Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 53. (Read 14803 times)

newbie
Activity: 18
Merit: 0
May 25, 2018, 12:15:29 PM
I'm still interested about the algirithm. Has it passed any scientific tests?

Our SIZE algorithm is protected by 23 international patents and was successfully tested in the Cavendish Laboratory at Cambridge University in the UK.

Totally.

Got to be a good price too.
newbie
Activity: 14
Merit: 0
May 25, 2018, 11:57:46 AM
I'm still interested about the algirithm. Has it passed any scientific tests?

Our SIZE algorithm is protected by 23 international patents and was successfully tested in the Cavendish Laboratory at Cambridge University in the UK.

Totally.
newbie
Activity: 56
Merit: 0
May 25, 2018, 11:35:05 AM
How does it compare to other players on the market?

You mean all these giants like Microsoft and Amazon?

Yeah, exactly.

It'll be hard to compete with them.

Got to offer something totally new to stand a chance there.
newbie
Activity: 77
Merit: 0
May 25, 2018, 11:29:28 AM
How does it compare to other players on the market?

You mean all these giants like Microsoft and Amazon?

Yeah, exactly.

It'll be hard to compete with them.
newbie
Activity: 14
Merit: 0
May 25, 2018, 11:21:05 AM
How does it compare to other players on the market?

You mean all these giants like Microsoft and Amazon?

Yeah, exactly.
newbie
Activity: 66
Merit: 0
May 25, 2018, 11:12:35 AM
How does it compare to other players on the market?

You mean all these giants like Microsoft and Amazon?
newbie
Activity: 14
Merit: 0
May 25, 2018, 08:58:51 AM
How does it compare to other players on the market?
newbie
Activity: 44
Merit: 0
May 25, 2018, 08:40:41 AM
I'm still interested about the algirithm. Has it passed any scientific tests?

Our SIZE algorithm is protected by 23 international patents and was successfully tested in the Cavendish Laboratory at Cambridge University in the UK.

Thank you. That's helpful.
copper member
Activity: 112
Merit: 0
May 25, 2018, 08:31:19 AM
I'm still interested about the algirithm. Has it passed any scientific tests?

Our SIZE algorithm is protected by 23 international patents and was successfully tested in the Cavendish Laboratory at Cambridge University in the UK.
newbie
Activity: 44
Merit: 0
May 25, 2018, 08:21:00 AM
I'm still interested about the algirithm. Has it passed any scientific tests?
newbie
Activity: 56
Merit: 0
May 25, 2018, 08:12:57 AM
I still can't understand about the miners. Anyone can become a miner?

Even retired people and can be miners, I think.
copper member
Activity: 112
Merit: 0
May 25, 2018, 08:04:19 AM
I still can't understand about the miners. Anyone can become a miner?

Yes. They provide memory from their devices for rent and receive the remuneration via blockchain.
newbie
Activity: 18
Merit: 0
May 25, 2018, 07:55:42 AM
I still can't understand about the miners. Anyone can become a miner?
newbie
Activity: 98
Merit: 0
May 25, 2018, 07:47:43 AM
How often does your team uses outsorce specialists? Or you have all the profs you need right at your team? I mean your team is spread around the world, I bet you don't have any headquarter.  Smiley
newbie
Activity: 44
Merit: 0
May 25, 2018, 07:37:15 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Let us better get to the project.
newbie
Activity: 56
Merit: 0
May 25, 2018, 07:12:08 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Yeah, dude. I think it's true. The situation is pretty sad.

These guys say they've got a new algorithm that works better than all modern protection systems?

What advantages does it have?

You can read in details on the site www.myidm.io

Thank you, I'll take a look. But maybe you can tell in a few words?

This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.

That sounds rather exciting.

As I understand, in this case you have no need to use a data-centre.

Yeah, and that sounds really good cause they take too much space and eveN damage the environment.
newbie
Activity: 77
Merit: 0
May 25, 2018, 07:03:17 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Yeah, dude. I think it's true. The situation is pretty sad.

These guys say they've got a new algorithm that works better than all modern protection systems?

What advantages does it have?

You can read in details on the site www.myidm.io

Thank you, I'll take a look. But maybe you can tell in a few words?

This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.

That sounds rather exciting.

As I understand, in this case you have no need to use a data-centre.
newbie
Activity: 66
Merit: 0
May 25, 2018, 06:54:22 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Yeah, dude. I think it's true. The situation is pretty sad.

These guys say they've got a new algorithm that works better than all modern protection systems?

What advantages does it have?

You can read in details on the site www.myidm.io

Thank you, I'll take a look. But maybe you can tell in a few words?

This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.

That sounds rather exciting.
copper member
Activity: 112
Merit: 0
May 25, 2018, 06:45:49 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Yeah, dude. I think it's true. The situation is pretty sad.

These guys say they've got a new algorithm that works better than all modern protection systems?

What advantages does it have?

You can read in details on the site www.myidm.io

Thank you, I'll take a look. But maybe you can tell in a few words?

This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information.
As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.
newbie
Activity: 14
Merit: 0
May 25, 2018, 06:35:12 AM
Hi, everyone. It seems to me that this algorithm for data protection is something really new.

I agree because nowadays there are too many problems with data storage.

Yeah, all these hackers who steal your photos and private information from the cloud.

I don't think any system can save 100% of data.

Yeah, dude. I think it's true. The situation is pretty sad.

These guys say they've got a new algorithm that works better than all modern protection systems?

What advantages does it have?

You can read in details on the site www.myidm.io

Thank you, I'll take a look. But maybe you can tell in a few words?
Pages:
Jump to: