Verifiable timestamps and ordering of events.
Dallas, TX — June 11, 2020 — Hedera Hashgraph, an enterprise-grade public distributed ledger platform, has been recognized as a Cool Vendor in Gartner’s recent report, Cool Vendors in Blockchain Technology.
Swansea, UK — 8 June 2020 — AdsDax, a decentralized advertising platform and marketplace to create, buy, verify, and sell advertising, has achieved over 1300 cryptocurrency transactions per second on Hedera Hashgraph’s enterprise grade distributed ledger.
Hedera mirror nodes store transactions that have occurred on the Hedera network, exposing them to consumers and developers alike through user interfaces (explorers) and APIs. We’re excited to see that the Hedera ecosystem is constantly growing, with each new service providing unique offerings.
Hedera has released the latest version (v3) of its Hbar Economics Whitepaper. The purpose of this paper is to provide the Hedera community with transparency and insight into the distribution, allocation, and ecosystem of hbar.
Nodes in a hashgraph network apply a 2/3 threshold in the virtual voting procedure – as soon as more than this fraction of consistent votes (or vote stake) are counted on the fame of a particular witness, then that election is complete. So why 2/3 and not some other fraction? It turns out that requiring nodes count just over 2/3 votes is the best compromise between defending against two different types of attacks.
Attica is a Colorado State University project that aims to improve the security and transparency of elections. They use Hedera Consensus Service to log votes that are verifiable by everyone.
SEOUL and DALLAS, May 27, 2020 — LG Electronics Inc. (LG) and Hedera Hashgraph, an enterprise-grade distributed ledger platform, today announced that LG has joined the Hedera Governing Council. The Council, designed to enable the most decentralized governance model for a public ledger, will comprise up to 39 global organizations from a diverse array of industries and geographies.
At Hedera, we take care to ensure our cryptography complies with standards wherever possible. To that end, all cryptography we use complies with NIST standards; see the table within for a summary.
The final part of the series, part 4 goes further into the application network beginning with mirror nodes. We'll finish the core concepts required for the Java tokenized asset on HCS demo application.