It represents cryptocurrency traders or investors who keep holding onto their respective cryptocurrencies even when their price or value drops. They believe that such price drop is only...
DevOps, a term coined in 2009 by Patrick Debois, is a complementary set of practices to Agile software development where development and operations teams remained separated and siloed...
A fork in a blockchain network happens when any changes to the underlying protocol take place or fundamental aspects pertaining to cryptocurrency need to change. There are two kinds of forks...
Geth (Go Ethereum) is a command line interface for running Ethereum nodes implemented in Go Language. Using Geth, one can join Ethereum network, transfer ether between accounts, mine...
NVT stands for Network Value-to-Transactions and is calculated by dividing Network value with Daily transaction volumes. It was introduced by Willy Woo in 2017...
A bear trap starts with a group of traders selling a large number of cryptos. This makes other traders sell since they suspect a price correction. This causes the price to fall further...
BAAS (Blockchain As A Service) is the third-party creation and management of cloud based networks for companies in the business of building blockchain applications. These third-party services...
B-money was one of the earliest cryptocurrencies, which was never launched officially. B-money endeavored to provide many of the same services and features...
The purpose of ABCI (Application Blockchain Interface) is to provide a clean interface between any finite, deterministic state transition machine on one computer and the mechanics of..
An atomic swap is when two cryptocurrencies can be traded amongst each other i.e. converted from one into another without the intervention of a third-party platform or exchange. They are made...
All Time Low is the lowest price of a cryptocurrency or any stock till date. This is used as a measure to understand the performance of an asset and the relative changes in the price...
All Time High for a cryptocurrency or any stock price is the maximum price that the asset has reached as on current date...
Asymmetric keys is the use of two distinct or separate public and private keys (keys are different and not same as is the case with Symmetric keys). Public key is used for encryption and this can...
An Application Specific Integrated Circuit is particularly built for a specific computational use rather than being general-purpose. These have become very popular and are used in mining...
Ashdraking is a complete loss of a crypto investor’s capital as a result of shorting Bitcoin where the aim is to sell Bitcoin at a higher price and buy it back at lower price. The term is named...
An anti-fragile asset performs better when there is risk and uncertainty, and gains strength from adverse events. This concept was created by the famous author Nasim Nicholas Taleb...
When an individual or an entity is highly concerned about the security of any sensitive data or valuable asset held digitally like tokens and cryptocurrencies, they typically ensure physical...
Also known by its original name R?ndael, Advanced Encryption Standard was developed by two Belgian cryptographers Vincent R?men and Joan Daemen. It is based on a design principle known as...
In Blockchain world, an address would typically be a hashed version of the "public key", which will be referred to by an individual or a platform, in order to transfer any cryptocurrency to a...
He is a well known Cypherpunk, Cryptographer and widely recognized for his invention Hashcash a protocol that is used to identify email spam and control it. He proposed Hashcash in 1997 which...