-
I'm looking for a language with the following two properties:
- untrusted code can be sandboxed and executed within the same process, while restricting both runtime and access to resources (stack fra…
void4 updated
7 years ago
-
Phay mentioned like a normal CV has:
* I have achieved this and that
* and so on
* can be done via Google docs together
mentioned in [hangout 22](https://github.com/Erkan-Yilmaz/Gridcoin-hango…
-
Absolutely, I'll incorporate the previous entries into the table format for a comprehensive overview:
| # | Project | Description …
-
We are offering $10,000 in $AKT and $250 in free object storage for the developer or team that builds the best app that integrates Filebase + Akash.
### Hackathon Begins: September 1, 2021
### Hac…
-
- [x] Work on decentralized app survey questions for mailing list
- [x] Try out decentralized messaging apps
- [x] 1-on-1 w/ Chase
- [x] 1-on-1 w/ Ken
- [x] Call with lawyers
- [x] 1-on-1 w/ Xan
…
-
Submitting Author: Gionata Ghiggi (@ghiggi)
All current maintainers: (@ghiggi)
Package Name: disdrodb
One-Line Description of Package: disdrodb - A software for the decentralized archiving and sta…
-
Phala Network is a decentralized protocol that aggregates the distributed computing resources and make it available for developer to use. The tokenomic plays the core role in this process. On the one …
-
Considering the legal case in the US that lists Dogecoin as a security (falsely) we should provide an article for Shibes under the US legal system to explain why Dogecoin is not a security.
-
Idea raised by Jennie Delisi in the TPAC session on Values - for terms that are subject to many interpretations like decentralization, we should have a glossary to clearly define.
-
# Exploring a BIDS-DID Specification for Research Participant Data Self-Sovereignty
## Project Description
The General Data Protection Regulation (GDPR) provides a high level of protection for he…