Elon Musk, Tesla, and Bitcoin – it’s a match! Earlier this year, Tesla revealed its investment worth $1.5 billion in Bitcoin – the ripples of which vibrated through the entire cryptocurrency industry. During the same announcement, Tesla also revealed that it plans to accept Bitcoin as a payment method for buying its products conditioned upon the applicability of laws. This week, Tesla officially announced that it now accepts payment in Bitcoin. This service is currently reserved for its US clients.
The details – Tesla, the World’s leading automaker, which earlier announced that it plans to offer Bitcoin as a payment method, has now joined companies like Overstock and Starbucks in accepting Bitcoin for its products. Tesla will use only internal & open source software & operates Bitcoin nodes directly.
Tesla’s Plans to Offer Bitcoin
As per its official website, you will be able to pay Bitcoin from your wallet by scanning the QR code or copying Tesla’s Bitcoin address. To buy a Tesla with Bitcoin, you will need to pay the exact amount in a single transaction. The order will be confirmed via email within six hours.
After Tesla’s official announcement on its website, Elon Musk posted a tweet that stated: “Bitcoin paid to Tesla will be retained as Bitcoin, not converted to Fiat currency”. Currently, Tesla will only accept Bitcoin and no other cryptocurrencies.
Looking ahead – Tesla will offer its non-US clients the ability to pay with Bitcoin this year. The fact that Tesla is not converting its Bitcoin to fiat will likely positively affect the price as it is essentially lowering the Bitcoin supply by holding.
Category: IT
Facebook, Google CEOs suggest way to reform keys internet laws.
Facebook Chief Executive Mark Zuckerberg laid out steps to reform a key internet law on Wednesday, saying that companies should have immunity from liability only if they follow best practices for removing damaging material from their platforms.
In testimony prepared for a joint hearing before two House Energy and Commerce subcommittees on Thursday, Zuckerberg acknowledged the calls from lawmakers for changes to a law called Section 230 of the Communications Decency Act, which gives companies like Facebook immunity from liability over content posted by users.
The hearing titled ‘Disinformation Nation: Social media’s role in promoting extremism and misinformation’ is designed to address concerns Democrats have had about the spread of misinformation during the coronavirus pandemic and the presidential election.
It is also likely to discuss ways to hold tech platforms accountable by reforming the internet law. The chief executives of Google and Twitter will also testify at the hearing.
Google’s Sundar Pichai will make suggestions to reform the law but, unlike Zuckerberg, will not advocate for adoption of a set of best practices, according to his testimony. Twitter’s Jack Dorsey will lay out steps the platform has taken to tackle misinformation.
Zuckerberg and Pichai will also urge caution as Congress considers reforming the law.
“Platforms should not be held liable if a particular piece of content evades its detection — that would be impractical for platforms with billions of posts per day,” Zuckerberg wrote in his testimony.
Google’s Pichai also struck a similar note saying “without Section 230, platforms would either over-filter content or not be able to filter content at all.”
Pichai instead proposed solutions such as developing content policies that are clear and accessible, notifying people when their content is removed and giving them ways to appeal content decisions.
Facebook building a version of Instagram for children under 13.
Facebook is considering launching a version of its popular photo social media platform, Instagram, for children under the age of 13.
BuzzFeed News first reported Facebook announced in an internal company post that the company would begin building a version of Instagram for people under the age of 13 years to allow them to “safely” use Instagram for the first time. Currently the company does not allow people who are under this age to create an account on the platform.
A spokesperson for Facebook told the Guardian the company was exploring a parent-controlled version of Instagram, similar to the Messenger Kids app that is for kids between six and 12.
“Increasingly kids are asking their parents if they can join apps that help them keep up with their friends. Right now there aren’t many options for parents, so we’re working on building additional products … that are suitable for kids, managed by parents,” the spokesperson said.
“We’re exploring bringing a parent-controlled experience to Instagram to help kids keep up with their friends, discover new hobbies and interests, and more.”
In a blog post earlier this week, which did not mention the proposed new Instagram service, the company noted that although people were asked to enter their age when signing up for Instagram, there was nothing to prevent people from lying about it at registration.
Facebook said it would overcome that by using machine learning in combination with the registration age to determine people’s ages on the platform.
The company also announced plans to roll out new safety features, including preventing adults from messaging people under the age of 18 who do not follow them, safety notices for teens when messaged by an adult sending a large amount of friend requests or messages to people under 18, and make it more difficult for adults to find and follow teens using the search function in Instagram.
Teens will also be encouraged to put their profiles on private at the point of registration.
A study of Australian teens’ internet usage published by the Australian eSafety commissioner in February found 57% of Australian teenagers use Instagram, while 30% reported being contacted by a stranger, and 20% reported being sent inappropriate unwanted content on the social media sites they used.
Blockchain Technology Explained and What It Could Mean for the Caribbean

Blockchain is a distributed ledger technology that evolved from the internet of information and represents a second phase of the internet. Whereas the first era of the internet democratized the exchange of information, blockchain promises to democratize the exchange of real value. Blockchain emerged in late 2008, in the midst of the global financial crisis. Satoshi Nakamoto released a new protocol for a “A Peer-to Peer Electronic Cash System” and created a digital currency or cryptocurrency called Bitcoin based on block chain technology, with the first Bitcoin transaction being realized on January 12, 2009. Cryptocurrencies differ from traditional fiat money in that it is not issued by a national state. They are not stored in a bank vault or a credit recorded in an electronic file somewhere; it is a global spreadsheet or ledge of all transactions which leverages the resources of a large peer-to-peer network to review and approve each bitcoin transaction. But blockchain is more that cryptocurrencies, blockchain has more applications and investors realize commercial potential and money is entering at fast pace.
Blockchain has five properties that makes it a potentially transformative and disruptive technology:
- Distributed
A protocol establishes a set of rules in the form of distributed mathematical computations that ensures the integrity of the data exchanged among a large number of computing devises without going though a trusted third party. Each block chainblock is run on computers provided by volunteers around the world, there is no central database to hack into, corrupt, or shutdown. This means that things of high value—money, stocks, bonds, intellectual property rights, music, car, and even votes —can be stored and exchanged without an institution or middleman.
- Encrypted
Blockchain uses a two-key authentication system to maintain virtual security.
- Inclusive and transparent
In the case of public blockchain, anyone can view all the transactions that reside on the network so no person or institution can hide a transaction. Since blockchain is open source, anyone can download it and use it. Satoshi imagined a world in which any person can interface with the block chain though a “simplified payment verification mode” that can be used on a mobile device. No documentation or physical presentation of proof is required to be trusted or to gain access.
- Immutable
Within minutes all transactions are verified and, cleared, and stored in a block that is linked to the preceding block, thereby creating a chain. Each block must refer to the preceding block to be valid. This structure permanently timestamps and stores exchanges of value, preventing anyone from altering the ledger.
- Historical
Since block chain is a distributed ledger representing a network consensus of every transaction that has ever occurred, the block chain must be preserved in its entirety. Storage matters a great deal. It allows the provenance of products, art, diamonds to be traced easily.
The value of this new technology is that it allows trusted transactions to occur directly between two or more total strangers, authenticated by mass collaboration on a network of interlinked devices, and motivated by collective self-interest, rather than by profit-motivated corporations or governments motivated by maintaining power and may be interested in surveilling its citizens or stifling dissent. Blockchain in short eliminates middlemen.
These properties allow developers to elaborate applications for a number of different purposes.
Actual and Potential Applications
* Financial Services
Bitcoin is the first and most prominent application of block chain technology as an e-payment system. Bitcon was created in January 2009 by Satoshi Nakamoto as a digital currency independent of any central authority, transferable electronically, and with very low transaction costs. A stable and widely accepted crypto currency stands to revolutionize e-commerce, money transfers, and even letters of credit. Cryptocurrency poses a challenge to traditional banking. Besides Bitcoin there are other cryptocurrencies such as Litecoin, Ethereum, Ripple, Peercoin, and Namecoin. To date, the value of cryptocurrencies have fluctuated widely as they struggle to gain widespread use. Nonetheless, the top ten cryptocurrences have a market capitalization of US$98.8 billion as of June 2017 but this amount is still a miniscule value of the total value of financial assets worldwide.
