Recent Posts

Detract yet delight written farther his general. If in so bred at dare rose lose good. Feel and make two real miss use easy.
July 17, 2020
AtomicDEX Development Update, January-June 2020

Achievements include a complete reworking of the P2P backend, the first iteration of a reimagined graphical-user interface (GUI), and a friendlier UX.

Read More
May 22, 2020
Komodo v0.6.0 Upgrade Is Coming On June 14 To Welcome New Notary Node Operators

Komodo’s fourth annual Notary Node Election came to an end on May 4, 2020, and the Komodo team would like to congratulate and welcome all of the operators who won a seat in the Notary Node network.  To officially bring these new Notary Node operators into the network, an upgrade to the Komodo daemon to […]

Read More
February 11, 2020
Komodo’s Antara Framework Will Soon Offer A Decentralized Stablecoin Solution

In the blockchain industry, the term "stablecoin" refers to a cryptocurrency with a financial value that is "pegged" to another currency, such as the US Dollar. Stablecoins allow users to buy, sell, and trade blockchain assets that mimic the prices of government-issued currencies. Komodo is pleased to announce that the Antara Framework will soon offer […]

Read More
February 4, 2020
Komodo Releases 2019 Annual Report & 2020 Technical Roadmap

The Komodo Team is pleased to release the 2019 Annual Report and the 2020 Technical Roadmap. With the new roadmap and development priorities in place, Komodo is excited for another year of progress and growth in 2020. In addition to the annual report and roadmap, Komodo is also announcing the launch of a new community […]

Read More
May 22, 2020
AtomicDEX's Bitcoin Pizza Day Giveaway: Post Pizza Pics To Earn KMD!

Today is the ten-year anniversary of Bitcoin Pizza Day. Back on May 22, 2010, Laszlo Hanyecz agreed to pay a whopping 10,000 BTC for two delivered Papa John's pizzas. At the time, the value of this transaction was worth only about $30, as BTC was worth just a fraction of a penny— $0.0031 per BTC, […]

Read More
April 27, 2020
SHA-256: An Overview & Guide of the SHA-256 Algorithm

SHA-256, or Secure Hash Algorithm 256, is a hashing algorithm used to convert text of any length into a fixed-size string of 256 bits (32 bytes). Originally published in 2001, SHA-256 was developed by the US Government’s National Security Agency (NSA). This algorithm is commonly used in SSL certificates for websites and in the DKIM […]

Read More
April 27, 2020
What’s A Hashing Algorithm? An Introduction

A hashing algorithm is a function that converts any input data into a fixed-length output known as a hash. It doesn’t matter whether the input is a single letter, a page from a novel, or an entire set of encyclopedias. Each input will produce a unique output expressed as an alphanumeric string of uniform length. […]

Read More
April 22, 2020
Blockchain Programming Languages: An Introductory Guide

With blockchain technology taking off around the world, blockchain programming languages are becoming a topic of major interest. According to one estimation, there were around 105,000 blockchain developers in the world in 2018. Of course, this is only a tiny fraction of the global total of 18 million developers. That's why a 2020 LinkedIn report […]

Read More
April 20, 2020
Scrypt: An Overview of the Scrypt Mining Algorithm

Scrypt is a hashing algorithm used on certain Proof of Work blockchains. It was first introduced with the launch of Tenebrix (TBX) in 2011. Since then, Scrypt has been adopted by a number of different blockchain projects. Among the top three Scrypt-blockchains by market capitalization, the Scrypt mining algorithm secures over $3 billion in digital […]

Read More
April 15, 2020
What's A Digital Signature? A Guide To How Digital Signatures Work

A digital signature is a mathematical procedure that allows recipients to verify the authenticity of digital messages, documents, or transactions with almost total certainty. A new digital signature is created for each new document, email, or message being signed, so each signature is unique, resistant to tampering, and virtually impossible to counterfeit. When properly implemented, […]

Read More
April 13, 2020
Asymmetric Encryption: An Introduction To Asymmetric Cryptography

Asymmetric encryption is an advanced form of cryptography where the key used to encrypt data is distinct from the key used to decrypt it on the receiving end of the interaction. With asymmetric encryption, anyone can use a recipient’s public key to encrypt a message. However, once encrypted, only the holder of the intended recipient’s […]

Read More
March 15, 2020
Distributed Ledger Technology: An Overview of DLT Systems

Distributed ledger technology (DLT) is a popular method for securely replicating, sharing, and synchronizing data across a distributed computer network. It offers an alternative to centralized databases, which rely on a single server or small network to function. This creates a single point of failure, making centralized systems vulnerable to attack. Blockchain is by far […]

Read More
1 2 3 18