Blue Skies Finally Appear After Weeks of Rain

The typically grey and rainy skies of Southeastern Louisiana University’s campus the past few weeks have finally subsided. Louisiana’s climate typically tends to be less than desirable for those who…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




ADA Handle Partners with Iagon

We are extremely pleased to announce our newest partnership with Iagon!

The elephant-in-the-room-problem with crypto is that lots of decentralized protocols aren’t actually decentralized — they often depend on computing with centralized tech giants like Amazon, Google, IBM and Oracle.

All your favorite node operators that host on cloud providers, or use software from SaaS companies, could potentially be targeted and cut out of the market. This puts the core character of our industry in dire circumstances: indirect centralization.

How do we re-arrange the value stack to provide true and complete decentralization from top to bottom?

Iagon is a framework that will provide globally distributed computing power and storage for decentralized networks. With the power of IoT, edge computing, and mobile devices, there is a lot of compute power and data left on the fringes of networks.

Iagon seeks to provide economic incentives for individuals across the world to connect their unused devices to the network to process and store data.

The Partnership

As a part of this partnership, Iagon will add support for Handle address resolution directly within their platform!

As we both pursue the potential reality of enabling anybody in the world to participate in globally distributed networks and push power to the edges we are proud to build alongside Iagon.

Add a comment

Related posts:

Wisdom From The Women Leading The Blockchain Revolution With Li Gong Of Youbi Capital

As a part of our series about Wisdom From The Women Leading The Blockchain Revolution, had the pleasure of interviewing Li Gong. Li Gong is a Partner at Youbi Capital and Venture Partner at HashKey…

What is Zero Trust Security?

Zero Trust is an approach to IT security that not only assumes that a trusted network perimeter does not exist, but also validates every network transaction before it is released. It follows the…

Finding Truth in a Sea of Spin

I was sitting in my political reporting class when my professor — the Toronto Star’s political journalist Susan Delacourt — instructed me to listen to the CBC’s six-part broadcast series of the same…