The 2017 crypto bubble and 2018 crypto crash don’t mean 2019 will be the death of blockchain -- rather, this is just the beginning. Companies must improve DLT, develop viable software stacks, and make STOs viable -- with these advancements, businesses can truly take advantage for the security, transparency, and auditability of DLT networks.Read More
In May 2018 at the Consensus NY show, He3Labs demonstrated an alpha version of its Threshold SaaS blockchain platform for business. It was the first application to demonstrate NEM’s version 2.0 Catapult blockchain technology – and was built in only a week using the API-driven applicationRead More
Summary: He3Labs and UTP demonstrated the potential of blockchain in the public sector with an e-gGovernment proof of concept system that allows uses to take advantage of blockchain-based citizen's ID, election voting, land registry, and use of cryptocurrency for individual payments or merchant point-of-sale – all via smartphone .Read More
Blockchain technology – or more generally, distributed ledger technology (DLT) development – has the potential to transform the world of business even more broadly and deeply than the first generation of internet technologies of the ‘90s and 2000s. But what sort of transformation will it bring and who will profit most from this transformation?Read More
Upholding a fully decentralized application’s altruistic intentions can result in a growing list of development demands that may ultimately contradict each other. CTOs and business leadership must understand how to create a practical business solution with DLT.Read More
One of the most important questions that can asked about a new technology is: What is this thing actually good for? A DLT “trust engine” provides two essential elements: rules and records. Understanding these rules and records helps understand the importance and applicability of various forms of DLT in viable business solutions.
Earlier, we wrote on how businesses can benefit from keeping private business data on a private blockchain. Having personally built software using a private blockchain run on private servers and seeing how naturally the DLT fit into that system, I consider the point made: useful blockchain does not necessarily require public decentralization. A business can benefit greatly from the properties of a trusted, private DLT.Read More
Security token offerings (STOs) are rising as ICO utility tokens face regulatory scrutiny and rampant fraud. Security tokens combine the liquidity and democratic access of cryptocurrencies with the necessary regulatory controls for a token to properly represent a security and can be structured in a variety of ways for regulation compliance.Read More
Double-Coin Blockchain Systems
A double-coin system splits the investing function and utility function into different coins. In many examples one coin is for investors and miners and the other is for utility and commerce.
This lets the network use the best features of both a fixed-supply coin (price to the moon!) and an uncapped coin (make new coins whenever you want.)Read More
Understanding pros and cons of blockchain economic systems is important when a business is deciding which blockchain platform to use to launch an ICO or utility token.
This article discusses the tokenomic structure of blockchain systems. In other words, it compares ways of designing high level economic models of blockchains. In contrast, this article is not about creating a coin for a specific business use. We are focusing on where the rail systems can take us, not what kind of trains to run.
This week IBM announced that it was working with a company called Stronghold to release a new stablecoin – a cryptocurrency designed to have stable value – on the Stellar public blockchain network. A high-profile announcement like this is clearly good news for Stellar, but it could also indicate the start of a meaningful maturation of blockchain that may not be immediately obvious.Read More
Running private DLT nodes within a company firewall, private DLT networks naturally keep user and business transactions private, while still ensuring they are correct and can’t be tampered with.Read More