Sublime
An inspiration engine for ideas
Ben Dobbrick • The Otters go Soulbound
Outsourcing Trust
Molly • 2 cards
social commerce
sari and • 98 cards
cryptography (via hash codes) is used to secure the authentication of the transaction source and removes the need for a central intermediary.
William Mougayar • The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology
Denis Nazarov • What comes after open source? — Denis Nazarov
Linda Xie • A Beginner's Guide to NFTs
The Sharing Economy
sari and • 31 cards
Ces derniers signeraient les transactions et valideraient leur authenticité. Pour s’assurer que ces validateurs sont fiables, ils seraient obligés de mettre en dépôt leurs Ethers (la cryptomonnaie d’Ethereum) pour effectuer ce rôle. S’ils ne valident pas correctement, ils perdent des Ethers.
Stéphane Loignon • Big Bang Blockchain. La seconde révolution d'internet (ACTUALITE SOCIETE) (French Edition)
The reciprocation rule brings about mutual concession in two ways. The first is obvious. It pressures the recipient of an already-made concession to respond in kind. The second, while not so obvious, is pivotally important. Just as in the case of favors, gifts, or aid, the obligation to reciprocate a concession encourages the creation of socially d
... See more