Explore tweets tagged as #computation
@antgrasso
Antonio Grasso
6 days
Modern privacy-enhancing technologies guide a responsible approach to data use by applying anonymization, encryption, secure computation, minimization, and distributed trust models, protecting personal information while supporting analytical work. Microblog by @antgrasso
17
62
87
@LecuitLab
TLecuitLab
4 days
Here is the link to download the pdf of my 3rd course @cdf1530 on biological computation. I present and discuss network motifs that reveal the hidden logic of complex networks. Enjoy https://t.co/QqrGb1iJz6
8
60
445
@leafs_s
CLaE
8 days
Neuron The neural computation of affective internal states in the hypothalamus: A dynamical systems perspective https://t.co/DiMDPwRwuf
2
71
357
@maisha_anj63027
Maisha ( KOMA )
9 hours
Build on Zama 🎉 @zama is building a complete ecosystem where computation happens on fully encrypted data, without breaking privacy at any point. From private execution to confidential smart contracts, every layer is designed to keep user data safe while still enabling real
216
14
277
@WolframResearch
Wolfram
8 days
Learn complex analysis the modern way—not just from the page, but from computation. New in the Wolfram eTextbook series: "Essentials of Complex Analysis" lets you run live code, visualize concepts and test your understanding. https://t.co/WmWjasUEK2
2
82
605
@JustinJackBear
CloudStrikeThunderbeing ⚡️
5 hours
The FUD comes from misunderstanding what $ICP actually is. ICP isn’t a hype coin. It’s a utility token that burns computation to run a global, decentralized internet inside tamper-proof canisters. It’s not competing with Solana. It’s capable of hosting Solana — and every other
8
15
60
@drwilliamwallac
William A. Wallace, Ph.D.
9 days
The immune system has computation and memory. This pathway map shows how innate and adaptive immunity coordinate threat detection, signal amplification, targeted killing, and long-term archival of antigen data. -Innate: pattern-recognition receptors, complement, macrophages,
10
143
524
@Nymph9406
Nymph
5 hours
Rankings change, but real impact compounds. @zama isn’t chasing short term visibility it's building foundational privacy infrastructure with FHE. By turning deep cryptographic research into usable tools like FHEVM, $Zama is making encrypted computation practical for
18
17
83
@vicotinamide
vico blanco
10 days
ang oa ng 36 te pakita nga ng computation????
@PopBase
Pop Base
10 days
Spotify Wrapped introduces new ‘Listening Age’ feature, which compares your musical tastes to others’ in your age group by looking at the release years of the tracks you listen to most.
55
219
4K
@Counselor_Ayo
Counselor | 𝔽rAI
7 hours
The more I look at this space, the more obvious it feels that privacy was never optional, it was just ignored. On chain shouldn’t automatically mean your data is public. What @zama is doing with fully homomorphic encryption proves that real computation can happen without
183
76
260
@maisha_anj63027
Maisha ( KOMA )
11 hours
gZama 🧡 In Web3, most conversations revolve around speed, scaling, and fees. Very few focus on. @zama is work brings dignity back into computation. They make it possible for applications to run logic on encrypted data, where personal information stays personal, even while
229
8
294
@hyranetwork
Hyra Network
2 days
🧩 What is Hyra’s Zero-Knowledge Proof (ZKP)? ZKP is a cryptographic method that lets you verify a computation without ever revealing the underlying data. In the Hyra ecosystem, ZKP is the core technology enabling verifiable, private, decentralized AI at scale. 🔒 Why ZKP
146
1K
1K
@dzsemx
Rushx ⚡
23 hours
Before call it a night 😴💤💛 FHE is the final form of onchain privacy. Not masking proofs, but keeping the entire computation encrypted. With @zama, this becomes a true privacy layer for Web3: • encrypted inputs • encrypted logic • encrypted state • all executed
78
1
91
@yourownExorcist
ORACLE
1 hour
you know how @zama tek lets you process data without ever decrypting it a very major contributor to that is TFHErs (torus fully homomorphic encryption), this is a rust programming language allows computation on encrypted data without ever decrypting it encrypt → compute →
10
2
12
@DeAI_Nexus
DeAI Nexus
1 day
The future of trustless computation is HERE. 2025 was a monumental year for DeAI Nexus! We successfully proved our core architecture. Next up: Testnet V1 (Q2 2026)! This is the official proving ground, ready to be stress-tested by YOU. Our community is the engine of the
93
182
989
@dri1merr
DR1MMER./
2 hours
Confidentiality Is the Last Missing Piece @zama Confidential smart contracts unlock an entirely new design space for blockchain applications 🚀 Especially in finance 💰, identity 🆔, and governance 🏛️. Powered by: • Zama • Zama • Zama Confidential computation brings
12
0
11
@ArigelaSasi
Sasi
1 day
What makes Zama interesting is how it treats encrypted computation as part of the normal blockchain workflow, not a special add-on The data stays private, the results remain verifiable, and the heavy FHE computation is handled offchain through a structured coprocessor network
52
5
66
@WolframResearch
Wolfram
4 days
Explore ready-to-use quantum computation examples #WithWolfram https://t.co/p8WjEEtMbc
2
14
90
@Shifu_38
Shifu
2 hours
Confidentiality is the missing layer of Web3 At Zama Protocol, Homomorphic Encryption (HE) is the core technology enabling computation directly on encrypted data without ever revealing the underlying information. But he alone isn’t enough. To address the limitations of
13
0
16