Self-Sovereign Identity and Legal Identity
We've finally gotten to a place where self-sovereign identities are technically possible. This is a huge milestone. The next hurdle is getting organizations, including governments to allow the use of self-sovereign identities as the basis for their administrative identities. In the case of legal identity, this would provide 1.8 billion people who have no legal identity with a way to establish one.
Continue reading...
We're Teaching Programming Wrong
Event-based programming is more natural for non-programmers than imperative or object-oriented styles.
Continue reading...
Properties of Permissioned and Permissionless Blockchains
Doc Searls asked me a question about blockchain that led to me writing him a rather long email. I thought I'd take a minute and write up my thoughts with some references.
Continue reading...
Reactive Programming Patterns: Examples from Fuse
Reactive programming requires new programming techniques and methods. This post describes common patterns in asynchronous reactive programming and gives examples from the open-source code base for the Fuse connected car platform. While the examples below are based on the pico platform, they are equally applicable to other Actor-based reactive programming platforms like Akka.
Continue reading...