Is Wright coin a public chain
In the past, when it comes to blockchain, we always think of foreign procts, such as Ethereum. But when I talk about this topic today, I think more about China's own blockchain technology
at present, the mature application of blockchain technology is more concentrated in some public chain projects, because many application projects need to be developed based on this, so I think the current global landing direction is public chain projects, and it is still too early to talk about maturity. After all, bitcoin and Ethereum are still blocked, and many old problems have not been solved, There will be many new problems. The well-known ones are Biyuan chain, ulord (the project is abroad, but the technical party provides it in the domestic company, Hunan Tianhe Guoyun Co., Ltd.), quantum chain, Xiaoyi Neo, gongxinbao, etc
ulord is a point-to-point value delivery public chain. By building the underlying architecture of blockchain and digital resource distribution protocol, it supports third-party developers to build their own applications on top of their open source protocol, and works with many instry partners to build a complete ecosystem of blockchain technology and applications
based on various rules and protocols created by ulord, it is convenient to graft various digital resource application scenarios including text, pictures, music, video, software, etc., providing a direct docking platform for information creators and consumers. Third party developers can build their own economic system in ulord, or focus on building all kinds of applications around ulord, and use the ulordtoken in ulord as the voucher in the system
for example, an experience sharing platform can be built on ulord, where the experience sharers price the published experience, and the people who obtain the experience information trade on the platform, and each fee paid to the experience sharers will arrive at the account immediately; Proct promoters can publish ads on ulord, price ads, and people who are interested in ads can get certain profits by clicking on ads. The first mock exam is to separate information from the past, and to use platform or other centralized organizations to spread profit. This mode eliminates intermediate links, and information providers and consumers directly connect with Ulord, which ensures the maximization of the interests of the originator. p>
Litecoin (LTC, currency symbol: 321;) It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world< better use of digital currency trading platform coin exchange
data expansion:
lightcoin is inspired by bitcoin (BTC), and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol, and is not managed by any central organization. Lightcoin aims to improve bitcoin. Compared with bitcoin, lightcoin has three significant differences. First, the lightcoin network can process a block every 2.5 minutes (instead of 10 minutes), so it can provide faster transaction confirmation. Second, the lightcoin network is expected to proce 84 million lightcoins, four times the amount of money issued by bitcoin network. Thirdly, the scrypt encryption algorithm first proposed by Colin Percival is used in lightcoin's workload proof algorithm, which makes it easier to mine lightcoin on ordinary computer than bitcoin. Each Leyte is divided into 100000000 smaller units, defined by eight decimal places
Blockchain includes public blockchain, joint (instry) blockchain and private blockchain. Public chain point-to-point e-cash system: bitcoin, smart contract and decentralized application platform: Ethereum
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies
blockchain is an important concept of bitcoin. In essence, it is a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of bitcoin network transaction information, Used to verify the validity of its information (anti-counterfeiting) and generate the next block
extended data
according to the different degree of blockchain network centralization, three kinds of blockchains under different application scenarios are differentiated:
1. The blockchain with the whole network open and without user authorization mechanism is called public chain
2. The authorized nodes are allowed to join the network, and the information can be viewed according to the authority. It is often used in the inter agency blockchain, which is called alliance chain or instry chain
3. All the nodes in the network are in the hands of one organization, which is called private chain
alliance chain and private chain are also called licensing chain, and public chain is called non licensing chain
blockchain features
1, decentralization. Blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain
2. Openness. Blockchain technology is based on open source. In addition to the private information of all parties involved in the transaction is encrypted, the data of blockchain is open to everyone. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
3. Independence. Based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention
4. Safety. As long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily manipulated and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymity. Unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and the information can be transferred anonymously
