区块链 三角,币圈三角形
请查看相关英文文档
I Have htc mobile phones been discontinued?
HTC has currently removed all models of mobile phones from its official website in mainland China.
HTC was once the world's largest Windows Mobile smartphone manufacturer, and also the world's largest smartphone OEM and manufacturer. It also launched the world's first Android phone, the HTC G1.
The blockchain smartphone EXODUS displayed on its official website is not sold in mainland China. Clicking the link will jump to the HTC US official website.
In the future, will the Metaverse mobile phone start again?
Currently, the official flagship store of HTC mobile phones on Tmall and the self-operated flagship store of HTC mobile phones on JD.com have been closed.
HTC mobile phones are an important promoter in the field of smartphones and once competed with Apple for hegemony.
However, after domestic mobile phones such as Huawei, Xiaomi, OPPO, and vivo entered the mainstream market, HTC did not have an advantage at all in terms of product strength or cost performance, and its market share continued to shrink.
In the past few years, HTC has basically only released one mobile phone a year in mainland China, and its overall market share has been negligible. This is probably why HTC finally chose to withdraw from the mainland Chinese market.
Starting in 2015, HTC began to adjust its business and no longer focused on the mobile phone market.
Choose to jointly launch the head-mounted VR device Vive with the game company Valve and begin to enter the VR field.
The “VIVE” virtual reality headset, which is still sold on the official website, cannot save HTC.
In July this year, Counterpoint released the global VR equipment manufacturer share rankings for the first quarter of 2021. HTC’s market share was only 2%, followed by Ocolus with a market share of 75%. %.
With the strong rise of domestic mobile phone brands, HTC has gradually lost its global market share, and the era of mobile phones belonging to HTC has ceased to exist.
Finally, Apple loses an old rival.
Ⅱ What is Acute angle
The Chinese translation is acute angle, but I know that there seems to be a mobile phone of this brand recently
Ⅲ What is Acute angle mobile phone? Features
Acute angle is a blockchain phone, also known as a triangle phone. It is an exclusive artifact created for investors in the currency circle.
The Acute angle blockchain mobile phone is also a tool for virtual currency encryption and trading. Here is what you can doIntroducing several major features of the triangle phone:
1. Built-in blockchain application store;
2. Built-in market alarm clock and real-time warning;
3. Multiple accounts and stable clones;
4. Built-in Node Wallet + mobile phone USB shield, hardware encryption and physical isolation;
5. Built-in private system function;
6. Regular updates without losing the signature;
7. Use your mobile phone to get rewards;
8. Lock screen to watch the disk function;
IV Understand the Internet Blockchain in one article
Understand the Internet Blockchain in one article
Understand the Internet Blockchain in one article To understand the blockchain, we have to study the brief history of the technological development of the blockchain starting from the birth of the Internet, discover the motivations for the emergence of the blockchain, and infer the future of the blockchain. Let’s understand the Internet blockchain in one article.
Understand the Internet blockchain in one article 1The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.
As the oldest blockchain project, Mahjong has a group of four miners. The first one to dig out the 13 correct hash values will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!
Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.
Mining pool = commission from the boss of the chess and card room.
It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.
A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.
The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.
Mahjong is actually the earliest blockchain project:
1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.
2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.
3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.
4. Decentralization, everyone can be a banker, it is completely peer-to-peer.
5. UTXO, unspent transaction expenses.
There is another blockchain method of credit, assuming that everyone has no cash
Let’s take a closer look.When a consensus is reached, we cannot see any intermediary or third party coming out to judge whether C has won. The rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralization. Players We (miners) each recorded the results of the first game. C and Dahu touched thirteen, and B hit Jia Dongfeng. After the recording is completed, a complete block is generated, but remember, this is only the first game. , in the entire blockchain, this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger. This is the district Blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.
Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:
Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.
Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's integrity. Next The first time I play mahjong, I won’t take B to play with me.
Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.
Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .
In fact, in 2017 the blogger has developed a set of Mahjong coins
China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers Collision of 14 correct hash values of numbersMiners can get one accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.
Understanding the Internet Blockchain in One Article 21. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain
In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.
1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem
In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.
This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.
In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.
Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.
In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.
2. Cisco router technology born in 1984: an imitation of blockchain technology
In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.
In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves the completed Internet device address.Once the address table changes, it will be synchronized to tens of millions of other routers (in theory), ensuring that each router can calculate the shortest and fastest path.
When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.
3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion
The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.
Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.
4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis
Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.
Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.
In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.
In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. idealists also votedhas put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.
5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)
The hash algorithm converts numbers of any length into fixed-length values using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.
