Bitcoin, along with other cryptocurrencies, has been described as an economic bubble by at least eight Nobel Memorial Prize in Economic Sciences laureates, including Robert Shiller,[193] Joseph Stiglitz,[194] and Richard Thaler.[195][14] Noted Keyensian economist Paul Krugman wrote in his New York Times column criticizing bitcoin, calling it a bubble and a fraud;[196] and professor Nouriel Roubini of New York University called bitcoin the "mother of all bubbles."[197] Central bankers, including former Federal Reserve Chairman Alan Greenspan,[198] investors such as Warren Buffett,[199][200] and George Soros[201] have stated similar views, as have business executives such as Jamie Dimon and Jack Ma.[202]
طرح شخص أطلق على نفسه الاسم الرمزي ساتوشي ناكاموتو فكرة بيتكوين للمرة الأولى في ورقة بحثية في عام 2008،[2] ووصفها بأنها نظام نقدي إلكتروني يعتمد في التعاملات المالية على مبدأ الند للند (بالإنجليزية: Peer-to-Peer) ، وهو مصطلح تقني يعني التعامل المباشر بين مستخدم وآخر دون وجود وسيط (كالتورنت). يقول القائمون على بيتكوين إن الهدف من هذه العملة التي طرحت للتداول للمرة الأولى سنة 2009 [3] هو تغيير الاقتصاد العالمي بنفس الطريقة التي غيرت بها الويب أساليب النشر.[4] وفي عام 2016 أعلن رجل الأعمال الأسترالي كريغ رايت أنه هو ساتوشي ناكاموتو مقدما دليلا تقنيا على ذلك ولكن تم كشف زيف أدلّته بسهولة.[5]
Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[77] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8
Ethereum addresses are composed of the prefix "0x", a common identifier for hexadecimal, concatenated with the rightmost 20 bytes of the Keccak-256 hash (big endian) of the ECDSA public key (the curve used is the so called secp256k1, the same as Bitcoin). In hexadecimal, 2 digits represents a byte, meaning addresses contain 40 hexadecimal digits. An example of an Ethereum address is 0xb794F5eA0ba39494cE839613fffBA74279579268. Contract addresses are in the same format, however they are determined by sender and creation transaction nonce.[34] User accounts are indistinguishable from contract accounts given only an address for each and no blockchain data. Any valid Keccak-256 hash put into the described format is valid, even if it does not correspond to an account with a private key or a contract. This is unlike Bitcoin, which uses base58check to ensure that addresses are properly typed. 

Despite the fallout from The DAO hack, Ethereum is moving forward and looking to a bright future. By providing a user-friendly platform that enables people to harness the power of blockchain technology, Ethereum is speeding up the decentralization of the world economy. Decentralized applications have the potential to profoundly disrupt hundreds of industries including finance, real estate, academia, insurance, healthcare and the public sector amongst many others.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.
In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5
The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source software.[11] In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt.[107] After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.[108][109]
We are always looking for feedback on the platform and user suggestions are regularly included in future releases of this price tracking software. The website is currently undergoing development to include price data from all ERC20 tokens as well order book data, blockchain usage data and more. We endeavour to keep the site simple to use with clear data visualizations that help investors stay abreast of the latest Ethereum price movements. We are determined to keep this webapp free from intrusive advertising; please share this website and its content!
بروتوكول التوجيه بين البوابات (BGP)   بروتوكول التهيئة الآليّة للمضيفين (DHCP) بروتوكول التطبيقات المقيدة (CoAP) نظام أسماء النطاقات (DNS) بروتوكول نقل النصّ الفائق (HTTP) بروتوكول الوصول إلى رسائل الإنترنت (IMAP) بروتوكول النفاذ إلى الدليل البسيط (LDAP) برتوكول نقل أخبار الشبكة (NNTP) بروتوكول التوقيت في الشبكة (NTP) بروتوكول مكتب البريد (POP) بروتوكول معلومات التوجيه (RIP) بروتوكول التدفق في الزمن حقيقي (RTSP) بروتوكول وصف الجلسة (SDP) بروتوكول بدء جلسة (SIP) بروتوكول نقل الملفات (FTP) بروتوكول نقل الملفات البسيط (TFTP) بروتوكول إرسال البريد البسيط (SMTP) بروتوكول إدارة الشبكات البسيط (SNMP) بروتوكول الاتصال الآمن (SSH) بروتوكول تل نت (Telnet) سبيدي (SPDY) مزيد .. 
×