What is Sharding? | The Radix Blog | Radix DLT
This article explores what is sharding and why it is hard to shard a distributed ledger.
View ArticleWhat are network splits? | The Radix Blog | Radix DLT
This article explores how permission-less networks can be attacked by way of splitting them in order to double spend.
View ArticleIntroduction to Non Fungible Tokens (NFTs) | The Radix Blog | Radix DLT
A quick summary of the first Radix hackathon that happened at Pillar's Unconference in Lithuania.
View ArticleIntroducing the Radix Command Line Interface (CLI) - Internal Hackathon...
We built a powerful Radix CLI to interact with our internal betanet based on the Unix Tools Philosophy.
View ArticleIntroduction to Sharding in Radix | The Radix Blog | Radix DLT
In this article, we expand on the concept of sharding distributed ledgers and on why and how Radix shards.
View ArticleTimestamping on Radix - The DecentraSign Experiment | The Radix Blog | Radix DLT
DecentraSign is a document signing and verification application built using the power of the Radix ledger and its easy to use developer tools.
View ArticleThe First Radix Team Hackathon! | The Radix Blog | Radix DLT
The Radix Team assembled from across the globe for our quarterly Team Planning Week at the beginning of this month. Find out who won and more.
View ArticleFirst Radix Hackathon Highlights From Lithuania | The Radix Blog | Radix DLT
A quick summary of the first Radix hackathon that happened at Pillar's Unconference in Lithuania.
View Article2018: The Year That Shook Crypto | The Radix Blog | Radix DLT
2018 was the year that crypto fell to earth, with louder critics than ever and the price of Bitcoin free falling, the industry has had been stung with what many would say was a necessary reality check.
View ArticleThe Radix Vision | The Radix Blog | Radix DLT
At our recent team planning week, we spent some time discussing why we are building Radix, what we stand for as a company and our vision for the future.
View ArticleImplementing an alias system in Radix | The Radix Blog | Radix DLT
In this first article of the series, we explain a simple “Alias system” use case and how you can use the Radix platform to store information as if it was a regular database.
View ArticleRadix Website Updated | The Radix Blog | Radix DLT
It’s been hinted a few times in the recent Radix Reports, and if you’re reading this blog you may notice that radixdlt.com has undergone a refresh! There is less blue, refined messaging, and some new...
View ArticlePrimer on Merkle Trees | The Radix Blog | Radix DLT
In the next article in our Primer series we turn our attention to Merkle Trees, another fundamental component of many protocols and which are built on the use of hash functions.
View ArticlePrimer on Symmetric Keys/Session Keys | The Radix Blog | Radix DLT
In the next article in our primer series we discuss symmetric key algorithms, why are they useful and how are they used in Radix.
View ArticlePrimer On Signatures | The Radix Blog | Radix DLT
In this article we discuss how hashing functions and public key cryptography can be combined to allow us to use digital signatures, which help in making and receiving decentralized transactions.
View ArticlePrimer on Public Key Cryptography | The Radix Blog | Radix DLT
In the next article in our primer series we discuss symmetric key algorithms, why are they useful and how are they used in Radix.
View ArticleProtocol Level Decentralized Applications | The Radix Blog | Radix DLT
In this post we summarize a new way of developing decentralized applications without smart-contracts using protocol level constraints.
View ArticleUnderstanding Centralized Systems | The Radix Blog | Radix DLT
This article discusses how applications have traditionally been built and the common application design pattern used in current centralized systems.
View ArticlePrimer on Hashes and Hash Functions | The Radix Blog | Radix DLT
This post is designed to act as an overview to hashes and hash functions, as well as briefly explore how Radix utilizes them.
View Article