This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.
The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.
Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.
2. The birth and technical core of blockchain
The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because apart from blockchain, So far, there is no major invention in the history of modern science whose inventor cannot be found.
On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.
The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.
In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.
It is indeed difficult to fully and clearly explain blockchain to the public. We use Bitcoin as an object to introduce the technical characteristics of blockchain as simply as possible but in depth.
1. Blockchain is a peer-to-peer network (P2P) software application
As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.
Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.
2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network
Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.
However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.
The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.
3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network
Area The first application of blockchain is the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?
The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Each time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.
From the perspective of software programs, Bitcoin mining is mathematics constructed using the hash SHA256 function.Games. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.
When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.
From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.
4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin
From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .
Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.
Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.
Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".
ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. Such a currency issuance process It’s called ICO. The emergence of ICO has amplified Bitcoin and Ethereum.trading volume. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.
Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.
3. The historical status and future prospects of blockchain technology in the Internet
1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.
We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.
2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.
It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.
In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.
The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.
3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom
The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure. Massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers.Get the latest and historical information.
If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.
Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.
So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman's terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.
This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.
4. Looking at the future prospects of blockchain from the Internet brain model
We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.
Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, With the vigorous development of science and technology such as the Internet of Things, big data, cloud computing, robots, virtual reality, and the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.
Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.
The birth of the blockchain provides another neuron model, which does not uniformly manage neurons in the centralized services of giants, but every terminal, including personal computers and personal mobile phones.Become independent neuron nodes, retain independent data spaces, and synchronize mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.
Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.
4. Judgment on the future status of blockchain in the Internet
1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.
2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network.
3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.
4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.
5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.
6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.
Ⅳ Blockchain Star Product Triangle Host Comparison with Wanke Cloud
[IT168 Review] There have been many events in the technology circle this year, among which the crazy growth of Bitcoin price has been criticized by many people. It is precisely because of this most valuable "investment" that more people are paying attention to emerging technology fields such as blockchain, digital currency, distributed computing, etc. Of course, this has also spawned a number of entrepreneurial companies in the fields of blockchain and digital currency.
In the past, “mining” was regarded by many people as a technical job. You should at least have a certain understanding of computer hardware before you can build a mining machine by yourself. Later, it was due to the demand for computing power. As time goes by, digital currencies become increasingly difficult to obtain. Many users who want to continue to benefit need a large amount of capital investment to assemble a mining machine with powerful computing power. Therefore, whether in the past or now, certain conditions are still required to obtain the benefits brought by digital currency. Generally, It’s hard for people to get through the doorGet involved.
In the face of skyrocketing prices, Bitcoin blockchain products have become a hot topic now
Emerging blockchain-related startups
It is also based on Such reasons give entrepreneurs new opportunities. At present, some new digital currencies have appeared on the market, and the corresponding principles are also different. The most representative of them are the newly launched Triangular Host, Wanke Cloud (LinkToken) and Traffic Ore. Under the current background that blockchain is gradually being valued by everyone, these three different products have launched their own digital currencies, namely Acute Angle Coin (AAC), LinkToken and Flow Ore, which are different from Bitcoin. , of course there are certain differences in value. However, this model is undoubtedly an operating model with a very low threshold for some newcomers who want to try "mining".
The latest blockchain star product Triangular Host released in December
Since it is aimed at newcomers, it is still necessary for us to conduct simple introductory science popularization. First of all, we need to understand what a "mining machine" is and what its function is. Based on blockchain technology, digital assets are obtained through distributed cloud storage and cloud computing sharing idle hard disk space and bandwidth. This is what we call "mining". This type of hardware that can obtain digital assets is called a "mining machine."
Xunlei’s latest Wanke Cloud
In its most basic form, the three products mentioned above actually use the currently idle bandwidth and hard disk space to earn “currency” ". But why is there a big gap in selling prices? What are the differences between the three? Next, I will make an analysis for you, so that entry-level users can better choose a "mining machine" that suits them.
Traffic minerals for shared bandwidth
Triangle host features
Triangle host can be said to be completely different from the popular Xunlei Wanke Cloud. The former is a genuine PC, equipped with Microsoft Windows 10 operating system, equipped with Intel Apollo Lake platform N3450 processor, with 8+64GB (RAM+ROM) running memory and system storage space, and equipped with 128GB solid-state node storage space. , even when used as an ordinary PC, you can get a good experience. As long as the user boots up and enters the system, the act of "mining" is automatically implemented, and the "AAC" digital currency is earned through idle bandwidth and idle hard disk space. It can be said to be a private mining machine that can make money for users.
