Skip to content

This event was canceled

Details

Join us for our ICO Meetup. Here you'll be able to network with others interested in ICOs and hear presentations from a Boston based ICOs: Conduit Computing. Absolutely Free - Come network and learn. We look forward to meeting you!

Location

Graciously hosted by G-Tek Labs @ 28 Damrell Street - g-teklabs.com

The closest T stop is Andrew then a short walk down Dorchester to Damrell St.

There is parking available for free after 6pm in the lot with the Food Truck. Onstreet parking is also free (if you can find a spot that is!)

Livestream

Can't make it? Not in Boston? No worries join our livestream which will start at 6:30PM Eastern Time

https://www.youtube.com/channel/UCqDx_EA9hXq61Lxplh98XWg

(don't like this long url - we don't either - subscribe to our channel so we can reach 100 youtube subscribers to change it)

SPONSOR: Pizza provided by John Hargrave of Bitcoin Market Journal https://www.bitcoinmarketjournal.com

SPONSOR: Organized by John Lohavichan and Jason Kraus of Mattervest: www.mattervest.com

Schedule

6-6:30pm Networking with Food & Drinks

6:30-7:00pm Bitcoin Game, Announcements (If you have anything you want us to announce let us know), Sponsors

7:00-7:30pm ICO Presentation by Conduit Computing.

7:30-8:00pm More Networking and Farewells

Conduit Computing http://www.conduitcomputing.com/

Both the modern PC and specialized computers also known as GPU’s can profit from Conduit mining by renting their computing power. With a global network, Conduit provides high-quality cloud computing, cloud mining, and parallel computing 24/7.

Uber is the largest taxi company but doesn't have taxis. We don't have infrastructure costs, maintenance costs, electricity costs or internet bandwidth costs so we can provide our service cheaper than AWS does.

The Conduit security features come integrated into the software. Conduit uses a multi-layered approach verified by industry level software engineers. Conduit utilizes its approach to address two security aspects, in particular, malicious client inputs and malicious miner outputs.

Related topics

You may also like