Stephen Downes

Knowledge, Learning, Community

From Repository to the Distributed Web

Downloads: [Slides] [Video]

E-Learning 3.0, , Class, Apr 26, 2018.
Each file and all of the blocks within it are given a unique fingerprint called a cryptographic hash. When looking up files, you're asking the network to find nodes storing the content behind a unique hash.‚Äč

Stephen Downes Stephen Downes, Casselman, Canada

Creative Commons License.

Copyright 2021
Last Updated: Mar 31, 2021 10:03 a.m.