The biggest difference between the three is the different nature of the blockchain
Comparison of three entry-level blockchain products
Triangle Host, this "mining machine" uses point-to-point hypermedia protocol storage based on IPFS , the Acute Angle Chain public chain manages digital assets and formulates rewards for users through smart contracts.incentive system. This is also the biggest difference between the Triangle host and the other two. One adopts the blockchain nature of a public chain while the other two are in the form of private chains.
Simply speaking, a public blockchain is a blockchain in which everyone can participate and has equal status. In other words, a blockchain that everyone can read, transfer, or mine is a public blockchain. Private blockchains have certain limitations. For example, only "designated miners" can mine. Many people think that a private chain actually only has one network node and does not even have real mining behavior, but it is also considered a blockchain. Due to its many restrictions and the lack of hardware support behind it, it means that the attack is not difficult and it is more likely to lead to reverse transactions or double spending, thus affecting the trust level of the private chain.
There are essential differences between public and private chains
In addition to the difference between public and private chains, Triangle Host is different from the other two in terms of mining methods, incentive methods and cloud service systems. There is also a distinction between them, because it is essentially a computer, so when mining coins, the Triangle host can also use the computing power of the CPU to obtain digital currency, while the other two can only be achieved through shared bandwidth and storage. Another point worth noting is that unlike traditional mining machines, the triangle host consumes very little energy, consuming only 0.03kwh per hour. This is considered green for "mining machine" equipment that needs to be turned on and run for a long time. Environmental friendly.
The significance of the triangle host is that it can bring lower-cost, point-to-point information dissemination to users. In addition, long-lasting storage and strong stability are also the advantages of the triangle host. The waste of storage space is solved through distributed storage technology, data can be automatically redistributed, the utilization of storage space is improved, and all computing devices with the same file system are connected together.
Triangle Host uses the Acute Angle Chain public chain to manage digital assets
Summary
Given the current prices of blockchain products, Wanke Cloud and Traffic Ore can be said to be suitable for entry-level users It is relatively friendly, but the blockchain nature of its private chain makes it difficult for users to understand how real digital currencies are played, and may even mislead entry-level users about blockchain. If you just want to earn some digital currency for fun, these two products can be said to be completely sufficient. However, for those who want to learn more about the popular blockchain industry, it is recommended that you use the Triangle Host.
VI What is the difference between blockchain mobile phones and ordinary mobile phones
Blockchain mobile phones have all the functions of ordinary mobile phones, but blockchain mobile phones also have many blockchain-related functions. , such as security encryption, market monitoring and other functions. If you want to buy a blockchain mobile phone, you can pay attention to the recent triangular mobile phone which is quite good
VII What is the future of blockchain mobile phones
< p>The explosive growth of blockchain technology indicates that the innovation capability of the industry is rising. With the popularity of blockchain, blockchain mobile phones will inevitably become an important part of the development of the industry.trend.Recently, a must-have artifact created for blockchain users - [Triangular Mobile Phone] was officially unveiled on its official website. This mobile phone puts forward the innovative concept of making mobile phones with blockchain thinking: every mobile phone is a Nodes, each node will own more than 51% of the rights and interests generated by the behavioral data contributed in the network, which means that every user becomes the creator and sharer of the brand.
ⅧWhat is the HTC blockchain phone used for?
Hello, the htc blockchain phone is for the encryption and trading of virtual currencies (Bitcoin, etc.) in the blockchain. Tools, here are eight features of blockchain mobile phones:
1. Trusted hardware;
2. Use multiple protocols to achieve interoperability between different blockchains; < br />3. Provide a simplified mobile user experience for the DApp community;
4. HTC will use each Exos as a node "to create a scale that is double or even triple the number of nodes of Ethereum and Bitcoin." ;
5. Provide trusted hardware, which includes APIs connected to wallets;
6. Trusted user-friendly Dapps;
7. Users can upload personal data and information to the block On-chain mobile phones instead of centralized cloud;
8. Create a community that is open to collective wisdom.
Ⅸ What brand of mobile phone is there a triangle icon on the back?
Two triangles put together, right? Not surprisingly, it’s the blockchain phone
X I heard there is a candy blockchain phone, what is the official website of the candy blockchain phone?
Yes, candy blockchain The phone has been released. Candy and Ether Mist collaborate in a major collaboration! The world's first blockchain mobile phone is born
The official website address of the Candy Blockchain mobile phone is: Candy Blockchain Genesis Edition mobile phone 4G+128G, which can be purchased by appointment
- 上一篇: 出售区块链技术的公司,出售区块链技术有哪些
- 下一篇: 杭州区块链法院,杭州互联网法院司法区块链平台