In the end, the majority of the Ethereum community voted to perform a hard fork, and retrieve The DAO investors money. But not everyone agreed with this course of action. This resulted in a split where two parallel blockchains now exist. For those members who strongly disagree with any changes to the blockchain even when hacking occurs there is Ethereum classic. For the majority who agreed to rewrite a small part of the blockchain and return the stolen money to their owners, there is Ethereum.  
There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.[41]
In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[227] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[228]

Using Ethereum’s “Turing complete” smart contract language, Solidity, developers are able to deploy a set of instructions to the blockchain that operate indefinitely with a high degree of finality and fraud-resistance. With the first block being mined in July 2015, Ethereum has since become the largest smart contract platform of its kind, and the second largest blockchain of all time as measured by market capitalization.

We are always looking for feedback on the platform and user suggestions are regularly included in future releases of this price tracking software. The website is currently undergoing development to include price data from all ERC20 tokens as well order book data, blockchain usage data and more. We endeavour to keep the site simple to use with clear data visualizations that help investors stay abreast of the latest Ethereum price movements. We are determined to keep this webapp free from intrusive advertising; please share this website and its content!
The domain name "" was registered on 18 August 2008.[17] On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System[4] was posted to a cryptography mailing list.[18] Nakamoto implemented the bitcoin software as open-source code and released it in January 2009.[19][20][11] Nakamoto's identity remains unknown.[10]
Bitcoin is pseudonymous, meaning that funds are not tied to real-world entities but rather bitcoin addresses. Owners of bitcoin addresses are not explicitly identified, but all transactions on the blockchain are public. In addition, transactions can be linked to individuals and companies through "idioms of use" (e.g., transactions that spend coins from multiple inputs indicate that the inputs may have a common owner) and corroborating public transaction data with known information on owners of certain addresses.[120] Additionally, bitcoin exchanges, where bitcoins are traded for traditional currencies, may be required by law to collect personal information.[121] To heighten financial privacy, a new bitcoin address can be generated for each transaction.[122] 

Computing power is often bundled together or "pooled" to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.[92]
بروتوكول التوجيه بين البوابات (BGP)   بروتوكول التهيئة الآليّة للمضيفين (DHCP) بروتوكول التطبيقات المقيدة (CoAP) نظام أسماء النطاقات (DNS) بروتوكول نقل النصّ الفائق (HTTP) بروتوكول الوصول إلى رسائل الإنترنت (IMAP) بروتوكول النفاذ إلى الدليل البسيط (LDAP) برتوكول نقل أخبار الشبكة (NNTP) بروتوكول التوقيت في الشبكة (NTP) بروتوكول مكتب البريد (POP) بروتوكول معلومات التوجيه (RIP) بروتوكول التدفق في الزمن حقيقي (RTSP) بروتوكول وصف الجلسة (SDP) بروتوكول بدء جلسة (SIP) بروتوكول نقل الملفات (FTP) بروتوكول نقل الملفات البسيط (TFTP) بروتوكول إرسال البريد البسيط (SMTP) بروتوكول إدارة الشبكات البسيط (SNMP) بروتوكول الاتصال الآمن (SSH) بروتوكول تل نت (Telnet) سبيدي (SPDY) مزيد ..