Brief overview DxChain

in dxchain •  6 years ago  (edited)

DxChain is developing a decentralized network with a tremendous amount of data and a machine learning network.

The plan is based on the plan itself that the data is valuable and the data developers are required to be willing to possess and own the benefit from the personal data. The team is eager to take on the bulk of the problem areas of tremendous data these need such as privacy, property and security to aid business intelligence and machine learning applications.

With the DxChain decentralized data exchange platform, users have all the chances to own and control their own personal data, non-dangerously trading and parsing the data. By using blockchain technology with multiple nodes and distributed storage, the cost of extracting and storing data will become important to reduce.

DxChain is based on chains—on—chain architecture that connects time mastercan and 2 sidechained. The design was developed for this in order to settle the numerous difficulties related to data computing, storage, and privacy problems; it would be difficult to create at the same time only one-chain.

Lightning Network inspired the idea of this structure, which demonstrates the payment Protocol 2 values on top of the blockchain. This was for example inspired by Hadoop, a centralized big data platform that was developed by the Apache Software Foundation (where some team members worked before)

3 Chane DxChain platform and any serious for lying different information:

Masterchain: saves information on the main tool and these actions like position, transactions, checks and contracts. Masterchain uses PoW to provide high value of security and strength.

Sidechain data (DSC): an uninformational storage or metadata that is considered a data unit that conducts information to other data and servers these as a way of copied storage.

The estimated sidechained (SS): saving special calculation tasks produced on DxChain the platform and the responsibility for recording the selection process of the calculation, as for example, has the ability to do a specific Directive to be supplemented or not.

Main features of the platform:

Verification of the game: allocates the probability of any computational task to be performed safely for example as a minimization of the number of network node computing asks this.

Provable Data computing (PDC): allows you to verify the accuracy of the calculation results. It is used by the calculated whose to verify the authenticity of the total and reduce the spread of incorrect information.

Proof of Spacetime (PoSt) & Provable Data Possession (PDP): used as a storage Protocol consensus. Data chain uses PoSt and PDP to verify processes and prevent all kinds of attacks that have all chances to destroy the network.

The team at this point is made up of 10 people and is located in San Francisco. Biographies of the main team members are given below.

Allan Zhang, co-founder-more than 10 years of skill in the field of security, especially in the conclusion of the security of mobile access, the establishment of a network application Protocol and expert assessment of the network, based on the identification of weak spaces. The founder and technical Director of Trustlook, who developed the mind-based products of cybersecurity based on artificial origin. Former position, covering a senior engineer of the research Department of the vulnerabilities in the defense information systems Palo Alto Networks and TELUS Security Solution, senior professional at defense information to nCircle Network Security, and professional software provisioning at Lucent Technology.

Wei Wang, co-founder and key scientific Advisor, is a skill in all kinds of fields, covering the study and development of blockchain, big data and distributed systems. He used to be a senior blockchain researcher at AT AT&T and a senior researcher in the field of big data and parallel data processing at Hortonworks. Previous positions: professional in data analysis and processing at Apixio and various research positions at Columbia Institute, Pittsburgh Institute and Carnegie Mellon Institute.

James Lee, co-founder-contains skills in blockchain systems development and architecture. More than 10 years of skill in the field of network security. Previously, he managed a mobile Department at Trustlook, a head support engineer at nCircle Network Security and a senior software developer at Lucent Technology.

Taosheng Shi, a blockchain engineer-more than 10 years of skill in research and development of distributed systems. Previously, he worked at NOKIA as a Manager of innovations for 5 years, managing R&D in building data storage and remote cloudy platforms, conducting expertise in the integration of large data and database architecture, etc

If Lou, prospector blockchain — more than 10 years skill in tremendous data and raspredelennykh systems. Earlier a technical head in LaiOffer, the educational Internet platform. Previously, he worked in various positions in the Apache Software Foundation, Hortonworks, Google, and Microsoft. He received his doctorate in computer science in 2014 at the Rochester Institute.

The plan for example hires employees in various fields on the website in the Career section.

Plan consultants are considered to be Yan Gong, Dr. CEIBS, Kevin Hsu, founder of BockVC, Leo Wang, founding partner of PreAngle and Fan Zhang, companion of Vancion and in the past, founding partner of Sequoia Capital China.

Investors of the plan are deemed PreAngel, Fenbushi Digital, BlockVC, Node, Capital, Signum Capital, JRR Crypto, Fission Capital and other.
https://www.dxchain.com/
tg://resolve?domain=DxChainBot&start=qkczdh-qkczdh

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

This user is on the @buildawhale blacklist for one or more of the following reasons:

  • Spam
  • Plagiarism
  • Scam or Fraud