5 Matching Annotations
  1. Nov 2019
    1. Another dead idea? Circle's turned around and spun out Polonix less than 2 years after the $400M acquisition, shutting down its US operations.

  2. Jul 2019
    1. Cryptokitties may have once broke Ethereum, but looks like that was a flash-fad. In the last 7 days (2019/07/28) only 514 unique users have used the DAPP.

      current use here: https://www.dapp.com/dapp/CryptoKitties

    1. OneGram is another failed project. It is only traded on one small and unknown exchange, with very low volume. Coinmarket Cap doesn't list it. Their blog posts and activity have gone to zero. Perhaps still alive, but as a VC would say, its walking dead.

    2. Earth Token is listed by CoinmarketCap as having a ROI of -99.65% and current market cap of $34k USD. Basically they are dead. As with many of the companies mentioned in the videos so far...they are already gone. The space is changing too rapidly.

      Etherscan.io shows that they has interest from ~15,000+ people who wanted to join in the ICO, but looks like it never went off. One of the co-founders has already died and their blog and website are bereft of updates.

    1. Fellow student, since you are reading this, you installed Hypothes.is as the instructor's recommended. However, the extension by default has permissions to read all data on all websites you visit. Technically that means email, banking sites, etc. I for one don't want to give random software that authority. The developer did provide a easy way to limit that, and I'll assume he programmed it to work as promised. If you right click on the "h." extension icon, you can change "This can read and write all site data" to only Coursera - which means you can use the extension for the class, but it shouldn't be reading your emails or bank passwords.

      For the course writers and INSEAD - while Hypothesis looks solid and its nice that its non-profit, encouraging all students to install unrestricted extensions which can read all pages and data is a big responsibility, it could easily go wrong. Have you considered how this could be used as malware with the extensive permissions the extension is granted by default?