Mikel  Okuneva

Mikel Okuneva

1600549200

Oracles in DeFi Systems: Off-Chain Aggregation vs Centralized Solutions

DeFi projects are changing the way we’re interacting with digital funds. We’re taking real money and transforming them into digital assets that can be used in blockchain-powered applications. Anyway, as much as we want to think that the cryptocurrency world is one that is separated from the actual real-world, it is not. Otherwise, why are you checking the USD price of your tokens?

We are changing the way we are interacting with each other financially, but we are not changing the way we are interacting with the world. Real-world events are influencing our lives and our digital funds. However, blockchain seems to have its own peace. Yes, the price of a token is going up or down. But one ETH will always be one ETH on its blockchain. A block on the blockchain doesn’t know the time. It’s just a block with a number. But blockchain blocks are generated faster or slower based on the external world miners activity.

#defi #cryptocurrency #crypto #oracles-in-defi #off-chain-aggregating-defi #community-curated-oracle-defi #blockchain-oracles #bridge-defi-provable-defi

What is GEEK

Buddha Community

Oracles in DeFi Systems: Off-Chain Aggregation vs Centralized Solutions
Mikel  Okuneva

Mikel Okuneva

1600549200

Oracles in DeFi Systems: Off-Chain Aggregation vs Centralized Solutions

DeFi projects are changing the way we’re interacting with digital funds. We’re taking real money and transforming them into digital assets that can be used in blockchain-powered applications. Anyway, as much as we want to think that the cryptocurrency world is one that is separated from the actual real-world, it is not. Otherwise, why are you checking the USD price of your tokens?

We are changing the way we are interacting with each other financially, but we are not changing the way we are interacting with the world. Real-world events are influencing our lives and our digital funds. However, blockchain seems to have its own peace. Yes, the price of a token is going up or down. But one ETH will always be one ETH on its blockchain. A block on the blockchain doesn’t know the time. It’s just a block with a number. But blockchain blocks are generated faster or slower based on the external world miners activity.

#defi #cryptocurrency #crypto #oracles-in-defi #off-chain-aggregating-defi #community-curated-oracle-defi #blockchain-oracles #bridge-defi-provable-defi

Justyn  Ortiz

Justyn Ortiz

1603465200

Oracle Kills 402 Bugs in Massive October Patch Update

Business software giant Oracle is urging customers to update their systems in the October release of its quarterly Critical Patch Update (CPU), which fixes 402 vulnerabilities across various product families.

Well over half (272) of these vulnerabilities open products up to remote exploitation without authentication. That means that the flaw may be exploited over a network without requiring user credentials.

The majority of the flaws are in Oracle Financial Services Applications (53), Oracle MySQL (53), Oracle Communications (52), Oracle Fusion Middleware (46), Oracle Retail Applications (28) and Oracle E-Business Suite (27). But overall, 27 Oracle product families are affected by the flaws. Users can find a patch availability document for each product, available here.

“Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches,” according to the company’s release on Tuesday. “In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.”

While details of the flaws themselves are scant, two of the critical vulnerabilities disclosed by Oracle rank the highest severity score – 10 out of 10 – on the CVSS scale.

These include a flaw in the self-service analytics component of Oracle Healthcare Foundation, which is a unified healthcare-analytics platform that is part of the Oracle Health Science Applications suite. The flaw (CVE-2020-1953), which can be remotely exploited without requiring any user credentials, requires no user interaction and is easy to exploit, according to Oracle. Affected supported versions include 7.1.1, 7.2.0, 7.2.1 and 7.3.0.

The second severe flaw (CVE-2020-14871) exists in the pluggable authentication module of Oracle Solaris, its enterprise operating system for Oracle Database and Java applications (part of the Oracle Systems risk matrix). The flaw is also remotely exploitable without user credentials, requires no user interaction and is a “low-complexity” attack. Versions 10 and 11 are affected.

Sixty-five of the vulnerabilities also had a CVSS base score of 9.8 (and six had a score of 9.4) out of 10, making them critical in severity.

Oracle did offer some workarounds, advising that for attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Users can also reduce the risk of successful attack by blocking network protocols required by an attack.

However, both these approaches may break application functionality, and Oracle does not recommend that either approach be considered a long-term solution as neither corrects the underlying problem.

“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible,” according to the company.

Oracle releases its CPUs on the Tuesday closest to the 17th day of January, April, July and October.

Previous quarterly updates have stomped out hundreds of bugs across the company’s product lines, including one in April that patched 405. There are also out-of-band updates; in June for instance, Oracle warned of a critical remote code-execution flaw in its WebLogic Server being actively exploited in the wild.

#vulnerabilities #web security #cpu #critical patch update #cve-2020-14871 #cve-2020-1953 #oracle #oracle communications #oracle e-business suite #oracle financial services applications #oracle fusion middleware #oracle mysql #oracle retail applications #quarterly patch update #remote code execution #security update

Ruth  Nabimanya

Ruth Nabimanya

1620633584

System Databases in SQL Server

Introduction

In SSMS, we many of may noticed System Databases under the Database Folder. But how many of us knows its purpose?. In this article lets discuss about the System Databases in SQL Server.