Public chain, also known as "public chain", refers to the blockchain that anyone in the world can enter the system at any time to read data, send confirmatory transactions and compete for bookkeeping. The public chain is generally considered to be "completely decentralized", because no indivial or institution can control or tamper with the reading and writing of data in it. In terms of application, blockchain public chain mainly includes bitcoin, Ethereum, super ledger, most counterfeit currencies and smart contracts. The ancestor of blockchain public chain is bitcoin blockchain, which has the following characteristics:
1, open source code
upload the code to GitHub, and everyone can get complete blockchain data by downloading, Accept the test of the public
2, complete decentralization
anyone can become a node, each node is open, everyone can participate in the calculation of the blockchain, any node is not permanent, but phased, and any center is not mandatory for nodes. Anyone can read and send transactions, and transactions can be effectively confirmed on the blockchain. Anyone can participate in the consensus process. The consensus process determines whether a block can be added to the blockchain and the exact current state. Everyone can get financial reward from it, which is proportional to their contribution to the consensus process. These public chains are generally considered to be "completely decentralized"
3. Developing decentralized applications
through this public chain, developers can easily develop centralized applications. Public chain can protect the rights and interests of users from the influence of program developers
This is two different concepts. According to different standards, blockchain can be classified into three categories:
& # 8195 8195; 1) According to the network scope of blockchain, it can be divided into public chain, private chain and alliance chain
8195; 2) According to the docking type of blockchain, it is divided into single chain, side chain and interconnection chain
8195; 3) According to the display environment of blockchain deployment, it can be divided into main chain and test chain
the main chain can be understood as a formal online and independent blockchain network, while the public chain refers to a blockchain that can be read by anyone, can send transactions and can be effectively confirmed by anyone, and can participate in its consensus process
Blockchain is now available in China. You can click the link to view it. Currently, there are digital currencies for payment methods, voting, military, financial and other fields. Perhaps what you are most familiar with is digital currency. Now there are many companies related to this kind in China, such as Juli technology, bitcoin, lightcoin, Ethereum, etc., all of which are procts in the field of blockchain
Public chain is also known as "public chain", and public chain refers to the blockchain that anyone in the world can read and send transactions, and transactions can be effectively confirmed, and can also participate in the consensus process. According to the different degree of blockchain network centralization, three kinds of blockchain under different application scenarios are differentiated:
1. The blockchain with open whole network and no user authorization mechanism is called public chain
2. The authorized nodes are allowed to join the network, and the information can be viewed according to the authority. It is often used in the inter agency blockchain, which is called alliance chain or instry chain
3. All the nodes in the network are in the hands of one organization, which is called private chain
extended data:
function of public chain:
1. Public chain can protect users' rights and interests from the influence of program developers:
in public chain, program developers have no right to interfere with users, so public chain can protect users' rights and interests using the program. In addition, the highly decentralized distributed data storage is also one of the biggest characteristics of the public chain, which has the advantages of openness and transparency of transaction data, and data can not be tampered with, so that the public chain can effectively protect the data security of users
2. Public chain can proce network effect:
an information proct has the inherent need of interconnection, because the purpose of people procing and using them is to better collect and exchange information. With the expansion of the network scale, users can get more value from it and their needs can be met. The common chain is open, so it has the opportunity to be applied by many external users and proce a certain degree of network effect
3. Public chain can be applied to actual business scenarios:
except for financial applications, any application scenario with high requirements for trust, security and persistence, such as asset registration, voting, management and Internet of things, will be affected by public chain on a large scale
source: network public chain
Public chain is also known as "public chain", and public chain refers to the blockchain that anyone in the world can read and send transactions, and transactions can be effectively confirmed, and can also participate in the consensus process. According to the different degree of blockchain network centralization, three kinds of blockchain under different application scenarios are differentiated:
1. The blockchain with open whole network and no user authorization mechanism is called public chain
2. The authorized nodes are allowed to join the network, and the information can be viewed according to the authority. It is often used in the inter agency blockchain, which is called alliance chain or instry chain
3. All the nodes in the network are in the hands of one organization, which is called private chain
extended data:
according to the different degree of blockchain network centralization, three different application scenarios of blockchain are differentiated:
(1) the blockchain which is open in the whole network and without user authorization mechanism is called public chain
(2) authorized nodes are allowed to join the network, and information can be viewed according to their permissions. It is often used in inter agency blockchain, which is called alliance chain or instry chain
(3) all nodes in the network are in the hands of one organization, which is called private chain
alliance chain and private chain are also called licensing chain, and public chain is called non licensing chain
as of today (October 19, 2018), AE token exists on Ethereum blockchain. In order to migrate them to the aeternity blockchain in a secure and verifiable way, the AE team designed a process in which the migration is divided into four stages. The final phase will end on September 2, 2019
after each stage, there will be a scheled hard fork of the aeternity blockchain, which will migrate tokens and introce improvements and new features
to ensure the transparency and verifiability of this migration process, users will be able to migrate using dedicated smart contract settings. There will be a tool that anyone can use to verify:
1. Generation of accounts contained in the origin block of aeternity blockchain and corresponding accounts of Ethereum
2. Scheled migration balance
Genesis block and scheled hard fork
phase 0 is the migration phase before mainnet starts. Its start date will be announced separately. Genesis block is the first block in the aeternity blockchain, which will include all tokens migrated by users in phase 0. Each of the following three phases, lasting about three months, will end with a scheled hard fork of the day and night blockchain. This means that after mainnet starts, there will be three scheled hard bifurcations. Each hard fork migrates tokens and adds or extends the functions of the aeternity blockchain, which can only be realized through hard fork. This also means that users can only receive their tokens on aeternitymainnet, one of which ends and the fork is complete. All scheled hard forks will include new features and improvements to the aeternity protocol such as governance systems or new virtual machines. A detailed timetable for the future will be announced in a separate announcement.
The first is to increase the time limit. For example, as I said just now, our time limit is very short, just three days, and it's useless when it's expired
another way is to raise the threshold of things exchange, but this will make points a little weak
the second way is to increase the number of lucky draw and points to win treasure, and collect the scattered points by some means to benefit a small number of users. In fact, this is also a helpless move. Of course, if the design is good, it is also very interesting. Jingdou uses this method
the third way is to let points become the threshold, such as how many points + how much money you need to buy something, or what level of points you can buy. This is actually very good. It's quite clever to get goods through low price channels, sell procts at a price slightly lower than the market price but slightly higher than the cost price, and consume points at the same time. The premise is to have good goods and good channels
the fourth way is to exchange points for rights, such as membership privileges, lottery times, game times and so on. This practice is also OK. For example, if you exchange for a thunderbolt member, you can consume points and stick to users. The key is that these authorities can attract people or negotiate cooperation with these channels
how to establish a perfect integral system can be used for reference by the major e-commerce examples, which will not be discussed in detail here. With the system, the key is how to operate an e-commerce points system. E-commerce points are real money. If you want to operate money, you need to consider three dimensions
1, anti cheating
now there are two major trends in operating points - it's very difficult to earn and I don't want to play. Especially easy to earn, I don't want to play
especially easy to earn - there are loopholes in points that are easy to earn, negligence in human design, or insufficient anti cheating function
obtaining points by cheating will destroy the incentive system for users
2, reservoir
integral is a reservoir, through long-term accumulation, release at a certain time point, you can get the pleasure of release, and feel that the savings are useful
how to make good use of the reservoir, we need to set a warning line - more than how many points, we need to encourage users to exchange
how to make good use of the function of the reservoir, timely remind, timely consumption, timely exchange, more savings, more profits
how to make users fall in love with point incentive? Saving points is either to exchange valuable items, or to make users feel cheap at any time
How to rece the cost of incentive is the corefor example, to motivate a user to use 100 yuan (within the life cycle) to extend the user's life cycle and rece the incentive cost (to 50 yuan)
how to establish a powerful integral system is a science, not only a simple proct function, but also a simple operation means, It needs a lot of knowledge whether to play with points or not. In my opinion, this is a deep test of operation