1H
0.37%$0.0024
24H
-2.41%$0.0162
7D
1.54%$0.0099
30D
-13.5%$0.1020
iExec claims to have developed the first decentralized marketplace for cloud computing resources. Blockchain technology is used to organize a market network where users can monetize their computing power, applications, and datasets. By providing on-demand access to cloud computing resources, iExec is reportedly able to support compute-intensive applications in fields such as AI, big data, healthcare, rendering, or FinTech.
The iExec network is made up of computing resource providers. Computing power providers are called ‘iExec Workers’. As workers, users can connect their machines and be rewarded in RLC tokens for contributing resources to the network. Application providers can monetize their applications and algorithms. Data providers who own valuable datasets can make them available for use by applications through iExec. The iExec consensus protocol ‘PoCo’ (Proof of Contribution) provides consensus over off-chain computing and can also be used to integrate decentralized oracles with iExec.
iExec believes that its strength lies in trusted off-chain computing. Its representative heads the ‘Trusted Compute Working’ group within the Ethereum Enterprise Alliance. It has partnered with Intel to release a ‘trusted compute’ solution for blockchain (TEE using Intel SGX). Other iExec collaborators include Alibaba Cloud, IBM, Genesis Cloud, EDF electrical utility company, EEA, and Ubisoft. iExec was one of the contributors to the Trusted Compute Framework (Hyperledger Avalon) alongside Microsoft, Intel, ConsenSys, Envision, PegaSys, and Kaleido.
iExec is working with various organizations and consortiums with the goal of providing scalable, secure and easy access to the services, datasets, and computing resources.
Decentralized finance has been at the center of the cryptocurrency blaze recently, and the liquidity pool is an essential aspect of DeFi. In this article, we’ll be describing the concept of liquidity pools, explain why we need them and how they work.
Dark web as the name implies can be regarded as an invisible web that is only accessible via certain specified software, configurations, or authorizations. Let’s explore all that is concerned with the dark web for a better understanding.