The Business & Technology Network
Helping Business Interpret and Use Technology
«  
  »
S M T W T F S
 
 
 
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
10
 
11
 
12
 
13
 
14
 
15
 
16
 
17
 
18
 
19
 
20
 
21
 
22
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
31
 
 
 
 
 
 
 

Feed Items

When it comes to React development, design patterns are the underappreciated elements that encapsulate the foundations of a scalable…Continue reading on Coinmonks »
Broadcasting live from Snap HQ, where excitement is building as the Cookie team adds Vooi as the fifth official live era. Cookie is that…Continue reading on Coinmonks »
There’s a moment every Web3 user dreads.You sign a transaction, it’s confirmed, and then — You realize you sent it to the wrong address. Or picked the wrong chain. Or used way too much gas. Or voted the wrong way in a proposal.It hits instantly. The stomach drop. The browser refresh. The helplessness. Because there’s no going back. Not in this world. Not in Web3.Blockchain Has No BackspaceThe...
What is Proof of History (PoH)?In one line , PoH is Solana’s “secret sauce.”Its Function: The simplest way to think of PoH is as a special, high-speed, cryptographic clock. Its primary job is to create a verifiable, trustworthy record of the passage of time and the order of events.The Diagram: The visual at the top shows this perfectly. It’s a continuous chain of hashes, where each new “tick” of...
Solana’s 3rd Layer Explained : Block BuildingWe now officially begin Stage 3: Block Building.The transaction has successfully navigated the priority lanes of Gulf Stream and has been delivered to the correct Leader via the QUIC protocol. This stage is all about what that Leader does next.Firstly I will introduce Solana’s unique philosophy of block building and the specialized “engine room” that...
Solana’s Second Layer Explained : Gulf StreamBefore getting into this blog make sure to read my previous blog for better understanding , This is the Part III .We have just completed an incredibly thorough examination of Stage 1: Users, covering everything from their cryptographic identity and keys to the detailed anatomy, rules, and costs of the transactions they create.Following the six-stage...
Solana’s Second Layer Explained : Gulf StreamBefore getting into this blog make sure to read my previous blog for better understanding , This is the Part III .We have just completed an incredibly thorough examination of Stage 1: Users, covering everything from their cryptographic identity and keys to the detailed anatomy, rules, and costs of the transactions they create.Following the six-stage...
Solana’s Second Layer Explained : Gulf StreamBefore getting into this blog make sure to read my previous blog for better understanding , This is the Part III .We have just completed an incredibly thorough examination of Stage 1: Users, covering everything from their cryptographic identity and keys to the detailed anatomy, rules, and costs of the transactions they create.Following the six-stage...
Solana’s Second Layer Explained : Gulf StreamBefore getting into this blog make sure to read my previous blog for better understanding , This is the Part III .We have just completed an incredibly thorough examination of Stage 1: Users, covering everything from their cryptographic identity and keys to the detailed anatomy, rules, and costs of the transactions they create.Following the six-stage...
Solana’s Second Layer Explained : Gulf StreamBefore getting into this blog make sure to read my previous blog for better understanding , This is the Part III .We have just completed an incredibly thorough examination of Stage 1: Users, covering everything from their cryptographic identity and keys to the detailed anatomy, rules, and costs of the transactions they create.Following the six-stage...