System Database

Fig. 1 System Databases

There are five system databases, these databases are created while installing SQL Server.

  • Master
  • Model
  • MSDB
  • Tempdb
  • Resource
Master
  • This database contains all the System level Information in SQL Server. The Information in form of Meta data.
  • Because of this master database, we are able to access the SQL Server (On premise SQL Server)
Model
  • This database is used as a template for new databases.
  • Whenever a new database is created, initially a copy of model database is what created as new database.
MSDB
  • This database is where a service called SQL Server Agent stores its data.
  • SQL server Agent is in charge of automation, which includes entities such as jobs, schedules, and alerts.
TempDB
  • The Tempdb is where SQL Server stores temporary data such as work tables, sort space, row versioning information and etc.
  • User can create their own version of temporary tables and those are stored in Tempdb.
  • But this database is destroyed and recreated every time when we restart the instance of SQL Server.
Resource
  • The resource database is a hidden, read only database that holds the definitions of all system objects.
  • When we query system object in a database, they appear to reside in the sys schema of the local database, but in actually their definitions reside in the resource db.

#sql server #master system database #model system database #msdb system database #sql server system databases #ssms #system database #system databases in sql server #tempdb system database

Avail Defi wallet development services to ensure efficient fund management

DeFi wallet development services are used for storing the crypto coins and tokens of the users safely. There is no third party involved in the platform. The users need not disclose their personal identity or submit any personal information to register themselves on the wallet. It is non-custodial, easily compatible, utilizes fully encrypted private keys, easy to access, and is completely decentralized. Top-notch security measures are taken to safeguard the users’ funds and data. The different types of DeFi wallets are single-currency, multi-currency, business wallets, web, mobile, hardware, and desktop wallets.

**The typical features of a DeFi wallet are **

Safety measures such as two-factor authentication, biometric authentication, DDoS mitigation, anti-phishing software, SSL implementation, HSM implementation, browser detection security, and multi-signature wallets.
An inbuilt QR code scanner for quick execution of payments.
Whitelisting and blacklisting of wallet addresses.
Merchant integration services.
Seamless integration with numerous payment gateways.
Can be used for the transfer of funds, peer-to-peer payments, preparing invoices, and bill payments.
Is compatible across web, mobile, and desktop.
Protection from inflation, economic downturn, and a market crash,
Auto-denial of duplicate payments helps to prevent chargeback fraud.

Make full use of professional DeFi wallet development services and improve your financial position in no time.

#defi wallet development services, #defi wallet development company, #defi wallet developers, #defi wallet development, #defi wallet development solution, #build your defi wallet,

Samanta  Moore

Samanta Moore

1622870604

In The Google vs Oracle Fight, API Developers Win

On Monday, the United States Supreme Court ruled in favour of Google in its decade long, multibillion-dollar battle with Oracle. The higher court overturned the lower courts’ decision and said Google’s copying of Java API code was fair use. The apex court threw out a lower court ruling that said Android infringed Oracle’s copyrights on the Java software platform. “Google’s copying did not violate the copyright law,” wrote Justice Breyer.

Register for Free Hands-on Workshop: oneAPI AI Analytics Toolkit

Oracle bought Sun Microsystem in 2010 and owns Java now. Oracle accused Google of illegally copying more than 11,000 lines of Java API code to develop Android, the OS that powers over two billion smartphones worldwide.

The story dates back to 2005 when Google acquired Android, a fledgling startup then. Back then, software developers understood and wrote programs using the Java programming language: Sun Microsystems’ brainchild.

To determine if Google’s limited copying of the API is fair, the Court examined the following four factors as per the Copyright Act’s fair use provision:

  1. Purpose and character of the use
  2. Nature of the copyrighted work
  3. Amount and substantiality of the portion used in relation to the copyrighted work as a whole and
  4. Effect of the use upon the potential market for or value of the copyrighted work.

Making a case for Oracle, Justice Thomas, alongside Justice Samuel Alito, said Google’s copying was unfair. They argued that Google decimated Oracle’s market and created a mobile OS, earning tens of billions of dollars every year. However, Justice Breyer said that Google’s copying for the Android system amounted to just 0.4% of the 2.86 million lines of Java API computer code. He likened it to a “gas pedal in a car that tells the car to move faster or the QWERTY keyboard on a typewriter that calls up a certain letter when you press a particular key.”

“Oracle wanted $9 billion in damages from Google.”

Oracle and Google have been locking horns for nearly a decade now over a chunk of code that makes the APIs work. These APIs or Application Program Interfaces are ubiquitous. Everyone uses them, and developers around the world design them using open-source tools. But, what are these APIs?

According to Gartner, APIs(in the context of machine learning):

  • Can make it easier for data scientists to find and choose from the huge variety of available algorithms, experiments.
  • Can enable organisations to build advanced analytics solutions in a faster way.
  • Can address the skill gap in advanced technology.
  • Can help commercialise solutions easily.
  • Can enable ease of ML model choosing.

#opinions #api developers #java #oracle vs google #oracle vs google court ruling #oracle vs google java #sun microsystem java