SlideShare a Scribd company logo
AI and Machine Learning for
Analyzing Cryptocurrencies and
the Blockchain
Making cryptocurrencies, crypto assets and blockchains safe and trusted
November, 2019 | Dave Jevans, CEO, CipherTrace
CipherTrace
WHO WE ARE
Global intelligence, compliance, forensics
& security for cryptocurrencies, crypto
assets and blockchains.
Proprietary and Confidential 3
Cryptocurrency Intelligence Solutions
CipherTrace
Anti-money laundering
Financial investigations
Regulatory supervision
Bank risk intelligence
Market intelligence
Global Customers: Banking, Crypto, Government
4Proprietary and Confidential
5Proprietary and Confidential
1,600 Cryptocurrencies Use Blockchain
CipherTrace Intelligence Overlay Network
Across Blockchains and Currencies
6
HOW IT WORKS
Global Moneypots Network
Financial Intel Accounts
Dark Market / Deep Web
Full Blockchain Nodes
Mempool Realtime Data
Verified User Feedback
Private Threat Intelligence
APWG eCrime Exchange
Stolen Cryptocurrencies
Fraudulent ICOs
Ransomware Analysis
Malware Analysis
Honey Pots
Risk-Scored Transactions and Wallets1.5 – 2 million new attributions per week
A C C E S S
A C T I O N A B L E
I N T E L L I G E N C E
P R O P R I E T A R Y M A C H I N E
L E A R N I N G A L G O R I T H M S
O V E R L A Y I N T E L L I G E N C E
N E T W O R K
Rich UI
API
Bayesian
Multi-input Clustering
Inductive Logic
Learning Classifier
Reinforcement
Decision Tree
Association
Similarity
IntelNodesLabsNetwork
Criminal
Dark Market
Terrorist
Ransomware
Stolen Token
Fraudulent ICO
Gambling
Mixer
ATM
Exchange
Proprietary and Confidential
7Proprietary and Confidential
How to get Training Datasets and Labels
8
BitcoinVietnam.com.vn
Bitcurex.com
Bitex.Ia
Bitfinex.com
Bitflyer.jp
Bithumb.com
BitKonan.com
Bitlish
BitMarket
Bitmaszyna
Bitmex.com
Bitnovo.com
B1tNZ.com
bitoasis.net
BitoEX.com
Bitonic
Bitpanda
BtQuick.co
Bitsane
Bitso.com
BITSSA
Bitstamp.net
Bittrex.com
BitVC.com
BitX.co
BitYes.com
BL3P
Bter.com
BTradeAustr
BuyBtc.cz
BX.in.th
C-CEX
C-Cex.com
CampBX.com
CanadianBitcoins.com
Cancoin.co
Casha.com
Cavirtex.com
Ccedk.com
Cex.io
Changelly.com
ChBtc.com
Chilebit
Circle
Clevercoin.com
CobinHood
cobinhood.com
Coin-Swap.net
Coin.mx
Coin.z.com
Coin.z.com/jp/
CoinApult.com
CoinArch.com
Coinava.com
CoinsBank
coinsecure.in
CoinsMarkets
CoinSpot.com.au
Coinsquare.io
CoinTrader.net
Comkort.com
CRXzone
Crypto-Trade.com
Cryptofacilities.com
Cryptomate
Cryptonit.net
Cryptopay.me
Cryptopia.co.nz
Cryptorush.in
Cryptox
Cryptsy.com
Cubits.com
Dagensia.eu
DDEX
Dgex.com
DragonEx
DSX
EasyCoin
EmpoEX.com
ePay.info
EtherDelta
GetBTC
GOC.io
GoCelery.com
GoNetCoins.com
GOPAX
HaoBTC.com
HappyCoins.com
Hashnest.com
HitBtc.com
Blackfrogatm.com
Huobi.com
Igot.com
Indacoin.com
IndependentReserve
Indodax
itBit
Justcoin.com
KKEX
Koinim
Korbit.co.kr
Kraken.com
KuCoin
Kuna
LakeBTC.com
Latoken
LEOxChange
Liqui
…and countless more.
WORLDWIDE COVERAGE
Proprietary and Confidential 9
[EnExchanger | 2019 Nov | http://www.enexchanger.com]
Proprietary and Confidential 10
[Coin ATM Rader | 2018 Sep | https://coinatmradar.com/]
Tracing Ransomware
11
W A N N A C R Y P E T Y A / N O T P E T Y A S A M S A M
B A D R O B O T
J A F F
R A N S O M W A R E G A N D C R A B
Spread Vector: Vulnerability in SMB Protocol (MS17–
010 ) Decryptor:
https://github.com/gentilkiwi/wanakiwi/releases
 Data about
exchanges
around the world
for integration
into your current
AML and
compliance
systems
 Criminal threats
and activity
 Entity monitoring
Spread Vector: ETERNALBLUE/ETERNALROMANCE
SMBv1
-Uses harvested credentials from victims to log
into SMB shares
Decryptor:
https://blog.malwarebytes.com/malwarebytes-
news/2017/07/bye-bye-petya-decryptor-old-versions-
released/
Spread Vector: drive-by from websites. Pretends to be
Adobe Flash installer, requiring manual installation
-EternalRomance exploit as an infection vector
to spread within corporate networks
No decryptor available yet
Spread Vector: web-facing services such as SMB,
RDP, VNC and JBoss are likely the initial access vector
to the network
No Decryption Tool Available Yet.
Spread Vectors: Javascript and Doc downloaders
attached
to e-mails
-Drive-by download using exploit kits
Decryptor Tools are available based on which version
is infecting.
Spread Vector: Necurs Botnet using malicious PDF files
that have an embedded docm file, which in its turn
downloaded an encoded executable.
-Same delivery as Locky, Dridex and Bart are
distributed
Decryptor:
https://www.nomoreransom.org/en/decryption-tools.html
Proprietary and Confidential
12Proprietary and Confidential
Tracing Money Laundering
[BITCOIN MIXER | 2019 Nov | https://bitcoinmix.org/]
Identifying Money Laundering Mixers
[Benjamin Strick at Medium | 2019 Nov | https://medium.com/@benjamindbrown/tracing-syrian-cell-
kidnappers-scammers-finances-through-blockchain-e9c52fb6127d]
Tracing Terrorist Funds
Monitoring Dark Markets
17
Using Machine Learning to Trace Ransomware
• Example: Locky Ransomware
• We encrypt a virtual device and pay off Locky ransomware
Tracing Locky to BTC-e.com
Tracing Addresses At Ransomware
Exchangers
Tracing Thousands of Payoffs Finds These
Ransomware Exchangers
• Automates compliance
• Risk scores transactions
• Enhanced due diligence
Cryptocurrency Anti-Money Laundering (AML)
Exchanges, Funds and MSBs
Training the Model to Identify Large Scale Money
Businesses
23
ML Finds Transaction Processors
24
25Proprietary and Confidential
26Proprietary and Confidential
27Proprietary and Confidential
Cryptocurrency Exchange With and Without
AML Controls
28
EFFECTIVE AML CONTROLS
W I T H A M L C O N T R O L S W I T H O U T A M L C O N T R O L S
Proprietary and Confidential
29Proprietary and Confidential
Cryptocurrency AML, Security & Intelligence
OUR CAPABILITIES
Financial & Threat
Intelligence
Cryptocurrency Anti-Money
Laundering (Crypto AML)
Financial Investigations
Regulatory and Audit
Thank you.
dave@ciphertrace.com

