Filecoin case study

Assignment Help Basic Computer Science
Reference no: EM132639213

Please read the Filecoin case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay.

1. How did Filecoin conduct its ICO?

2. How is Filecoin's ICO similar to and different from:

a) an equity IPO?

b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?

3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?

4. Why should investors be attracted to Filecoin?

5. Why should be wary of Filecoin?

6. Why are regulators encouraging or opposing ICOs?

7. What have some regulators done in response to ICOs?

Reference no: EM132639213

Questions Cloud

Describe the life journey of the person : Describe the life journey of the person who is the subject of your study. Apply Freud's, Erikson's, or Maslow's theory to discuss and explain the development.
Psychological perspectives and determinants of behavior : Each psychological perspective offers a unique vantage point or lens through which to view human behavior.
Describe the personality disorder for the case study : Describe the personality disorder for the case study you selected. Apply the theories in your selected model to explain how the disorder may have developed.
How did your attention change or focus differently : Do you take vision for granted? Many of us do. Select an activity you can do safely with your eyes closed (e.g. play catch with something soft, fold laundry.
Filecoin case study : How did Filecoin conduct its ICO? What are the pros and cons of Filecoin conducting a fundraising through an ICO?
Describing reasons that our clients sexuality address : Please write 350 words describing 5 reasons that our clients sexuality might be important to address in the counseling process.
What are likely marketing strategies of maintenance strategy : Discuss what are the likely marketing strategies of maintenance strategy, Disrupt strategy, Capture strategy, Intercept Strategy, Preference Strategy
How a counselor knowledge of the abuse cycle would assist : Describe how a counselor's knowledge of the abuse cycle would assist in detecting partner abuse. Include a minimum of two scholarly references in addition.
Enterprise risk management : Discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How viterbi algorithm can be used to extend the kernighan

The Viterbi algorithm can be used to extend a simplified version of the Kernighan et al. (1990) spelling error correction algorithm.

  Specializes in enterprise resource planning

Research the different MSS processes currently used in business. How the MSS supports establishing a competitive advantage

  Perform a single migration procedure

Rather than perform a single migration procedure that copies all user data from the source to the destination computer at once, in a server migration you migrate roles or role services individually.

  Analyze the network and propose improvement plans

Select a network you are familiar with, or from one of the Virtual Organizations (Riordan Manufacturing or Kudler Foods).  Write a 5- to 8-page paper (use diagrams, tables and charts whenever possible) to analyze the network and propose improvement..

  Describe the steps you would use to diagnose

Explain the steps you would use to diagnose, and repair if necessary, spyware on the customer's computer. Also, add how you would safeguard the children from uninvited material showing up on the internet.

  Why is it governance important

Why is IT Governance important? A situation that could have been prevented had a corporate of IT policy been in place?

  What data structure is appropriate to support operations

What data structure is appropriate to support these operations? You may assume that you can distinguish slots of a block that do not contain a record from those that do. You can make this distinction either by having a convention for null values w..

  Explain components involved in the virtualization process

Create a 1- to 2-page diagram using Visio® describing the different components involved in the virtualization process, such as virtual machine (VM) images.

  How an os knows the type of file system on a flash drive

List steps involved in the OS since plug in of the flash drive until the display of the file system on screen?

  What are devices in your home that appear to use computers

What are devices in your home that appear to use computers or algorithms? Can you name at least one device for every room in your house?

  Borrowers on mortgage application forms

Why did mortgage lenders frequently not check on information provided by potential borrowers on mortgage application forms during the 2000 to 2007 period?

  How the appliances you chose work

All electronic appliances used in our day-to-day life use programming that helps them to behave in an expected manner. Identify five appliances from your daily life. Based on your research and your observations of how the appliances you chose work,..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd