NEAR Protocol

by NEAR

(0)
View Profile

Etherparty

by Etherparty

(0)
View Profile

Swarm

by Swarm

(0)
View Profile

NEAR Protocol

by NEAR

(0)
View Profile

Etherparty

by Etherparty

(0)
View Profile

Swarm

by Swarm

(0)
View Profile

What problem does this service solve?

NEAR's goal is to serve as an open source platform that will accelerate the development of decentralized applicationsEtherparty wants to simplify the development of decentralized applications. It is developing a platform of blockchain software products that will help users develop many of the common functionalities with less technical knowledge.Swarm's tokenization platform allows users to create tokens that represent ownership of part of an asset, secure rights to any revenue streams from that asset, and trade these tokens in a compliant manner.

Token Stats

Company Description

NEAR Protocol is a decentralized application platform designed to make DApps operable on the web. The NEAR network uses a Proof of Stake consensus mechanism called Nightshade. The NEAR utility token is used for processing transactions and storing data, as well as for facilitating voting for governance issues.
.

Etherparty is a cloud platform offering blockchain related software. They want to make smart contracts as easy and accessible as possible. by helping to automate many functions that decentralized applications require. Etherparty focuses on user-friendly design to simplify the creation of smart contract related platforms. They are currently developing several software products aimed at users with different needs, including: token generation, crowdfunding, supply chain management, and philanthropy. Etherparty is powered by FUEL tokens.

Swarm is building a tokenization platform designed to leverage the benefits of blockchain to make it easier to fund and govern a variety of large real world projects. They hope to make it easier to tokenize real world assets, and make them available as investment opportunities. Swarm is also developing the SRC-20 protocol, which will define a common set of rules that a security token must follow, and will give users the ability to create DApps that follow these accepted properties. Swarm is powered by the SWM token.

Ratings

(0)

(0)

(0)