Un récent billet de weblog de la Banque Centrale Européenne déplore le hazard que représente bitcoin pour le secteur bancaire et les particuliers. Ne tenant pas ses promesses et présentant trop de défaut, Bitcoin livrerait une dernière bataille désespérée pour continuer à exister.
Le baroud d’honneur du bitcoin
Ulrich Bindseil et Jürgen Schaaf sont deux haut-fonctionnaires de la Banque Centrale Européenne qui travaillent sur les infrastructures de paiement. Dans un papier sur le weblog de la BCE le 30 novembre dernier, ils estiment que Bitcoin est en fin de course, à bout de souffle. Selon les fonctionnaires, l’histoire du bitcoin est lengthy processus qui aboutit mécaniquement à sa perte. Revenant sur l’émergence du bitcoin sous l’égide de Satoshi Nakamoto, ils estiment en effet que les promesses de décentralisation et de paiement pair-à-pair n’ont pas été tenus.
Une « bulle » financière dangereuse
Intitulé “Bitcoin’s final stand” l’article évoque notamment la “bulle financière » que représentent le BTC et les autres crypto-actifs. Il faut dire que les dernières années ont été particulièrement tumultueuses pour le secteur, à l’picture de l’effondrement de Terra Luna et de l’affaire FTX, toujours en cours d’instruction. De quoi donner quelques arguments contre les cryptomonnaies, ainsi qu’au bitcoin auxquelles il est associé. Mais c’est bien la query du prix qui signera la fin de cette expérience monétaire digitale, d’après la BCE :
Depuis 2022, le prix du bitcoin fluctue autour de 20 000 USD. Pour les partisans du bitcoin, cette stabilisation apparente est le signe d’une pause sur la voie de nouveaux sommets. Toutefois, il est plus possible qu’il s’agisse d’un dernier sursaut artificiel avant de sombrer dans l’oubli.
Ulrich Bindseil et Jürgen Schaaf, sur le weblog de la BCE
Le BTC dépasse les 40 000 {dollars}
Ainsi, le bitcoin connaîtrait bientôt sa fin. Une mort lente qui prendrait racine dans le désintérêt croissant, face à un prix en berne. Mais il faut croire que le second n’était pas le mieux choisi pour choisir cet argument. Automobile c’est justement un sursaut du marché qui s’est produit… quelques jours plus tard. Certes, le prix reste unstable. Mais ce nouvel élan semble à nouveau repousser la perspective d’une longue descente aux enfers du BTC.
Comme souvent, la hausse du bitcoin apparel à nouveaux les investisseurs. De même, l’intérêt médiatique revient vers cette classe d’actifs assez méconnue du grand public. La longévité honorable de ce réseau sans chief, entièrement autonome, semble assez surprenante. C’est qu’il faut peut-être lui reconnaître une robustesse structurelle, couplée à une certaine utilité sociale. Sans quoi, il ne serait pas utilisé au quotidien par des thousands and thousands de personnes pour échanger de la valeur sans intermédiaire.
Maximisez votre expérience Cointribune avec notre programme ‘Learn to Earn’ ! Pour chaque article que vous lisez, gagnez des factors et accédez à des récompenses exclusives. Inscrivez-vous dès maintenant et commencez à cumuler des avantages.
Martin
Fasciné par l’histoire du Bitcoin et le mouvement cypherpunk, je pense que les citoyens doivent réinvestir le champ de la monnaie. Mon however ? Démocratiser et rendre seen le potentiel de la blockchain et des cryptomonnaies.
DISCLAIMER
Les propos et opinions exprimés dans cet article n’engagent que leur auteur, et ne doivent pas être considérés comme des conseils en investissement. Effectuez vos propres recherches avant toute décision d’investissement.
function launch_google_analytics() {
var el = document.createElement(‘script’);
el.setAttribute(‘type’, ‘text/javascript’);
el.setAttribute(‘async’, true);
el.setAttribute(‘src’, ‘//www.googletagmanager.com/gtag/js?id=G-MCDLS7NHBD’);
document.body.append(el); window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag(‘js’, new Date());
gtag(‘config’, ‘G-MCDLS7NHBD’, {‘anonymize_ip’: true});
gtag(‘config’, ‘G-MCDLS7NHBD’, {‘link_attribution’: true});
gtag(‘consent’, ‘default’, {
‘ad_storage’: ‘denied’,
‘analytics_storage’: ‘denied’
}); }
function launch_linkedin_pixel() {
_linkedin_partner_id = ‘3766114’;
window._linkedin_partner_id = ‘3766114’;
window._linkedin_data_partner_ids = window._linkedin_data_partner_ids || [];
window._linkedin_data_partner_ids.push(_linkedin_partner_id);
(function(l) { if (!l){window.lintrk = function(a,b){window.lintrk.q.push([a,b])}; window.lintrk.q=[]} var s = document.getElementsByTagName(‘script’)[0]; var b = document.createElement(‘script’); b.type=”text/javascript”;b.async = true; b.src=”https://snap.licdn.com/li.lms-analytics/insight.min.js”; s.parentNode.insertBefore(b, s);})(window.lintrk); }
function launch_microsoft_clarity() {
if (typeof window.clarity !== ‘undefined’) {
window.clarity(“consent”);
}
}
function launch_loyalty_program_1world() {
if (typeof window.OWOStorageSolutionManager !== ‘undefined’ && typeof window.OWOStorageSolutionManager.allow !== ‘undefined’) {
window.OWOStorageSolutionManager.allow();
}
}
Node.js v20.18.0, a just-introduced update to the Long-Term Support (LTS) version of the popular asynchronous, event-driven JavaScript runtime, features experimental network inspection support.
Introduced October 3, Node.js 20.18.0 enables users to inspect network activities occurring within a JavaScript application. Still in active development, this capability is initially limited to HTTP and HTTPS modules only. To use this feature, Node.js must be started with the command $ node --inspect-wait --experimental-network-inspection index.js.
Other highlights of Node.js 20.18.0 include a new option for the tls.createSecureContext API. Developers can use tls.create.SecureContext({allowPartialTrustChain:true}) to treat non-self-signed certificates in the trust CA certificate list as trusted.
Google’s Gemini 1.5 Flash-8B AI model is now production-ready. The company said the stable release of Gemini 1.5 Flash-8B has the lowest cost per intelligence of any Gemini model.
Availability was announced October 3. Developers can access gemini-1.5-flash-8B for free via Google AI Studio and the Gemini API. Gemini 1.5 Flash-8B offers a 50% lower price compared to 1.5 Flash and twice the rate limits. Lower latency on small prompts also is featured.
An experimental version of Gemini 1.5 Flash-8B had been released in September as a smaller, faster variant of 1.5 Flash. Flash-8B nearly matches the performance of the 1.5 Flash model launched in May across multiple benchmarks and performs well on tasks such as chat, transcription, and long context language translation, Google said.
For Python, developers now can run Python tests with coverage and get rich results in the editor, Microsoft said. To run tests with coverage, users must select the coverage run icon in Test Explorer or “Run with coverage” from any menu that triggers test runs. The Python extension will run coverage by using the pytest-cov plugin if developers are using pytest, or by using coverage.py if using unittest. Once the coverage is complete, lines are highlighted in the editor for line-level coverage. The Python extension also has added a default problem matcher, simplifying issue tracking in Python code and providing more contextual feedback.
The Source Control Graph in Visual Studio Code 1.94 features a new history item reference picker in the view title, allowing developers to use the reference picker to filter the history items shown in the graph to a different branch or to view multiple branches. The Source Control Graph also expands the list of actions available in the context menu for source control history items. Actions have been added to create a new branch/tag from a history item, cherry-pick a history item, and check out an item.
Business reputation and trust are always vulnerable; companies recognize that a security breach can instantly damage both. Indeed, you’ll get yourself on the morning news and watch your stock drop by 50%. By prioritizing security, businesses aim to safeguard their reputation and customer relationships.
Long-term cost implications mean that focusing initially on cost and scalability might seem feasible, but the long-term financial impact of security incidents can be severe. Most people in the cybersecurity space understand that risk equals money. The more risk, the less your systems are worth, considering the potential for a breach. Prioritizing security can prevent costly breaches and downtime.
Innovation and agility mean that to remain competitive, businesses need to innovate rapidly. A secure cloud infrastructure enables this by providing a reliable foundation for building and deploying new services without compromising data integrity or security.
For Python, developers now can run Python tests with coverage and get rich results in the editor, Microsoft said. To run tests with coverage, users must select the coverage run icon in Test Explorer or “Run with coverage” from any menu that triggers test runs. The Python extension will run coverage by using the pytest-cov plugin if developers are using pytest, or by using coverage.py if using unittest. Once the coverage is complete, lines are highlighted in the editor for line-level coverage. The Python extension also has added a default problem matcher, simplifying issue tracking in Python code and providing more contextual feedback.
The Source Control Graph in Visual Studio Code 1.94 features a new history item reference picker in the view title, allowing developers to use the reference picker to filter the history items shown in the graph to a different branch or to view multiple branches. The Source Control Graph also expands the list of actions available in the context menu for source control history items. Actions have been added to create a new branch/tag from a history item, cherry-pick a history item, and check out an item.
Additionally, it also has a separate tool, SAP Data Lake Builder, that can be used to ingest data from SAP. Other specific data ingesting tools on offer include BryteFlow for Oracle, BryteFlow for SQL, BryteFLow for SQL Server, BryteFlow for PostgreSQL, and integrations with Databricks, Teradata, Google BigQuery, and Apache Kafka.
What effect will the acquisition have?
BryteFLow’s existing customers may have to look elsewhere for help with data integration if they use databases other than SingleStoreDB: “Our number one priority is to integrate BryteFlow into SingleStore and bring value to our customers through SingleConnect. We have no plan to sell BryteFlow independently at this time, apart from some special cases,” SingleStore CEO Raj Verma said via email.
But there will be opportunities for SingleStore customers, said Duncan Van Kouteren, research analyst at Nucleus Research. “The acquisition will enable customers to integrate data from various sources while maintaining real-time data analytics functionalities by utilizing BryteFlow’s capabilities such as change data capture (CDC),” he said.
“Many developers use the same context repeatedly across multiple API calls when building AI applications, like when making edits to a codebase or having long, multi-turn conversations with a chatbot,” OpenAI explained, adding that the rationale is to reduce token consumption when sending a request to the LLM.
What that means is that when a new request comes in, the LLM checks if some parts of the request are cached. In case it is cached, it uses the cached version, otherwise it runs the full request.
OpenAI’s new prompt caching capability works on the same fundamental principle, which could help developers save on cost and time.
Putting a trusted execution environment on a PC is useful for more than securing AI. It protects sensitive data, adding a new level of protection beyond at rest and in motion: in use. While it does require more work to define and use a VBS Enclave, it’s worth it to have more security with only limited performance impact.
With Windows 11’s memory integrity tools, a VBS Enclave uses Windows’ integral hypervisor to create a new, isolated, high-privilege area of system memory: Virtual Trust Level 1. Most of your code, and Windows itself, continues to run at Virtual Trust Level 0. VTL 1 is used by a secure version of the Windows kernel, with its own isolated user mode. This is where your VBS Enclave runs, as part of an application that appears to cross the boundary between the two zones. In reality, you’re separating off the VTL 1 enclave and using secure channels to communicate with it from the rest of your application in VTL 0.
Using VBS Enclaves in your applications
So how do you build and use VBS Enclaves? First, you’ll need Windows 11 or Windows Server 2019 or later, with VBS enabled. You can do this from the Windows security tool, via a Group Policy, or with Intune to control it via MDM. It’s part of the Memory Integrity service, so you should really be enabling it on all supported devices to help reduce security risks, even if you don’t plan to use VBS Enclaves in your code.
public static class MyListExtensions
{
public static T GetLastElement(this List list)
{
if(list.Count > 0)
return list[list.Count - 1];
return default(T);
}
}
The GetLastElement is an extension method that returns the last element of a list. You can invoke this extension method using the following code snippet.
List integers = new List { 1, 2, 3, 4, 5, 6, 7, 8, 9 };
int element = integers.GetLastElement();
Console.WriteLine(element);
Overloading an extension method in C#
Similar to other methods, you can also overload an extension method. The following code snippet shows how you can overload the Substring method of the string class to return a substring of a string. This overloaded Substring method takes the starting and ending index and a Boolean as parameters. The Boolean denotes if the returned string should be converted to upper case. If you pass true in this parameter when calling the extension method, the returned string will be converted to upper case.
OpenAI has introduced a public beta of the Realtime API, an API that allows paid developers to build low-latency, multi-modal experiences including text and speech in apps.
Introduced October 1, the Realtime API, similar to the OpenAI ChatGPT Advanced Voice Mode, supports natural speech-to-speech conversations using preset voices that the API already supports. OpenAI also is introducing audio input and output in the Chat Completions API to support use cases that do not need the low-latency benefits of the Realtime API. Developers can pass text or audio inputs into GPT-4o and have the model respond with text, audio, or both.
With the Realtime API and the audio support in the Chat Completions API, developers do not have to link together multiple models to power voice experiences. They can build natural conversational experiences with just one API call, OpenAI said. Previously, creating a similar voice experience had developers transcribing an automatic speech recognition model such as Whisper, passing text to a text model for inference or reasoning, and playing the model’s output using a text-to-speech model. This approach often resulted in loss of emotion, emphasis, and accents, plus latency.