paint-brush
In Defense of the Utility Tokenby@charlesdusek
117 reads

In Defense of the Utility Token

by Charles Dusek9mDecember 12th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In addition to cryptocurrencies, blockchain technology has given rise to multiple decentralized compute and storage networks. These networks seek to allow individuals and companies to buy and sell compute resources from one another through the exchange of digital tokens. They come in many different forms and present a significant opportunity for prosumers to host a wide range of resources and “mine” tokens that commoditize those resources. Although there are significant advantages to these networks, enterprises must have confidence that their data is protected. This cannot be accomplished in a decentralized manner without hardware that is secured from adversarial operators. (Breuer, Bowen, Palomar, & Liu, 2018)

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - In Defense of the Utility Token
Charles Dusek HackerNoon profile picture
Charles Dusek

Charles Dusek

@charlesdusek

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite