IPFS

by

(0)
View Profile

Lisk

by Lisk

(0)
View Profile

Ubiq

by Ubiq Technology

(0)
View Profile

IPFS

by

(0)
View Profile

Lisk

by Lisk

(0)
View Profile

Ubiq

by Ubiq Technology

(0)
View Profile

What problem does this service solve?

IPFS is a decentralized alternative to HTTP that can be used to make recording blockchain transactions more efficient.Lisk uses sidechains, that can be easily customized, to allow developers to create their own decentralized applications.Ubiq is a fork of Ethereum aimed at increasing the stability and reliability of smart contract execution.

Token Stats

Company Description

The Interplanetary File System (IPFS) is a decentralized network protocol for sharing hypermedia in a distributed file system. IPFS can be used to link blockchain transactions This effectively timestamps and secures the content, without having to put the data on the chain itself. Filecoin, an IPFS-based decentralized storage cloud, is closely related with the IPFS protocol, and provides the incentive system.

Lisk is a blockchain-based platform that allows developers to build and publish their own applications. Lisk uses sidechain development kits, that are written in Javascript, to enable users to create their own blockchain applications according to their needs. Each decentralized App runs on its own sidechain that can be customized, and is connected to the Lisk blockchain, which has a Delegated Proof-of-Stake (dPoS) consensus mechanism. The Lisk network is powered by the LSK coin.

Ubiq is an Ethereum fork that aims to create a more stable smart contract platform for building DApps. Ubiq's protocol currently uses a Proof-of-Work (PoW) consensus mechanism, but will switch to Proof-of-Stake in 2019. The network is powered by the UBQ coin.
Ubiq's goal is to create a reliable and stable platform for developing DApps by modifying Ethereum's code base with important changes that will make it more secure and reduce instability. Consensus is based on their Flux Difficulty Algorithm, which is designed to constantly adjust the hash rate to protect against network attacks.

Ratings

(0)

(0)

(0)