XRP Ledger or simply XRP (formerly called Ripple) is a free software project and a payment protocol that pursues the development of a credit system based on the peer-to-peer paradigm. Each node of the network functions as a local exchange system, so that the entire system forms a decentralized mutual bank. Some consider that implemented to its last consequences this network would constitute a decentralized social network service based on honor and trust among its participants at a global level (in this way, its financial capital is based on social capital). A reduced version of the network would consist of an extension of the traditional banking system in which there are alternative payment routes that do not depend on central banks.

Published on: 10/26/20, 2:37 PM

IOTA is an open source distributed ledger technology, which aims to securely enable the exchange of information and value on the Internet of Things. One of the main innovations of IOTA is that, instead of the traditional Blockchain, it uses its own architecture (Tangle) based on a mathematical concept called Directed Acyclic Graph (DAG). Such an architecture means there are no fees, low network latency, and better scalability prospects. IOTA is currently in the development phase and it is expected that throughout 2019 the technology will be ready to be adopted on a large scale. IOTA was founded in 2015 by David Sønstebø, Sergey Ivancheglo, Dominik Schiener, and Serguei Popov.

Published on: 10/26/20, 2:32 PM

Ethereum is an open source platform, decentralized unlike other blockchains, Ethereum can do much more. It is programmable, which means that developers can use it to create new types of applications.

These decentralized applications (or "dapps") get the benefits of cryptocurrency and blockchain technology. They are reliable and predictable, which means that once they are "loaded" onto Ethereum, they will always run as scheduled. They can control digital assets to create new types of financial applications. They can be decentralized, which means that no entity or person controls them.

Published on: 10/26/20, 2:28 PM

A cryptocurrency, cryptocurrency or cryptocurrency is a digital medium of exchange that uses strong cryptography to secure transactions, control the creation of additional units, and verify the transfer of assets using distributed ledger technologies. Cryptocurrencies are a type of alternative currency or digital currency. There is controversy that cryptocurrencies have to be decentralized control or centralized currencies by central banks or another entity.

Published on: 10/26/20, 2:22 PM

It was conceived in 2008 by an entity known under the pseudonym Satoshi Nakamoto, whose specific identity is unknown. Satoshi worked on the source code of the reference application alongside other volunteer developers until December 2010, at which point he decided to terminate his public activity.

Its traditional unit of account is called "bitcoin" (in plural bitcoins or bitcoines), and it is used to record and transfer value, which is why it is classified as digital currency. Each "bitcoin" is made up of 100 million "satoshis" which is the minimum unit of account.

It implements the technology of the “chain of blocks”, which is often described as a digital ledger, distributed and tamper-proof, in which the history of all transactions is permanently and verifiable. It is characterized by being a decentralized system, not supported or controlled by any government or central bank and its transactions do not require centralized intermediaries.

Published on: 10/26/20, 2:01 PM

Physical exercise is any physical activity that improves and maintains a person's physical fitness, health, and well-being. This has various benefits such as muscle strengthening, improving the cardiovascular system, developing athletic skills, sports, fat loss or maintenance, emotional well-being, among others.

Published on: 10/3/20, 4:59 PM

Computer security, also known as cybersecurity or information technology security, is the area related to computer science and telematics that focuses on the protection of computer infrastructure and everything related to it and, especially, the information contained therein in a computer or circulating through computer networks.

Published on: 10/3/20, 3:18 PM