Decentralized point to point instant messaging
for your question, subtract the mean from each measurement.
De flow means that all social resources can be aggregated and distributed with one click
in a system with many nodes, each node has a high degree of autonomy. Nodes can connect with each other freely to form a new connection unit. Any node may become the stage center, but it does not have the mandatory central control function. The influence between nodes will form a nonlinear causal relationship through the network
This kind of open, flat and equal system phenomenon or structure is called decentralization
extended materials:
compared with the previous Internet (WEB 1.0) era, today's Internet (Web 2.0) content is no longer proced by professional websites or specific groups, but by the participation of the whole Internet users and the creation of equal power levels. Anyone can express their views on the Internet or create original content to proce information together
with the diversification of network service shape, the decentralized network model becomes more and more clear and possible. After the rise of Web2.0, the services provided by Wikipedia, Flickr, blogger and other network service providers are decentralized. Any participant can submit content, and Internet users can create or contribute content together
if blockchain technology is decentralized, it means that there is no central server responsible for unified management
point to point encryption is mainly the exchange of secret keys. It's hard for this technology to be absolutely safe. In the future, peer-to-peer encryption will create a more private communication mode for us
finally, security is relative and costly. The more secure, the more complex.
this setting is troublesome, because it is a piece of paper, which can be forged, and there will be various gaps. The issuing authority is also a person, and there will be various gaps in the middle. As long as it is related to people, there will be various possibilities related to which media
blockchain provides a good opportunity. As soon as you graate, you can generate a record on the blockchain. No one can change this record. This thing exists objectively. As a physical existence, and then as a data existence, blockchain will be generated
in this way, it is easy for anyone who wants to find out where he graated from
this is similar to the big data often used in social networking (WeChat) and payment platforms (Alipay, Yi Bao).
through the blockchain, communication services can organize the operation of communication services without the mode of central enterprise. In the future, blockchain should have a real impact on real life, not just by concept and hype, but by real landing procts. What is really landing procts is procts that can meet the needs of users. If the existing centralized procts can well meet the needs of users, then the decentralized procts will not have enough substitution effect, and can not be truly implemented
the protocol layer of blockchain mainly includes four aspects: network programming, distributed algorithm, encrypted signature and data storage technology
the ability of network programming is the main factor for us to choose a programming language, because distributed algorithm is basically the implementation of business logic and can be achieved in any language. The encryption signature technology is directly and simply used, and the database technology is mainly used. Only the implementation of point-to-point network and concurrent processing is the difficulty of development. Therefore, for those languages with strong network programming ability and simple concurrency processing, people especially prefer them
users get the initial number of tokens for free. Some of its practical use scenarios:
1. Encrypted video chat: multinational users want to have video chat, only when both sides hold a certain number of SKM can they achieve encrypted video chat
2. Large capacity file encrypted transmission: the file transmitted by one user to another user exceeds the size limit, and the sender must hold a certain token to realize encrypted transmission
3. Conversation information saving: conversation records can be saved as long as both parties agree, and both parties need to hold a certain amount of tokens
4. Retransmission reminder: if a user sends a file to another user, but he doesn't want the other user to share it, the user can use a certain token to be notified when the file is retransmitted
5. Secret key unlock file: one user transfers the secret key file to another, and only the other party is allowed to view it. The sending user can use the token to let the other party receive the fragmented file. Only by getting the secret key from the sender can the file be unlocked<
the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system.
to query the information of the graphics card, first query the information of the graphics card, the notebook series is amd R, NVIDIA's MX host, and the mainstream is GTX 1080