Start collecting your dragon eggs on your iOS or on your Android mobile device. You have full mobile control over your virtual animals on the Bismuth blockchain.
Category: dApp Development
Dragginator enters OpenSea
Launched in 2018, Dragginator is one of the first NFT projects ever created, living on the Bismuth blockchain.Dragginator eggs are virtual animals which can be raised and bred.Each NFT is a generated unique dragon egg, with specific aesthetics and features. You can now send your Dragginator eggs and dragons to ETH, and trade them on Opensea.
Python and State machines
Are you familiar with Finite state machines?They are everywhere, yet, we don’t see them as such 🙂
Bismuth on a Raspberry Pi
In October 2020 Ubuntu released a desktop version (20.10) specifically for the Raspberry Pi 4 arm64-based computer. Since Ubuntu is one of the most popular operating system for Bismuth nodes, and since the Rasberry Pi 4 has a total of 4Gb RAM, it should be possible to run a Bismuth node on it. This article describes the process of how to set up a Bismuth node on a Raspberry Pi 4 running Ubuntu desktop version 20.10.
Beyond DeFi with Bismuth
The main difference between Bismuth and Ethereum up until this point was the level of contract decentralization. In Ethereum, contracts were independent and had their own rules. In Bismuth, contract execution was still in the hands of private key owners, requiring some level of trust between participating parties. While Bismuth drastically improved scaling with its client-oriented approach and selective execution, the reliance on the contract executor was a major drawback.
Introduction to Bismuth Shielded Tokens
New features in cryptocurrency privacy. This article was originally released on September 20, 2019. What are shielded tokens? Shielded tokens are a set of secondary layer operations on the Bismuth blockchain that focus on privacy and are the pilot in the Epitax privacy research program of Bismuth. They are not like any other existing privacy cryptocurrency.
Solution to the codebase consensus conflict in context of the Bismuth Blockchain. This article was originally released on July 19 2018 The Problem In 2017, a new type of a 51% attack became prolific. It was not of technical, but of governance (political) nature. The resilience of cryptocurrencies is supposed to lie within decentralization of the network, but the code repository is a single point of failure which became the target for this new type of attack – forking and network hijacking, a type of consensus rule attack.
Tesla Battery Monitoring on Blockchain
Tesla is a market leader in electric vehicles (EVs). They have currently sold and delivered more than 1 million EVs worldwide while production is ramping up fast with new factories in Europe and China. Although EVs in general require little maintenance, one expensive component in the car needs to be treated with care: the battery. This video explains what can happen if it is not. With Tesla EVs, there is an 8-year warranty on the battery. After this period of time, there is no longer a warranty, but a car is normally expected to last much longer than this. Although …
Android Battery Monitoring
The Android operating system is installed in about 70% of mobile phones worldwide. The majority of these phones are using Lithium-Ion (Li-ion) battery cells. Li-ion batteries are relatively expensive. To make sure that the battery lasts as long as possible, below are some tips to achieve that. Li-ion chemistry prefers partial discharge to deep discharge, so it is best to avoid taking the battery all the way down to zero. Since Li-ion chemistry does not have a memory, the battery pack is not harmed with a partial discharge. If the voltage of a lithium-ion cell drops below a certain level, …
Decentralized Condition Monitoring
Condition monitoring (CM) is the basis for condition based maintenance (CBM). CBM is an alternative to calendar based maintenance, where an asset is serviced in regular time intervals. Calendar based maintenance is easy to plan and schedule but it has some weaknesses: 1) Assets which are in a good condition do not need to be regularly taken out of production for service, and 2) an asset can still fail between regular calendar based maintenance events, causing downtime in production. CM and CBM are therefore used by many industries as an alternative to calendar based maintenance to strike a balance between …