Articles about Blockchain - Section 19
Zou Chuanwei: The logic and mechanism of the blockchain applied in the post-processing of financial transactions
The central bank's digital currency and the global stable currency represented by Libra reflect the application ...
How does Ruixing's employees commit fraud of 2.2 billion, and how to use technology to prevent financial fraud?
Text | Edit by Derek | Produced by Bi Tongtong | PANews Ruixing Coffee's "self-defense financial fraud"...
Global blockchain status: Asia is the most competitive, and Africa is the largest target market?
Author: Joseph Birch Translator: Sambodhi Source: Blockchain Outpost Globally, the adoption of blockchain technology ...
Yao Qian: Three major scenarios and solutions in which blockchain may be applied to central bank digital currency
Source of this article: First Financial , original title "Yao Qian: Blockchain and Central Bank Digital Currency...
Observation | Xiong'an Blockchain's 3rd Anniversary: From the first tree with an "identity card" to the official opening of the blockchain laboratory
On March 31, the day before the third anniversary of the establishment of the Xiong'an New District, the Xiong&a...
Video | Chen Xiaohua: Two attributes, six dimensions, and one center of the blockchain
What is blockchain? What is the development stage and future prospects of the blockchain? What can it bring us? These...
The application prospect of blockchain technology in sudden public safety incidents: how to realize "digital city governance" and "digital epidemic prevention"?
Source: National Governance Weekly Editor's Note: The original title was "The Application Prospect of Block...
Fragmented identity data, reshaped on the blockchain
"Identity" is the most basic information for everyone. When it comes to identity, the majority of people ha...
Inventory of China's four major trade areas: what has the blockchain "horse enclosure" done over the years?
Today ’s article is a summary and summary of the four very important trade zones divided by China, namely Xion...
Technology Sharing | Synergy between Cryptography, Blockchain and Privacy Computing
Hashing theory No privacy, no insurance? Privacy computing constitutes a moat that users trust, and the hero behind p...

- You may be interested
- Behind the scenes of the USDT, the deal...
- Ethereum 2.0 will set sail, are you wil...
- Overstock CEO madly sold 900,000 shares...
- Layer1 Protocol Galactica Network Intro...
- With no pre-mining and a fair launch, h...
- Bai Shuo: It is recommended that China ...
- Use the blockchain to find the source o...
- Babbitt Column | Is Global Stable Coin ...
- Research Report | 360-degree explanatio...
- 2019 Digital Expo CCTV Interview –...
- Observation: Which business model will ...
- The USDT thunder has once again trigger...
- Featured | Five-Minute Quick Tour of th...
- U.S. SEC sues Coinbase, alleging violat...
- DeFi data observation in 2019: the effi...
Find your business way
Globalization of Business, We can all achieve our own Success.