More Related Content

What's hot

Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute
 

What's hot (20)

Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
OSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigacionesOSINT e Ingeniería Social aplicada a las investigaciones
OSINT e Ingeniería Social aplicada a las investigaciones
 
IDOR Know-How.pdf
IDOR Know-How.pdfIDOR Know-How.pdf
IDOR Know-How.pdf
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilities
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 

Similar to AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain

Similar to AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain (20)

How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Let’s Talk Crypto
Let’s Talk CryptoLet’s Talk Crypto
Let’s Talk Crypto
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 
Crypto currency the bitcoin
Crypto currency the bitcoinCrypto currency the bitcoin
Crypto currency the bitcoin
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Why is a crypto wallet the gateway to Web3.
Why is a crypto wallet the gateway to Web3.Why is a crypto wallet the gateway to Web3.
Why is a crypto wallet the gateway to Web3.
 
Cryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for BeginnersCryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for Beginners
 
Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019
 
Bitcoin and the Blockchain: Financial Quagmire or Evolutionary Stampede?
Bitcoin and the Blockchain: Financial Quagmire or Evolutionary Stampede? Bitcoin and the Blockchain: Financial Quagmire or Evolutionary Stampede?
Bitcoin and the Blockchain: Financial Quagmire or Evolutionary Stampede?
 
Bitcoins
BitcoinsBitcoins
Bitcoins
 
All thinks about Cryptocurrency
All thinks about Cryptocurrency All thinks about Cryptocurrency
All thinks about Cryptocurrency
 
Attention Backed Assets - Princeton Ethereum Meetup - 19 Jan 2017
Attention Backed Assets - Princeton Ethereum Meetup - 19 Jan 2017Attention Backed Assets - Princeton Ethereum Meetup - 19 Jan 2017
Attention Backed Assets - Princeton Ethereum Meetup - 19 Jan 2017
 
Attention Backed Assets - Princeton Ethereum Meetup - 19 jan 2017 - final
Attention Backed Assets - Princeton Ethereum Meetup - 19 jan 2017 - finalAttention Backed Assets - Princeton Ethereum Meetup - 19 jan 2017 - final
Attention Backed Assets - Princeton Ethereum Meetup - 19 jan 2017 - final
 
Bitcoin Startup Landscape - Q2 2014
Bitcoin Startup Landscape - Q2 2014Bitcoin Startup Landscape - Q2 2014
Bitcoin Startup Landscape - Q2 2014
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
 
Cryptocurrency: Guide for the beginner
Cryptocurrency: Guide for the beginnerCryptocurrency: Guide for the beginner
Cryptocurrency: Guide for the beginner
 
Cryptocurrency: Guide for the beginner
Cryptocurrency: Guide for the beginnerCryptocurrency: Guide for the beginner
Cryptocurrency: Guide for the beginner
 
The blockchain
The blockchainThe blockchain
The blockchain
 

More from Rakuten Group, Inc.

More from Rakuten Group, Inc. (20)

コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
 
楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のり楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のり
 
What Makes Software Green?
What Makes Software Green?What Makes Software Green?
What Makes Software Green?
 
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
 
DataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組みDataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組み
 
大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開
 
楽天における大規模データベースの運用
楽天における大規模データベースの運用楽天における大規模データベースの運用
楽天における大規模データベースの運用
 
楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー
 
楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割
 
Rakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdfRakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdf
 
The Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfThe Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdf
 
Supporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdfSupporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdf
 
Making Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdfMaking Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdf
 
How We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdfHow We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdf
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech info
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech info
 
OWASPTop10_Introduction
OWASPTop10_IntroductionOWASPTop10_Introduction
OWASPTop10_Introduction
 
Introduction of GORA API Group technology
Introduction of GORA API Group technologyIntroduction of GORA API Group technology
Introduction of GORA API Group technology
 
100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情
 
社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャー社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャー
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain