What are NFTs? Everyone seems to be talking about them but what are they, and how can you use them?

Interested? Then this thread is for you!

🧵🔽
1️⃣ What Is An NFT?

Non-fungible tokens (NFTs) are digital assets. Just imagine a trading card where each card has unique information engraved into it. No two NFTs are the same and they are thus not interchangeable.
Other than crypto where one BTC is one and two BTC are two BTC, two NFTs are one NFT and one NFT. Only because you have two NFTs of the same type simply doesn't enable you to sum them up together.
Try to imagine a festival ticket (those things that were worth buying before the pandemic hit, where physical festivals still existed). If you buy one, it usually has your name on it such that it only grants access for you.
Most NFTs are currently based on the Ethereum blockchain. They are basically tokens implemented as a smart contract.

Everyone can implement an NFT and create their own platform for that.
2️⃣ Some Characteristics

ℹ️ NFTs are non-interoperable:

NFTs of platform A usually cannot be used on platform B.

ℹ️ NFTs are indivisible:

You can't break an NFT up. One BTC consists of multiple satoshis (fraction of one BTC), e.g. One NFT is just one NFT.
ℹ️ NFTs are indestructible/immutable:

Because NFTs are tokens on a blockchain, they are immutable. You can't change the owner of an NFT because you had to overtake the whole blockchain for that.
ℹ️ NFTs are traceable:

Thanks to the blockchain, you can always trace an NFT back to its origins (original creator, e.g.).
3️⃣ What Can You Do With Them?

Well, a lot. NFTs are only smart contracts, so you can basically implement anything for them that comes to your mind. You can sell trading cards as NFTs or interesting sports moments (NBA top shots, e.g.).
You could also sell music pieces as NFTs or simply art. What exactly the buyer gets is up to the individual NFT implementation.

The creator of an NFT could, for example, sell a piece of art while also ensuring that whenever an NFT is resold, they get a portion ...
... of the price as royalties.
4️⃣ Why Are NFTs Important?

NFTs bring an opportunity to the table. The ability to sell digital pieces while ensuring that the ownership of one particular piece can be verified. Everyone can check whether roxXx0r4711 really owns that digital Pokemon card they say they own.
Creators get the chance to monetize their work in a digital way while also ensuring some safety for the buyers of their work.

Buying a "unique" digital image through a webshop usually gives you no verifiable guarantees, whether you are really the only owner of that piece.
If you buy an NFT, you can get such a guarantee. If someone sold more NFTs for the same work, your NFT would still be unique, but you could also verify that your piece is not as unique as someone tries to tell you.
5️⃣ Why Are NFTs Worth Something?

Because there is a demand for it. You could also ask the question of why people buy virtual skins for games with real money. The answer is simple: Because they want to show off, or simply want to own that piece.
6️⃣ This Is All A Scam!

Perhaps it is, perhaps it isn't. I think people said the same when the internet came up and companies started experimenting with this new platform.

There are currently artists who finally make money by selling NFTs of their art.
This also includes artists previously struggling a lot to make money with their art. For them, NFTs are not a scam but finally a source of income.

You can decide yourself whether you like the idea of NFTs or not.
7️⃣ Before You Leave

I hope you liked this thread about NFTs and learned something about this interesting concept and technology!

Do some research yourself and look at some of the current applications of NFTs before you form your own opinion.
The internet is currently full of information about NFTs, so you won't have a hard time finding more on this topic.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Oliver Jumpertz

Oliver Jumpertz Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @oliverjumpertz

16 Mar
Let's talk about Rust.

The most-loved language, according to StackOverflow's yearly developer survey that not enough people seem to use professionally.

🧵⏬
1️⃣ What Is Rust?

Rust is a systems programming language that is compiled to binary. It has no runtime and instead uses a concept called "borrow checking". Developers don't need to explicitly free memory, the compiler does it for them.
The language itself is multi-paradigm, offering functional, generic, imperative, structured, and concurrent programming with a huge emphasis on performance, memory safety, and developer productivity.
Read 26 tweets
14 Mar
Let's talk about how you can optimize your LinkedIn profile by using keywords.

This approach worked pretty well for me, and it might help you, too.

🧵🔽
1️⃣ Most Recruiters Search For Keywords

LinkedIn offers recruiters the chance to look for profiles of users by using keywords. If you ever had to search in Atlassian Jira, you know how that works approx.
If not, basically imagine it like this:

A recruiter can type in keywords and then use boolean logic, like ("engineer" OR "developer" OR "dev") AND "javascript" AND ("react" OR "vue").

LinkedIn will process this and then return a list of potential profiles for them.
Read 13 tweets
13 Mar
Imagine every device manufacturer created their own plug that only they were allowed to manufacture. You'd need at least one cable for each device to charge. Gladly we have USB as a standard.

The Dependency Inversion Principle solves this issue for software.

🧵🔽
1️⃣ What does it state?

Modules that encapsulate high-level policy should not depend upon modules that implement details. Rather, both kinds of modules should depend upon abstractions.
This may sound a little complicated, but you can break it up, as follows:

1. High-level modules should not depend on low-level modules. Both should depend on abstractions (e.g., interfaces).
Read 23 tweets
12 Mar
Just imagine that you need 20 different keys on your keyring to enter your home but only one of them is actually used to unlock the door.

The Interface Segregation Principle tries to solve this problem for software.

🧵🔽
1️⃣ What does it state?

The Interface Segregation Principle (ISP) sets a pretty simple statement:

"No client should be forced to depend on methods it does not use."

The ISP applied to the extreme will result in single-method interfaces, also called role interfaces.
You can take a look at the following example to get an idea of how the ISP can be violated in one way (it's in TypeScript). interface ReportService {  ...
Read 18 tweets
5 Mar
Code Reviews are a great way to use the experience and knowledge of a team to create good software. Not all review processes are enjoyable, though.

Here are 6 tips to make your review process better and more enjoyable for everyone!

🧵🔽 Two developers sitting at a...
1️⃣ Make Expectations Clear

A good review process should both be standardized and individual. The terms of the process should be written down and transparent for everyone on the team. Each team member should know what is expected of them and all team members should agree ...
... on the terms. Changing the terms should always be a democratic process within the team. If the team disagrees on changes or terms, it should discuss the issues until there is consent.

On the other hand, the process should be flexible enough to allow for individuality.
Read 19 tweets
18 Feb
Proof-Of-Work is the name of a cryptographic algorithm that is used for some blockchains when new blocks are to be appended to the chain.

Let's take a higher-level look at how this one works, shall we?

🧵🔽
1️⃣ The Basics

This algorithm creates a system in which one party (the prover) has to prove to one or multiple other parties (the verifiers) that they put in a certain amount of work for some purpose.
The work the prover has to put in is moderately hard to very hard, while the verifiers can pretty easily check whether the proof is correct. This creates an asymmetric system.

The original idea was to create protection against DDoS attacks and spam.
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!