash Ethereum Classic| ETC | Ethereum clone IOTA | MIOTA | Internet-of-things payments Qtum | QTUM | Ethereum contracts on Bitcoin OmiseGO | OMG | Banking, remittance, and exchange Zcash | ZEC | Private digital cash BitConnect | BCC | Madoff-like investment fund Lisk | LSK | Decentralized applications in JavaScript Cardano | ADA | Layered currency and contracts Tether | USDT | Price = 1 USD Stellar Lumens | XLM | Digital IOUs EOS | EOS | Decentralized applications on WebAssembly Hshare | HSR | Blockchain switchboard Waves | WAVES | Decentralized exchange and crowdfunding Stratis | STRAT | Decentralized applications in C# Komodo | KMD | Decentralized ICOs Ark | ARK | Blockchain switchboard Electroneum | ETN | Monero clone Bytecoin | BCN | Privacy-focused cryptocurrency Steem | STEEM | Reddit with money voting Ardor | ARDR | Blockchain for spawning blockchains Binance Coin | BNB | Pay Binance exchange fees Augur | REP | Decentralized prediction market Populous | PPT | Invoice trading futures Decred | DCR | Bitcoin with alternative governance TenX | PAY | Cryptocurrency credit card MaidSafeCoin | MAID | Rent disk space BitcoinDark | BTCD | Zcoin close BitShares | BTS | Decentralized exchange Golem | GNT | Rent other people's computers PIVX | PIVX | Inflationary Dash clone Gas | GAS | Pay fees on Neo TRON | TRX | In-app-purchases Vertcoin | VTC | Bitcoin clone MonaCoin | MONA | Japanese Dogecoin Factom | FCT | Decentralized record keeping Basic Attention | BAT | Decentralized ad network SALT | SALT | Cryptocurrency-backed loans Kyber Network | KNC | Decentralized exchange Dogecoin | DOGE | Serious meme bitcoin clone DigixDAO | DGD | Organisation manages tokenized gold Veritaseum | VERI | Vaporware Walton | WTC | IoT Blockchain SingularDTV | SNGLS | Decentralized Netflix Bytom | BTM | Physical assets as tokens Byteball Bytes | GBYTE | Decentralized database and currency GameCredits | GAME | Video game currency Metaverse ETP | ETP | Chinese Ethereum plus identity GXShares | GXS | Decentralized Chinese Equifax Syscoin | SYS | Decentralized marketplace Siacoin | SC | Rent disk space Status | SNT | Decentralized application browser 0x | ZRX | Decentralized exchange Verge | XVG | Privacy Dogecoin Lykke | LKK | Digital asset exchange Civic | CVC | Identity and Authentication App Blocknet | BLOCK | Decentralized exchange Metal | MTL | Payments with rewards program Iconomi | ICN | Digital asset investment funds Aeternity | AE | Decentralized apps (prototype) DigiByte | DGB | Faster Bitcoin Bancor | BNT | Token Index Funds Ripio Credit | RCN | Co-signed Cryptocurrency Loans ATMChain | ATM | Advertising network Gnosis | GNO | Decentralized prediction market VeChain | VEN | Supply chain item IDs Pura | PURA | Cryptocurrency Particl | PART | Privacy marketplace and chat KuCoin Shares | KCS | Profit-sharing exchange fees Bitquence | BQX | Mint for cryptocurrency investments FunFair | FUN | Decentralized casino ChainLink | LINK | External data for contracts Power Ledger | POWR | Airbnb for electricity Nxt | NXT | Cryptocurrency and marketplace Monaco | MCO | Cryptocurrency credit card Cryptonex | CNX | Zerocoin clone MCAP | MCAP | Mining investment fund Storj | STORJ | Rent disk space ZenCash | ZEN | Privacy-focused Bitcoin clone Nexus | NXS | Bitcoin clone Neblio | NEBL | Decentralized application platform Zeusshield | ZSC | Decentralized insurance Streamr DATAcoin| DATA | Real-time data marketplace ZCoin | XZC | Private digital cash NAV Coin | NAV | Bitcoin with private transactions AdEx | ADX | Advertising exchange Open Trading | OTN | Decentralized exchange SmartCash | SMART | Zcoin clone with rewards Bitdeal | BDL | Bitcoin clone Loopring | LRC | Decentralized exchange Edgeless | EDG | Decentralized casino FairCoin | FAIR | Bitcoin that rewards savers
Sunday, November 19, 2017
100 cryptocurrencies described in four words or less
Alibaba invests $2.9B in hypermarket operator Sun Art to continue its offline retail push
Alibaba is continuing its expansion into offline retail after the Chinese e-commerce giant bought up more than one-third of one of Chinese most prolific operators of hypermarket stores.
The firm announced today it has spent HK$22.4 billion (around US$2.88 billion) to acquire of 36.16 percent in Sun Art Retail Group, a Hong Kong-listed business that operates 446 hypermarkets across 224 cities in mainland China.
The deal makes Alibaba the second largest shareholder in the business, which has a market cap of over US$10 billion. Ruentex, the shareholder that sold to Alibaba, will retain a 4.67 share while French retailer Auchan Retail owns a dominant 36.18 percent.
The Information was first to report on the investment before it was announced on Monday.
The deal will draw inevitable comparisons to Amazon’s acquisition of Whole Foods for $13.7 billion this year, but that would be misplaced. The Whole Foods deal marked a major point for Amazon’s entry into physical retail, however Alibaba’s move into offline began years ago and this is only the largest part of that strategy.
Alibaba bought a 35 percent slice of department store operator InTime in 2014 and then gobbled up 20 percent of retail giant Suning for $4.6 billion in 2015, but it foot the pedal on the gas in 2017. In January, it snapped up the remainder of InTime and took the company private, while in May it invested in supermarket brand Lianhua.
The focus of these deals is to offer a bridge between online and offline commerce, both for users and retailers themselves. Alibaba believes that it can use the colossal amounts of data it picks up through its e-commerce and payment services to improve the consumer experience in-store, while also optimizing fulfillment and stock management. Beyond online services like Tmall for brands and its Taobao marketplace, it can also leverage Alipay — its mobile payment service with over 500 million users — and Cainiao, the logistics offshoot it recently took full control of.
“Physical stores serve an indispensable role during the consumer journey, and should be enhanced through data-driven technology and personalized services in the digital economy,” Alibaba CEO Daniel Zhang said in a statement.
“By fully integrating online and physical channels together with our partners,
we look forward to delivering an original and delightful shopping experience to Chinese consumers,” he added.
we look forward to delivering an original and delightful shopping experience to Chinese consumers,” he added.
That’s already playing out. The Chinese internet giant operates its own hybrid store called Hema, where consumers can purchase items using unmanned payment checkouts or order them for delivery. Beyond a taste of the future, the store serves as an incubation lab where Alibaba can develop new ideas for retailers like Sun Art, InTime and Suning.
Alibaba’s new partners aren’t slouches, however. Auchan also operates unmanned payment kiosk services in China. Together, the three investors in Sun Art pledged to introduce “a new shopping experience to China’s 1.3 billion consumers.”
This retail convergence in China isn’t only being driven by Alibaba. Rival JD.com invested in Yonghui in 2015.
Authorities serve Apple a warrant for Texas shooter’s iPhone
Two weeks ago today, 26 people were killed by a gunman at First Baptist Church in Sutherland Springs, Texas. Two phones were discovered at the scene: older push-button LG and what local news described as a “blood spattered” Apple iPhone SE. Now local law enforcement has served Apple with a search warrant in order to retrieve information from the smartphone.
The news has echoes of a recent spat between Apple and the FBI over a mass shooting in San Bernadino, California, in late 2015. Apple appears to have been proactive this time around. The Tuesday following the murders, the FBI held a press conference noting the existence of one of two phones, without revealing the make, as it didn’t want to “tell every bad guy out there what phone to buy.”
As reported by The Washington Post, the mystery handset was indeed an iPhone. Apple reached out to law enforcement after the press conference, offering technical assistance in getting onto the device. The company, it seems, could have provided help early on, without much legal wrangling or more software controversial backdoors.
For one thing, as morbid as it may be, TouchID (unlike FaceID, apparently) can be used to unlock a phone even after the owner of a fingerprint has died. In spite of issuing a warrant dated November 9 (two days after the press conference), however, an Apple spokesperson has since confirmed with TechCrunch that as of this writing, law enforcement has yet to contact the company for technical assistance in helping unlock the device.
The offer is likely still on the table, if law enforcement is willing to accept. Apple no doubt would like to be in a position of assisting in uncovering a potential motive or other useful information without having to employee the encryption-breaking tactics that were asked of the company in the wake of San Bernadino. After that event, Tim Cook issued an open letter, stating,
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
In that case, the FBI ultimately withdrew its court order, after discovering an alternative method for unlocking the device. Given the assistance Apple could potentially offer up, having to create an exploitable backdoor could perhaps be avoided once again.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
Subscribe to:
Posts (Atom)