- Retail and Services
It can be used in retail and services. Any merchant who accepts digital money as payment can exchange their goods and services. Persons and companies involved in a supply value chain can use private block chains to reduce transaction costs in their business relationships and make payments and transfers along the chain as well as pass information in a very transparent manner. For creative artists and craftspersons, using block chain along with digital media management technologies may allow them to directly market their wares, reduce piracy of electronic media, and assure quick and accurate payments.
- Digital Identity
Identity theft is emerging as a bane of the digital age. Currently taking precautions against identify theft and attempting to restore identity after it has been compromised is an $18.5 billion annual business and growing yearly according to Distil Neworks. Using blockchain technologies would make the tracking and managing of digital identities both secure, efficient and low-cost. Identity could be uniquely authenticated in an irrefutable, immutable, and secure manner and would revolutionize online commerce, passports, e-residency, birth certificates, wedding certificates, and work-related or government issued IDs.
- Digital Voting
Two of the biggest hurdles to electronic poll place machines and online voting is the fear that security can be breached and that votes can be manipulated. Using blockchain, a voter could verify if his or her vote was successfully transited and remain anonymous and because of the distributed ledger technology it would not be possible to alter a vote once cased. The ability to hold e-voting could help reduce the high rates of non-participation in leading western democracies and reduce travel and wait times for countries with mandatory voting. In weak and factionalized democracies where the temptation to rig votes is high, block chain would help preserve the sanctity of the vote and reduce fraud and subsequently reduce the disruptions caused by recounts or prolonged protests against voting exercises that are perceived as tainted.
- Legal Contracting and Notaries
Legally binding programmable digitized contracts can be entered on a block chain and can be programmed to release funds using the bitcoin network once terms and conditions are met, reducing the need for lawyers and intermediary organizations such as banks. Notary publics can be replaced by having a digital proof of existence that allows users to upload a file and pay a transaction fee and to have cryptographic proof of it included on the bitcoin blockchain. The block timestamp becomes the record’s timestamp.
Challenges
Despite the tremendous potential of the technology, however, if governance and stewardship issues are not resolved, the block chain technology may fail to live up to expectations. The stakeholders in the system are usually innovators, venture capitalists, financial institutions, program and application developers, internet activists, academics, and NGOs. They all have to combine and come to some basic agreement on three levels and create self-policing and regulating bodies. Since no state actors are active in this realm, the stakeholders have to collaborate, identify common interests, and create incentive to act for the communal good. Just as the early internet pioneers rejected hierarchy and acted based on rough consensus and constantly improving the code they wrote, this generation of the internet will need leadership and broad cooperation.
- Platform: Standards or protocols are needed to govern scalability (block size versus average bandwidth enjoyed by users), energy consumption, stability (switching from proof or work to proof of stake), and robustness of the network infrastructure in order to assure the long-term success.
- Applications: Some oversight is needed to ensure user-friendly interfaces and how to increase the pool of skilled developers.
- Legal structure for stewardship: The ecosystem needs a governance body to coordinate on matters such as interoperability, privacy, security, protection of identity, and actions to reduce the amount of legal uncertainty surrounding emergent technologies. They need to spurr more investments in research and confront incoming challenges from legacy operators and hackers that exploit open source coding to commit terrorist acts. On one hand, premature and heavy handed top down legislation or regulation could stifle the development of the block chain technology. On the other, a high level of disorganization and anarchy could prevent widespread adoption and deployment of the technology. As an open platform, users can use the technology for nefarious purposes that could be viewed as violating common core values and draw the scrutiny of public authorities. Most recently the hackers behind WannaCry ransomware that affected 160,000 computers worldwide and caused an estimated $4 billion in damages, demanded payment via Bitcoin because of the anonymity of the system. Large corporations with vested interest in a closed paradigm, wealthy dictators bent on repression could appropriate applications and networks they control for their own narrow interests. Whether a formal bottom up multistakeholder governance structure, an invisible, informal, collaborative force, or attempts by state-backed institutions to impose limits remains to be seen. The block chain innovation is only eight years old.
Possible Applications in the Caribbean
In the Caribbean, blockchain technology could be applied in the following areas:
(1) Migrant remittances where a reduction in transaction costs could help some of the most remittance dependent countries such as Jamaica, Haiti, Dominican Republic, and Guyana
(2) International business transfers facilitation as many of the regional banks face the loss of correspondent banking relationships (de-risking) with major money center banks due to a cost benefit analysis: small market size versus the high costs of compliance associated with anti-money laundering statutes
(3) Voting, especially in jurisdictions with contentious elections such as Haiti where complaints about voter irregularities are common
(4) Smart contracting that could reduce the cost of doing business and revolutionize public sector contract and procurement systems
(5) Digital identities in a region that both is a high source of out bound migration and where the majority of economies are tourist dependent and receive millions of visitors each year. A better checking of identities will facilitate both emigration and reduce the hassle to process visitors.
How to unmount a LUN or detach a datastore device from ESXi hosts
This article provides steps to unmount a LUN from an ESXi 5.x/6.x host, which includes unmounting the file system and detaching the datastore/storage device. These steps must be performed for each ESXi host. Easy to follow Step-by-Step Guide: How to Unmount a LUN or Detach a Datastore.
Unmounting a LUN using the command line
To unmount a LUN from an ESXi 5.x/6.x host using the command line:
- If the LUN is an RDM, skip to step 4. Otherwise, to obtain a list of all datastores mounted to an ESXi host, run this command:# esxcli storage filesystem list
You see output, which lists all VMFS datastores, similar to:
Mount Point Volume Name UUID Mounted Type Size Free
————————————————- ———– ———————————– ——- —— ———– ———–
/vmfs/volumes/4de4cb24-4cff750f-85f5-0019b9f1ecf6 datastore1 4de4cb24-4cff750f-85f5-0019b9f1ecf6 true VMFS-5 140660178944 94577360896
/vmfs/volumes/4c5fbff6-f4069088-af4f-0019b9f1ecf4 Storage2 4c5fbff6-f4069088-af4f-0019b9f1ecf4 true VMFS-3 146028888064 7968129024
/vmfs/volumes/4c5fc023-ea0d4203-8517-0019b9f1ecf4 Storage4 4c5fc023-ea0d4203-8517-0019b9f1ecf4 true VMFS-3 146028888064 121057050624
/vmfs/volumes/4e414917-a8d75514-6bae-0019b9f1ecf4 LUN01 4e414917-a8d75514-6bae-0019b9f1ecf4 true VMFS-5 146028888064 4266131456 - To find the unique identifier of the LUN housing the datastore to be removed, run this command:# esxcfg-scsidevs -m
This command generates a list of VMFS datastore volumes and their related unique identifiers. Make a note of the unique identifier (NAA_ID) for the datastore you want to unmount as this will be used later on.
For more information on the esxcfg-scsidevscommand, see Identifying disks when working with VMware ESX/ESXi (1014953).
- Unmount the datastore by running this command:# esxcli storage filesystem unmount [-uUUID | -l label | -p path ]
For example, use one of these commands to unmount the LUN01 datastore:
# esxcli storage filesystem unmount -l LUN01
# esxcli storage filesystem unmount -u 4e414917-a8d75514-6bae-0019b9f1ecf4
# esxcli storage filesystem unmount -p /vmfs/volumes/4e414917-a8d75514-6bae-0019b9f1ecf4
Note: If the VMFS filesystem you are attempting to unmount has active I/O or has not fulfilled the prerequisites to unmount the VMFS datastore, you see an error in the VMkernel logs similar to:
WARNING: VC: 637: unmounting opened volume (‘4e414917-a8d75514-6bae-0019b9f1ecf4’ ‘LUN01’) is not allowed.
VC: 802: Unmount VMFS volume f530 28 2 4e414917a8d7551419006bae f4ecf19b 4 1 0 0 0 0 0 : Busy - To verify that the datastore is unmounted, run this command:# esxcli storage filesystem list
You see output similar to:
Mount Point Volume Name UUID Mounted Type Size Free
————————————————- ———– ———————————– ——- —— ———– ———–
/vmfs/volumes/4de4cb24-4cff750f-85f5-0019b9f1ecf6 datastore1 4de4cb24-4cff750f-85f5-0019b9f1ecf6 true VMFS-5 140660178944 94577360896
/vmfs/volumes/4c5fbff6-f4069088-af4f-0019b9f1ecf4 Storage2 4c5fbff6-f4069088-af4f-0019b9f1ecf4 true VMFS-3 146028888064 7968129024
/vmfs/volumes/4c5fc023-ea0d4203-8517-0019b9f1ecf4 Storage4 4c5fc023-ea0d4203-8517-0019b9f1ecf4 true VMFS-3 146028888064 121057050624
LUN01 4e414917-a8d75514-6bae-0019b9f1ecf4 false VMFS-unknown version 0 0The Mounted field is set to false, the Type field is set to VMFS-unknown version, and that no Mount Point exists.
Note: The unmounted state of the VMFS datastore persists across reboots. This is the default behavior. If you need to unmount a datastore temporarily, you can do so by appending the –no-persist flag to the unmountcommand.
- To detach the device/LUN, run this command:# esxcli storage core device set –state=off -d NAA_ID
- To verify that the device is offline, run this command:# esxcli storage core device list -dNAA_ID
You see output, which shows that the Status of the disk is off, similar to:
naa.60a98000572d54724a34655733506751
Display Name: NETAPP Fibre Channel Disk (naa.60a98000572d54724a34655733506751)
Has Settable Display Name: true
Size: 1048593
Device Type: Direct-Access
Multipath Plugin: NMP
Devfs Path: /vmfs/devices/disks/naa.60a98000572d54724a34655733506751
Vendor: NETAPP
Model: LUN
Revision: 7330
SCSI Level: 4
Is Pseudo: false
Status: off
Is RDM Capable: true
Is Local: false
Is Removable: false
Is SSD: false
Is Offline: false
Is Perennially Reserved: false
Thin Provisioning Status: yes
Attached Filters:
VAAI Status: unknown
Other UIDs: vml.020000000060a98000572d54724a346557335067514c554e202020Running the partedUtil getptbl command on the device shows that the device is not found.
For example:
# partedUtil getptbl /vmfs/devices/disks/naa.60a98000572d54724a34655733506751
Error: Could not stat device /vmfs/devices/disks/naa.60a98000572d54724a34655733506751 – No such file or directory.
Unable to get device /vmfs/devices/disks/naa.60a98000572d54724a34655733506751 - If the device is to be permanently decommissioned, it is now possible to unpresent the LUN from the SAN. For more information, contact your storage team, storage administrator, or storage array vendor.
- To rescan all devices on the ESXi host, run this command:# esxcli storage core adapter rescan [ -Avmhba# | –all ]
The devices are automatically removed from the Storage Adapters.
Notes:
- A rescan must be run on all hosts that had visibility to the removed LUN.
- When the device is detached, it stays in an unmounted state even if the device is re-presented (that is, the detached state is persistent). To bring the device back online, the device must be attached. To do this via the command line, run this command:# esxcli storage core device set –state=on -d NAA_ID
- If the device is to be permanently decommissioned from an ESXi host, (that is, the LUN has been or will be destroyed), remove the NAA entries from the host configuration by running these commands:
- To list the permanently detached devices:# esxcli storage core device detached list
You see output similar to:
Device UID State
—————————- —–
naa.50060160c46036df50060160c46036df off
naa.6006016094602800c8e3e1c5d3c8e011 off - To permanently remove the device configuration information from the system:# esxcli storage core device detached remove -d NAA_ID
For example:
# esxcli storage core device detached remove -d naa.50060160c46036df50060160c46036df
- To list the permanently detached devices:# esxcli storage core device detached list
