
What Is Hedera Hashgraph (HBAR)?
Hedera Hashgraph is claimed to go beyond the majority of traditional blockchains. If you want to learn what Hedera Hashgraph can offer you, this guide is for you.
Hedera Hashgraph is claimed to go beyond the majority of traditional blockchains. If you want to learn what Hedera Hashgraph can offer you, this guide is for you.
Though the Lightning network is still under development it is already expected to bring great changes. The guide will tell you what the network represents itself and what this tech can offer to the crypto world.
Telegram Open Network is expected to become a major game-changer for social messaging. But what do we know about it right now? This guide is for those who want to find it out.
There are a lot of talks that today the traditional centralized finance system can’t satisfy all the currently existing demands. But are there any other options? In this guide, we will tell you about DeFi, its decentralized counterpart.
Using the example of tokens, coins and shares, with this piece, we’ll show you how the concept of crypto blurs the borders between different types of assets.
As you can hear about smart contracts practically everywhere today, this guide will help you to better understand their nature and their role in transforming many processes.
In this complete guide, Vladimir Malakchi, CMO of 482.solutions, figures out which consensus algorithms are presented in the industry, considers their features, and also touches on their shortcomings dispelling several myths.
The blockchain technology can simply be explained as a decentralized open ledger system of adding, verifying and then recording transactions between peers in a transparent, efficient and irreversible manner.
The Interledger protocol (ITL) is a protocol for payments across payment systems. The protocol was introduced by Ripple in October 2015.
A group of the major fintech industry players are working on a new version of the blockchain technology as part of the Open Ledger Project.
SHA-2 (Secure Hash Algorithm) – is a set of cryptographic algorithms – single-aimed hash functions including SHA-224, SHA-256, SHA-384 and SHA-512.
Scrypt is an adaptive cryptographic function of key generation based on the password. It was invented by Colin Percival for the online service for protected storage of back up copies of Unix like operating systems in 2008.