Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 28. (Read 14824 times)

newbie
Activity: 39
Merit: 0
June 07, 2018, 01:03:56 AM
Good to know there’s a platform to help secure things.
newbie
Activity: 39
Merit: 0
June 07, 2018, 12:53:29 AM
Maybe it's a stupid question but If the data is stored in the cloud, how can anyone damage it?

The fact is that all information is duplicated in backup copies according to a specific schedule. However, this method does not fully guarantee the safety of your data.

Now I understand. Thank you for the information.
newbie
Activity: 35
Merit: 0
June 07, 2018, 12:42:46 AM
Maybe it's a stupid question but If the data is stored in the cloud, how can anyone damage it?

The fact is that all information is duplicated in backup copies according to a specific schedule. However, this method does not fully guarantee the safety of your data.
copper member
Activity: 112
Merit: 0
June 07, 2018, 12:30:08 AM
Maybe it's a stupid question but If the data is stored in the cloud, how can anyone damage it?

Despite the fact that this type of storage is called "cloud", the data is stored in physical terrestrial and underground locations called data centers.
newbie
Activity: 39
Merit: 0
June 07, 2018, 12:19:23 AM
Maybe it's a stupid question but If the data is stored in the cloud, how can anyone damage it?
jr. member
Activity: 56
Merit: 1
June 07, 2018, 12:06:32 AM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.

That sounds really wonderful. I think that many people would like to take part in it.

I'd advise to do it to my mom.

I think she would be happy to receive such a possility of getting money.
newbie
Activity: 35
Merit: 0
June 06, 2018, 11:55:34 PM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.

That sounds really wonderful. I think that many people would like to take part in it.

I'd advise to do it to my mom.
newbie
Activity: 72
Merit: 0
June 06, 2018, 11:38:37 PM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.

That sounds really wonderful. I think that many people would like to take part in it.
copper member
Activity: 112
Merit: 0
June 06, 2018, 11:22:55 PM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.
newbie
Activity: 72
Merit: 0
June 06, 2018, 11:09:17 PM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?
copper member
Activity: 112
Merit: 0
June 06, 2018, 10:57:39 PM
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?

What sets IDM apart is that there is no minimum that miners have to lease out and still bring in revenue.
newbie
Activity: 28
Merit: 0
June 06, 2018, 10:40:43 PM
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?
newbie
Activity: 35
Merit: 0
June 06, 2018, 10:27:32 PM
Do you think there is absolutely no way to hack your algorithm?

There are no computing resources or methods in existence today nor are there any anticipated to appear in the near future with the capability of breaking the protection offered by IDM.

It sounds almost fantastic.

BTW, the market of data storage needs this new technology.

I think you sound reasonable. It really looks like a very timely project.

Which can bring profit to its investors, BTW.

This is without any doubt. To its investors and to its miners.
newbie
Activity: 31
Merit: 0
June 06, 2018, 10:14:28 PM
Do you think there is absolutely no way to hack your algorithm?

There are no computing resources or methods in existence today nor are there any anticipated to appear in the near future with the capability of breaking the protection offered by IDM.

It sounds almost fantastic.

BTW, the market of data storage needs this new technology.

I think you sound reasonable. It really looks like a very timely project.

Which can bring profit to its investors, BTW.
newbie
Activity: 72
Merit: 0
June 06, 2018, 09:49:16 PM
Do you think there is absolutely no way to hack your algorithm?

There are no computing resources or methods in existence today nor are there any anticipated to appear in the near future with the capability of breaking the protection offered by IDM.

It sounds almost fantastic.

BTW, the market of data storage needs this new technology.
newbie
Activity: 31
Merit: 0
June 06, 2018, 09:37:02 PM
Do you think there is absolutely no way to hack your algorithm?

There are no computing resources or methods in existence today nor are there any anticipated to appear in the near future with the capability of breaking the protection offered by IDM.

It sounds almost fantastic.
copper member
Activity: 112
Merit: 0
June 06, 2018, 09:23:20 PM
Do you think there is absolutely no way to hack your algorithm?

There are no computing resources or methods in existence today nor are there any anticipated to appear in the near future with the capability of breaking the protection offered by IDM.
newbie
Activity: 35
Merit: 0
June 06, 2018, 09:09:35 PM
Do you think there is absolutely no way to hack your algorithm?
copper member
Activity: 112
Merit: 0
June 06, 2018, 08:58:20 PM
OK. What is the role of the users in the leakage and theft of information?

Hello! Much of the data that is being compromised is information that users have uploaded themselves. There are social networks, cloud storage site, and apps that all can end up using this information in compromising ways. In fact, we use so much Internet traffic that it’s gotten hard to monitor everything that is going on with our own information
newbie
Activity: 49
Merit: 0
June 06, 2018, 08:44:06 PM
OK. What is the role of the users in the leakage and theft of information?
Pages:
Jump to: