jeudi 31 octobre 2013

App replaces doctors’ equipment, enables eye tests anywhere

The Peek Vision app enables roving doctors to give patients a full eye exam using their smartphones.
alttext

Consumers have replaced a number of devices — mp3 players, digital cameras, handheld games consoles — with their smartphones, so it seems possible that the handsets could even replace expensive medical equipment. The Peek Vision app just might be proving that point, enabling roving doctors to give patients a full eye exam using their smartphones.

Developed by members of the International Centre for Eye Health — a research group based at the London School of Hygiene & Tropical Medicine — the app leverages the existing functionalities of today’s smartphones to allow doctors in rural or low-income areas to deliver eye care to citizens in a mobile and inexpensive way. Doctors and optometrists using Peek Vision will be able to check patients’ abilities to see color, test for long and short-sightedness, and also detect the presence of cataracts and other eye conditions. The app uses smartphones’ cameras, flashlights and display to check how the eyes react to stimuli, while doctors can also track the progress of separate patients and also easily keep a record of their geolocation.

The team are currently carrying out research to ensure the app is accurate enough for medical purposes, although a release date and price hasn’t yet been announced. Are there other ways smartphone features could replace professional equipment with a cheap portable alternative?

‘Ghost’ road barrier tricks drivers into stopping

Laservision’s Softstop is a projection that aims to stop drivers from ignoring stop signs by giving the illusion of a physical barrier across the road.
alttext

While the majority of drivers obey road signs, there are some that will dangerously ignore a stop sign if they’re in a rush. Australia’s Laservision has now created the Softstop, a projected sign that gives the illusion of a physical barrier across the road.

Installed at the Sydney Harbour Tunnel in May this year, the Softstop was chosen as an alternative to traditional measures to stop traffic from entering the tunnel when it is unsafe to do so, or to let emergency services gain a more clear route. Instead of being relegated to the side of the road and the peripheral vision of drivers, Laservision’s solution consists of a sheet of water which drops down across the tunnel entrance. A projector then displays a large stop sign onto the water, giving the appearance that it is physically blocking the entrance. The water is collected and pumped back up to the top of the device to be recycled by the sign.

The Softstop tricks drivers into believing the tunnel is physically blocked, stopping them from dangerously entering and giving operators more time to install a real barrier if necessary. The sign was activated eight times over eight weeks during its trial run and had a 100 percent success rate, according to Bob Allen, General Manager at Tunnel Holdings which runs the tunnel. Could this kind of false barrier work in other locations or venues?

Website: www.laservision.com.au
Contact: info@laservision.com.au
Spotted by Murray Orange, written by Springwise

Source : Springwise

mardi 29 octobre 2013

Google serait en train de construire un Datacenter flottant à San Francisco

Discrètement, selon les informations que rapporte Cnet, Google serait en train de construire un centre de serveurs flottant sur Treasure Island dans la baie de San Francisco. Le datacenter serait situé sur le Pont 1 (voir photo ci-dessous extraite de Google Maps), une barge flottante rattachée à l’île. Le hangar 3 situé juste à côté (Bldg 3 sur l’image) appartiendrait à Google (même si aucun document ne le montre) puisque le message du répondeur remercie d’avoir appelé… Google.
pont1 treasure island
Voyez les photos récentes de Cnet :
centre serveurs flottant
Datacenter flottant
centre donnees google
datacenter google
hangar 3 treasure island
san francisco google datacenter
La sécurité est maximale aux abords du Hangar 3 comme en témoigne les deux personnes ci-dessous, dont l’une avec des énormes jumelles :
hangar 3 security
Bâtir un centre de données refroidi par de l’eau de mer a un gros avantage : cela ne coûte pas cher et c’est écologique (comme celui situé en Finlande). En plus, Google possède depuis 2009 un brevet pour ce type de datacenter en mer. Autre avantage de taille à prévoir pour la firme de Mountain View : tout ce qui flotte normalement n’est pas soumis aux règles gouvernementales et donc à l’impôt…
brevet datacenter mer
Source : Vincent Abry

jeudi 24 octobre 2013

Innovations de commerce connecté (salon VAD.Conext)

© S. de P. VAD.Conext
Showroom augmenté, cabines d'essayage intelligentes, assistant de courses... Voici sept innovations présentées lors du salon VAD.Conext, qui se déroule à Lille du 22 au 24 octobre.
Voir les innovations ... : 
Source : Journal du Net

En 2019, la population des figurines LEGO aura dépassé celle des humains


Lego figurine
















Attention, un constat sans appel : dès 2019, soit dans 6 ans, la population des LEGO minifigs, ces petits bonhommes créés en 1978, aura dépassé celle de l’espèce humaine.
Doit-on s’en inquiéter ? non !
De toutes façons ils étaient déjà 4 milliards en 2006.

Lego Humains




















Source : Vincent Abry

mercredi 23 octobre 2013

China's Mobile Industry — A Fantastic Growth Story That's Only Just Beginning

Smartphone Subscriptions in China Teaser
How quickly is the mobile market in China growing, and what are the major opportunities?

At BI Intelligence, Business Insider's paid research service, we surveyed some of the best data available on the Chinese mobile industry, and came up with some answers. We published them in an in-depth PowerPoint presentation and are publishing an abridged version, below. The full version is only available to subscribers.

Here's the main takeaway: China is close to reaching its smartphone tipping point. Sometime in the next year, smartphone sales will overtake feature phone sales, and the fast uptake of modern handsets and 3G connections means that there will be a huge opportunity for mobile advertising, mobile commerce, mobile payments, mobile platforms, and app markets. Click the slideshow below to see more.

BI Intelligence is a research and analysis service focused on mobile computing and the Internet. Subscribers can access the full report associated with this deck, download the deck as a PDF or PowerPoint, and access the individual charts and data.

Read more: http://www.businessinsider.com/chinas-mobile-ecosystem-deck-2013-10?op=1#ixzz2iWyoDx3C

Kinect fait gagner en indépendance les non-voyants face au sport


Sports_Blind_L'AtelierGrâce à un programme basé sur le Kinect de Microsoft, des universitaires américains auraient bâti un système analysant la gestuelle et répondant à une commande verbale.

Décidément, le système Kinect inspire les scientifiques. Déjà utilisé pour restaurer la communication entre élèves et étudiants, développer la formation à distance ou pour modéliser les mouvements de la foule, la captation puis l’interprétation des mouvements permises par le système de la firme de Redmond permettraient d’ouvrir certaines pratiques sportives aux non-voyants. C’est en effet, l’application trouvée par des chercheurs de l’Université de Washington. Dans un cours de Yoga classique, un professeur enseigne les postures du sport par la démonstration gestuelle requérant donc des facultés visuelles de la part des élèves. Pour un malvoyant ou un non-voyant, l’exercice est par conséquent à la limite de l’impossible. Afin de résoudre la difficulté d’accès à l’enseignement sportif, les chercheurs ont créé un logiciel utilisant la géométrie et étant capable de détecter les mauvaises postures corporelles. Par un système vocal, des consignes sont données à l’utilisateur pour qu’il puisse se représenter et adopter la position  enseignée. «Mon espoir pour cette technologie est destiné aux personnes qui sont aveugles ou malvoyants. (…) Cela contribuera à donner une compréhension de base du yoga dans un cadre confortable », a déclaré Kyle Rector, chef de projet et étudiante doctorante au département d’ingénierie informatique.

Un calcul des angles du corps pour une rétroaction auditive

Même si le logiciel Kinect présente quelques limitations dans le niveau de détail avec lequel il suit le mouvement, les chercheurs ont tout de même décidé de baser leur logiciel sur ce support car disponible en open source et facile d’accès sur le marché. Le système baptisé « Eyes Free Yoga» lit les angles du corps de l’utilisateur selon une géométrie simple et la loi des cosinus. Par exemple, dans certaines positions, une jambe pliée doit être à un angle de 90 degrés, tandis que le bras dans l’alignement doit former un angle de 160 degrés. Le système est par la suite capable de fournir une rétroaction verbale en temps réel pour six poses de Yoga. Ainsi des conseils sont avisés sur la façon de positionner ses bras, ses jambes, son cou ou son dos pour effectuer le bon mouvement. Le résultat de ce projet n’est donc pas un jeu vidéo mais un « exergame », accessible et permettant au joueur d’interagir verbalement avec un instructeur virtuel.

Un collège de 16 personnes aveugles  ou malvoyantes pour identifier une douzaine de règles essentielles

Les chercheurs ont travaillé avec 16 personnes aveugles ou malvoyantes autour de Washington pour tester le programme et obtenir une rétroaction. Plusieurs des participants n'avaient jamais fait de yoga auparavant, tandis que d'autres avaient tenté à quelques reprises ou pris régulièrement des cours de yoga. Des conseils ont également été pris de professeurs de la technique de relaxation. Il en résulte 30 commandes différentes d’amélioration pour chacune des six positions disponibles dans l’exergame. Une douzaine de règles essentielles à la tenue de bonnes positions  vérifiant d’abord l’attitude corporelle générale puis la position du cou, de la tête, des bras et des jambes ont ainsi pu être éditées.

Source : L'Atelier

jeudi 10 octobre 2013

La Banque Postale teste le paiement vocal en ligne

Après avoir enregistré sa voix, l'application Talk to Pay déclenche un appel sur le mobile de l'utilisateur pour l'identifier avant de remplir pour lui le formulaire de paiement. 


Cherchant à relever le défi de l'authentification des acheteurs en ligne, la Banque Postale expérimente depuis mi-septembre une solution de paiement vocal. Autorisé le mois dernier par la Cnil et conçu avec PWC, Talk to Pay sera testé par 500 clients et collaborateurs de la banque pendant les 12 prochains mois. Concrètement, l'utilisateur doit d'abord enregistrer sa voix sur le site de l'expérimentation, qui crée un modèle biométrique lui étant propre. Il renseigne ensuite ses coordonnées bancaires puis Talk to Pay s'installe automatiquement sur son navigateur Web. Lorsqu'il finalise un achat en ligne, l'application déclenche un appel sur son mobile. Dès que l'utilisateur s'est identifié par la voix, elle remplit pour lui les informations de paiement par carte bancaire. Le cryptogramme visuel habituellement demandé est par ailleurs remplacé par un code aléatoire à usage unique généré par Talk to Pay.

La Banque Postale conclut que ce système d'authentification vocale pourrait dans un second temps servir à identifier des clients sur des serveurs vocaux ou à sécuriser leur accès à des banques en ligne.

Source : Journal Du Net

vendredi 4 octobre 2013

Twitter Has Been Making 80 Cents In Ad Revenue For Every Thousand ‘Timeline Views’

twitter ad timeline
If you’re reading Twitter’s S-1 filing to see where the business stands as it prepares to go public (hey, that’s what everyone’s doing at TechCrunch), you may have noticed a number that comes up repeatedly: “advertising revenue per timeline view.”

What does that actually mean? Twitter says that along with things like monthly active users, ad revenue per timeline view is one of the key metrics it uses to evaluate its business. The company treats timeline views (“the total number of timelines requested when registered users visit Twitter, refresh a timeline or view search results while logged in on our website, mobile website or desktop or mobile applications”) as a measure of user engagement, and it uses ad revenue per timeline view to track its ability to make money from that engagement.

By that measure, Twitter’s ability to monetize is improving. It says advertising revenue per timeline view was $0.80 for the three months ending on June 30 of this year, up 26 percent from the same period in 2012. That number is significantly higher in the United States ($2.17) compared to the rest of the world ($0.30), though the international number is up 111 percent year-over-year.

Why invent an entirely new ad metric (and one without a handy acronym)? Well, Twitter has an unusual advertising model, with advertisers paying to promote tweets, trends, and accounts in users’ news feeds, so the standard ad measurement of CPMs (the cost per thousand impressions) may not apply. The fact that “advertising revenue per timeline view” actually measures revenue for every 1,000 timeline views suggests that this metric may be a proxy of sorts for CPMs.

(It’s probably a little dodgy to compare Twitter’s numbers with traditional CPMs, but hey, just for fun — according to eMarketer, Facebook had an effective CPM of $.071 on mobile and $0.19 on desktop in 2012.)

However, Twitter is really selling its ads as a way for companies to engage with consumers, so the filing also notes trends in cost per ad engagement — basically, it’s been falling steadily, with a sequential decrease of 46 percent in the last quarter, 12 percent the quarter before that, and 19 percent the quarter before that. (A decline in cost means Twitter is getting paid less for each engagement.) The filing attributes these declines to an increase in ad inventory, which has been partially offset by growing demand.

Advertising also gets its own section (page 18 if you want to read along) in the filing’s discussion of various risk factors, where Twitter notes that all kinds of things could go wrong with its ad programs — for example, if Twitter is unable to convince brands to invest in building a presence on the service, or if new programs like its video-based Amplify ads don’t take off, or if the decline in cost per engagement continues.

As we wrote earlier, Twitter brought in $253 million in revenue in the first six months of the year. Of that amount, $221 million (87 percent) came from ads, compared to $32 million (13 percent) from data licensing. In comparison, the company made $7 million from advertising in all of 2010 (that’s when it launched its first ad programs) and $21 million from data licensing. Oh, and Twitter says that mobile accounts for 65 percent of its ad revenue.

Source : Techcrunch

The 5 Most Important Algorithms In Tech

Algorithms, simple functions that hover between mathematical problems and computer programs, are everywhere.
Whether dealing with lost packets when using Wi-Fi, or getting your credit-card details securely to an online store, most consumer technology couldn't work without some ingenious solutions to common problems.
And when Google decides to change its search algorithm - as it did with Hummingbird last week, it can make or break whole companies.
Here are just five which you couldn't live without.

Pagerank – how Google calculates search results

The broad strokes of how Google's search algorithm works have been public for over fifteen years, though the exact way it organises search results remains the company's most closely guarded secret.
PageRank is the system at the heart of it all, and the key invention behind Google's rapid dominance of internet search. Ten years ago, when competitors relied on human-maintained indexes of webpages, it allowed the company to assess the value of websites automatically - a massive advantage as the web grew exponentially.

The algorithm works by looking at every link to and from every page on the internet. A link to a page is, in effect, a vote for that page's validity, because it means that someone thought that whatever was on that page was worth sharing. So the more inbound links a page has, the higher its PageRank is.
But then it adds a second measure: links from pages which have a high PageRank themselves confer a higher PageRank. So being linked to by Stanford, the Google creators' alma mater, is significantly more valuable than being linked to by Stanford's, the map shop.

On top of PageRank are myriad tweaks and adjustments to improve the results further. Some of those, such as the decision to punish 'link farms', vast networks of sites which link to each other in an effort to boost their PageRank , are directly connected to the core algorithm.
Others, like the company's attempts to leverage what it knows about users based on their previous searches to deliver personalised results, were bolted on later.

But as the demands we make of search have got ever more intensive, the company has been forced to adapt. The most recent update to the algorithm, Hummingbird is "a new engine built on both existing and new parts", according to Danny Sullivan of the search blog Search Engine Land.
Hummingbird was built to deal with the fact that increasing familiarity with search, as well as the rise of voice control, mean that we now ask Google actual questions, rather than just typing in relevant words.

In the future, new problems will require further tweaks, but the position of PageRank at the heart of it all seems secure.

Public key cryptography - keeping credit card data secure

Public key cryptography is the name for a broad collection of algorithms which lie at the heart of nearly every form of security online. Using what is perhaps best described as 'magic maths', public key cryptography lets people encode data with a key which cannot then decode it.
If Alice has a piece of information which she needs to get to Bob without anyone else seeing it – maybe a credit card number which she's using to buy a computer with, or perhaps evidence of state wrongdoing which she's leaking to a national newspaper – she has to encrypt it.

Way back in history, the only way to do this would be to use a shared secret: a cipher which both Alice and Bob know, but no-one else does. That's how encryption all the way up to the second world war worked.
But the obvious problem is that Alice and Bob can't use open channels to agree on their cipher. That's fine if they can meet in person to swap codes, but less effective if Alice is a consumer and Bob a multinational corporation.

Public key cryptography means that Bob can tell the world his public key, and let them know that anything encoded with that will be readable by him and only him. Alice sees the public key, locks up her credit card data using it, and then sends that packet on the way.
Only Bob, using a second, private, key can decrypt the data and read the number.

Unfortunately, doing all of this every time is pretty hard on a computer's processor, so another step, where both Alice and Bob use their keys together to generate a shared secret, is frequently added in most practical uses of public key encryption. That shared secret can then be used in old-fashioned symmetrical ciphers. But it all comes back to the public and private keys.

Correcting errors

CDs are temperamental beasts. When they were introduced, they were hailed as being a resilient replacement for vinyl and cassettes, but as anyone who has tried to play a carelessly preserved album found in their car's glovebox can attest to, that's only half true.

Still, it could a lot worse. When you're storing data using microscopic pits on a sheet of metal covered with a thin layer of plastic, it's quite a feat to read every single pit correctly, a feat only compounded by later generations of optical media, which shrink the pits still further.

Error correction lies at the heart of that reliability, thanks to the use of a cunning algorithm which lets CDs be readable even with quite a lot of damage to the data stored on them.
In hugely simplified form, imagine the data on a CD as a grid of 1s and 0s. Like this:
101
010
000
If there's an error reading the CD, one of those 0s may turn into a 1. Without error correction, there's no way to tell if that's happened, and no way to fix it.
The simplest way to correct errors is to add another load of data. Each row and column is counted up, and if there's an even number of 1s, another 1 is added on the end. If there isn't, a 0 is added instead:
1011
0100
0001
000
Now, if one of the 0s is misread, the player can check with the error correction codes, and tell that there's been a mistake – and even, assuming there's not too much damage, what the real value should be.

Suppose the bottom right 0 is read as a 1: by reading the error correction code for that row, the player can tell that there's one too many 1s. It can then cross-check with the error correction codes for each column, and spot that there are also too many 1s in one column as well.
Now the player knows where the error is, and can carry on with those sweet tunes.

Error correction isn't just used by disc drives, though. Nearly every electronic device which gets data from one place to another will have some error correction on it, from WiFi to DSL. Even ISBN numbers on the back of books have error correction: the final digit serves the role.

Protecting passwords

Sometimes, it's really important to check that the file you have been given is exactly the one you expected. Maybe you are worried it's been tampered with, or just want to check that a large download finished without corruption. One way to do that is to look at its hash.

There isn't really one algorithm which can be used to make 'hashes' of data: any process which can take information and spit out something which fulfils a few criteria will do.

A good cryptographic hash function will give the same output every time it's given the same input; the hash will change if the message changes; it would be nearly impossible to work backwards from the hash to the message; and it would be nearly impossible for two messages to have the same hashes.
But there's a much more important use for hashing data than just checking files: password protection.
As is painfully obvious these days, not many organisations can guarantee they won't lose your data. That's particularly problematic if it's your password they've lost, because — well, you don't have a different password for every service, do you?

These days, companies shouldn't be keeping passwords in plaintext at all. Instead, when a user types in their password for the first time, the site should hash the password, and only keep that.
Every time they come back to log in, it can take another hash, and compare it to the one on file. If they match, the password's correct. But now, if the site's hacked, the only thing which gets lost is a table full of hashes which can't be reverse engineered into passwords, so everyone is happy.

(Technically, site owners should be salting their hashes - an oh-so-cute term which means adding a little bit of extra data into the password hash to prevent it being reverse engineered.)

Perlin noise: generating landscapes in games

Games are just big bags of algorithms. There's art, music, writing, direction, design and playtesting too, but a lot of algorithms.

Take procedurally generated terrain, the favoured way of filling in the vast expanses of games like Minecraft or Dwarf Fortress. It's not enough just to generate random noise, and apply it to a landscape, because if you do, you end up with something which is too random: all noise, no pattern. Instead, you want terrain which demonstrates the same fractal nature as the real world, with mountains, hills, boulders and pebbles all having effects on different scales.

That's what Perlin noise can do. It's a simple enough algorithm: generate some random noise at a load of different frequencies, smooth it out, and then add them together. But when you do, you go from this:

To this:
Or consider trying to get enemies to take an intelligent route through a map. The obvious way to do it is easy enough: consider every possible route, then take the shortest one from A to B. But that's so computationally intensive that it's unusable in most situations.

Instead algorithms like the A* search can be used.

How it works is tricky to explain (essentially, it finds a path by always taking the step where the number of steps already taken plus the number of steps in a straight line to the destination is lowest), but it is entrancing in action.

In August 2011, a rogue algorithm lost its owners $440m on the stock market before it was eventually shut down.

This article originally appeared on guardian.co.uk

jeudi 3 octobre 2013

Is Bitcoin The New Euro?


Bitcoin Hero

Originally dubbed ‘the single currency,’ the euro has been around for a decade and was in the works for another decade before it entered circulation in 2002. At the time, it was something revolutionary, a bold initiative that could have failed multiple times along the way.
Yet, it hasn’t become the universal currency and the European Central Bank is now testing the boundaries of the euro. Bitcoin could be the surprising and beautifully designed world cryptocurrency that will take the euro’s dreams to the next level. We will discuss this at Disrupt Europe later this month.

Bitcoin Is The True Single Currency

There are a few reasons why the euro will always stay limited in scope. As one can read in 1992′s Maastricht Treaty (the Treaty on the European Union), the euro is “a single and stable currency,” nothing fancier than that. In other words, its creation mechanisms are similar to those of any other modern currency. There is a central bank, there are interest rates.
Moreover, stating that the euro is a “stable currency” is already very political. It refers to Germany’s old traumatism of hyperinflation — at all times, the euro has to avoid inflation. This is probably the most important way the European Central Bank differs from the U.S. Federal Reserve — price stability comes first in Europe. Even though politics and monetary policies are supposed to be separate, this rule proves that it’s not the case.
These days, as everyone can see with Greece’s economic troubles, the only adjustment variable is jobs. When a eurozone country is no longer as competitive as its neighbors, prices stay the same. Consumption falls and the unemployment rate rises. To fight unemployment, many have to accept pay cuts. European governments would rather create a giant help fund than endanger the euro’s stability.
For all these reasons, the euro is just another traditional currency used in a few countries. It shares all the same weak points.

By definition, Bitcoin is apolitical. It is its greatest strength and weakness.

Bitcoin is nothing like that. It was born on the idea that nobody could regulate it. Instead of having a central bank, Bitcoins are just a chain of characters defined by algorithmic rules. Anybody can try to find new Bitcoins and anybody can verify if it is indeed a real Bitcoin or not. All of this is handled by open-source Bitcoin applications and a few proprietary variants.
By definition, Bitcoin is apolitical. It is its greatest strength and weakness. As long as you have access to the right technological tools (a computer, internet access…), you can make transactions in Bitcoins. When the economy thrives or stagnates, Bitcoin will have its own separate trend. As the great crash of April 2013 shows us, it is as volatile as it can get. While it is still early to see significant mainstream Bitcoin use cases, the story of this new currency is a fascinating one.
And we’re excited to reveal that we will hold a panel at Disrupt Europe in late October in Berlin with Shakil Khan (CoinDesk) Pamir Gelenbe (st-ART/Bitcoin London) and Nejc Kodric (Bitstamp). Khan is an expert when it comes to Bitcoin news, while Gelenbe has successfully organized the Bitcoin London conference. Finally, Kodric is the co-founder and CEO of the largest European Bitcoin exchange, and the second one in the world behind Mt. Gox. They will all have interesting thoughts to share on the future of Bitcoin, its caveats and more.

Bitcoin’s Weaknesses

What happens when your Bitcoin wallet value in euros falls by 50 percent in a day? If your company pays you in Bitcoins, it sounds like bad news. The future of Bitcoin as a mainstream currency is unclear. Make no mistake, the euro will remain the dominant currency in eurozone for now.
To avoid disastrous news like that, many countries, including the U.S. and Germany, are trying to regulate Bitcoins. If you really want to use Bitcoins, you’ll have to prove that you’re ready to handle the financial risks.
Back in August, a federal judge in Texas has declared that Bitcoin was a currency and should be regulated just like euros or U.S. dollars. This decision threatened Bitcoin’s utopian concept.
“The only limitation of Bitcoin is that it is limited to those places that accept it as currency,” wrote Judge Amos Mazzant. “However, it can also be exchanged for conventional currencies, such as the U.S. dollar, Euro, Yen, and Yuan. Therefore, Bitcoin is a currency or form of money,” the judge continued.

Bitcoin won’t be able to remain an unregulated currency for long

Similarly, New York’s financial services stated that Bitcoin companies should respect the current financial regulatory guidelines. Making sure that these companies are all on the same page when they operate in the U.S. is necessary to protect customers. Moreover, New York’s top banking regulator wants to write a new set of rules to decrease illegal Bitcoin activities.
“We have also seen instances where the cloak of anonymity provided by virtual currencies has helped support dangerous criminal activity, such as drug smuggling, money laundering, gun running, and child pornography,” Financial Services superintendent Benjamin M. Lawsky said in a statement. ”Taking steps to root out illegal activity is both a legal and business imperative for virtual currency firms,” he added.
Finally, following a parliamentary inquiry, Germany stated that Bitcoin should be considered as “private money.” It has many implications, starting by paying sales tax (VAT). While the conclusions are simple, the execution is more complicated as Germany is a mere member of the eurozone. If Germany really wants to pursue this further, it will probably have to lobby European institutions to change the rules on a European level.
All these rulings prove one thing: Bitcoin won’t be able to remain an unregulated currency for long. It won’t work similarly in every country of the world. Soon, Bitcoin users and companies will have to find a way to avoid tax, and authorities have a say in what you are doing with your Bitcoins.
It is not necessarily a bad thing as using a totally unregulated currency is unsustainable for many industries and use cases. But Bitcoin’s true purpose is not what everyone originally expected.

Bitcoin Is The First Meta-Currency

The Bitcoin network is a peer-to-peer payment network, you don’t need any banking institution to make large transfers. Instead of replacing the euro, the cryptocurrency could become the first meta-currency, a new currency that sits on top of traditional currencies for very specific use cases.
With the euro, European Union member countries wanted to create a second world currency to compete with U.S. dollars. Having a dominant currency has many advantages. According to French historian Jacques Rueff, countries (such as the U.S.) who use a major currency can sustainably keep a negative balance of payments — he calls that the “deficit without tears.”

Bitcoin could become the first meta-currency that sits on top of traditional currencies

In many ways, the European Union was successful with the euro. While it hasn’t become the universal currency, no one can deny that the euro is a major world currency. But now that two different currencies matter on a global scale, economic agents need a tool that sits between U.S. dollars and euros. Currently, about 100 percent of foreign exchange transactions involve dollars (out of 200 percent because forex transactions involve two currencies) compared to 64 percent for euros.
Bitcoin can become the common language between USD and EUR. To use Bitcoins in Italy or Ecuador, you don’t have to pay any fees. Moreover, you can exchange some Bitcoins in dollars when you’re investing in Ecuador, or exchange some Bitcoins in euros when you’re investing in Italy. Bitcoin is a money transfer protocol as much as a currency. For now, this aspect is underused but could actually become Bitcoin’s most interesting future prospect.

Source : Techcrunch

mercredi 2 octobre 2013

La BPI entend fédérer les acteurs français de la finance participative via une plateforme dédiée

crowdfundingLes pouvoirs publics ont reconnu l’importance croissante du phénomène de crowdfunding, c’est du moins l’impression qui s’impose à la découverte du travail effectué par la BPI auprès des acteurs de la finance participative.

A l'occasion des 1ères Assises du financement participatif qui se sont tenues le 30 septembre au Ministère de l'Economie et des Finances, la BPI a annoncé la mise en ligne de sa nouvelle plate-forme de centralisation des projets participatifs, TousNosProjets. Cette plate-forme n’est cependant pas une plate-forme de crowdfunding comme il en existe dans le privé, elle consiste à centraliser les données des grandes plate-formes privées, c’est à dire centraliser les informations concernant les projets mis en avant, afin d’essayer de donner une information plus simple et accessible à l’utilisateur. Si cette initiative peut apparaître comme une demi-mesure de la part de la BPI, celle-ci se contentant de jouer un rôle de facilitateur dans la transaction, l’importance est d’abord celle de la reconnaissance. En mettant en place une plate-forme dédiée, les pouvoirs publics reconnaissent l’utilité proprement publique que ce mode de financement, solidaire et décentralisé détient.

Simplifier le contact entre particulier et porteur de projet

Cette initiative a pour objectif, selon Benjamin Richard, Chargé de Mission auprès du Directeur général de la BPI, “[...] d’offrir un point d’entrée unique pour les particuliers qui souhaitent financer des projets.” Si une offre solide et consistante existe bien au niveau du crowdfunding, avec de nombreux acteurs reconnus pour leur efficacité, l’offre est encore particulièrement morcelée. Afin d’éviter le développement d’un phénomène “communautaire” auprès de chaque plate-forme, ce qui irait à contrario des principes mêmes de la finance participative, la mise en place de TousNosProjets pourrait permettre d’offrir une visibilité améliorée aux porteurs de projet, indépendamment des capacités communicationnelles propres aux plate-formes privées sur lesquels ils sont présents. Il faut cependant nuancer cette assertion. En l’occurrence, le site de la BPI ne recense que les acteurs ayant déjà atteint une masse suffisante pour présenter une réelle crédibilité. Ils sont ainsi déjà 14 à avoir adhéré au projet, à l’image de Babyloan ou MyMajorCompany mais aussi SmartAngels ou KissKissBankBank. Il sera dès lors possible pour le particulier d’affiner sa recherche de projet au moyen des nombreux filtres mis à sa disposition, afin de connecter au plus proche attente des particuliers et celles des porteurs de projet.

L’amorce d’une politique plus large? 

Si de nombreux événements, de nombreuses rencontres ont été financées grâce à des fonds publics, TousNosProjets est la première initiative d’ampleur qui vise à s’intégrer complètement dans l’habitus du financement participatif. Le choix de la BPI pour porter ce projet n’est pas étonnant, ses missions visant avant tout au financement de PME et projets innovants, mais traduit aussi ce que Benjamin Richard appelle “[...] un engagement pris par Bpifrance pour le développement de l’Economie Sociale et Solidaire, dont les activités sont fondées sur un principe de solidarité et d’utilité sociale avec des modes de gestions démocratiques et participatifs”. Devant la place de plus en plus importante prise par le crowdfunding, la BPI ne pouvait réellement se permettre de ne pas accompagner le mouvement. Plutôt que d’appréhender ces plate-formes comme des entités concurrentielles, la BPI entend se placer comme collaborateur, pour, continue-t-il “développer des outils de financement complémentaires aux notres.”

Source : L'Atelier