VITE

by VITE Labs

(0)
View Profile

Fantom

by Fantom

(0)
View Profile

Solana Blockchain

by Solana Labs

(0)
View Profile

VITE

by VITE Labs

(0)
View Profile

Fantom

by Fantom

(0)
View Profile

Solana Blockchain

by Solana Labs

(0)
View Profile

What problem does this service solve?

VITE's goal is to make it easier for developers to issue tokens and create DApps.Fantom wants to create a better performing smart contract platform that will based on a directed acyclic graph.Solana allows developers to create DApps with faster performance by separating the consensus process from the recording of transactions.

Token Stats

Company Description

VITE is building a DApp development platform that will allow developers to issue their own tokens that can then be traded on their built-in decentralized exchange. The VITE network is currently powered by the Ethereum-based VITE token.

Fantom is developing a smart contract platform based on a directed acyclic graph (DAG). They hope to address the scalability issues of current decentralized platforms. Instead of a blockchain, Fantom's Lachesis Protocol uses a directed acyclic graph to confirm transactions asynchronously. This transaction history is immutable and cannot be modified. The platform's Opera Chain will consist of three layers: an application Layer, Opera Ware Layer, and Opera Core Layer. Fanotm issued an Ethereum-based token in 2018.

The Solana blockchain uses an innovative Proof of History mechanism to confirm transactions that are recorded on the network. Solana is designed to separate the consensus process from the flow of transactions. This is done with a recursive, verifiable delay function that hashes incoming transactions, and recording information as a function of time. Every node on the Solana blockchain is assigned a cryptographic clock that enables the network to determine the time and ordering of transactions, without having to wait for consensus from other nodes. By separating the process of transaction verification from their recording, a higher throughput is achieved without sacrificing network security.

Ratings

(0)

(0)

(0)