NEAR Protocol vs Blockstream vs Solana Blockchain
What problem does this service solve?
NEAR's goal is to serve as an open source platform that will accelerate the development of decentralized applications | Blockstream is an influential blockchain technology company that is one of the largest contributors to the Bitcoin Core. It offers software and hardware solutions, as well as professional services. | Solana allows developers to create DApps with faster performance by separating the consensus process from the recording of transactions. |
Token Stats
Not Relevant |
Company Description
NEAR Protocol is a decentralized application platform designed to make DApps operable on the web. The NEAR network uses a Proof of Stake consensus mechanism called Nightshade. The NEAR utility token is used for processing transactions and storing data, as well as for facilitating voting for governance issues. | Blockstream is a private, for profit, blockchain technology company, that has played a key role in helping to develop, and fund, many of the key features of the Bitcoin Core platform. Blockstream is focused on developing bitcoin applications and has raised significant funding from several large investment funds. The company also employs several developers that are very influential within the Bitcoin Core development project. This, as well as being of Bitcoin's largest donors, has led to some criticism about conflicts of interest. | The Solana blockchain uses an innovative Proof of History mechanism to confirm transactions that are recorded on the network. Solana is designed to separate the consensus process from the flow of transactions. This is done with a recursive, verifiable delay function that hashes incoming transactions, and recording information as a function of time. Every node on the Solana blockchain is assigned a cryptographic clock that enables the network to determine the time and ordering of transactions, without having to wait for consensus from other nodes. By separating the process of transaction verification from their recording, a higher throughput is achieved without sacrificing network security. |