If you’re a microservices developer considering communication protocols, choosing an event-driven architecture might just help you rest a little easier at night. With the right design, event-driven architecture can…

If you’re a microservices developer considering communication protocols, choosing an event-driven architecture might just help you rest a little easier at night. With the right design, event-driven architecture can…
A look at Layer 2 Protocols, Ethereum’s scalability issues, and the future of decentralized applications Much like smartphone applications have shown us the true capabilities of today’s mainstream technologies,…
Have you heard about DAG protocols? Some say that they are the next level for blockchain. They’ll solve all of blockchain’s shortcomings and allow for mass adoption. But what…
Today’s internet operates on underlying protocols and services invented in the 1960s during the first stage of the public internet. Based on a standard model for networking that serves…
Protocols are not handed down from on high. On the contrary, they start as a seed, which grows into a massive tree (if it’s worthy, and more importantly, if…
Photo by Niklas Hamann on Unsplash Sigma protocols are 3 phase protocols for proving knowledge of values in some relation without disclosing the values themselves. eg. knowledge of discrete log,…
Proof of Stake (PoS) and Proof of Work (PoW) are the two most popular protocols for reaching consensus in blockchain networks. The fundamental difference between PoW and PoS is…
The Avalanche Family Slush, Snowflake and Snowball are the first protocols described in this paper. They are solely used for the sake of understanding the final member: Avalanche. They…
You might be familiar with non-BFT consensus protocols like Paxos and Raft. These protocols can tolerate crash failures in up to 1/2 of the nodes, but these failures do…
Identity is the key element that differentiate security tokens from other blockchain protocols. In the current generation of security token platforms, identity is constrained to the use of “white…