- B -
By-laws
By-laws are a set of rules that are created by corporations or the public to keep in check of their members .By-laws can vary, and it is important to ensure your by-laws are appropriate for specific circumstances. The procedures for directors ...
Bank of Canada Act
The federal Bank of Canada Act created the Bank of Canada (BOC) and defines its powers. See Bank of Canada Act, R.S.C. 1985, c. B-2.
Bank of Canada (BOC)
Canada's National Bank is located in Ottawa, Ontario, it's The Bank of Canada. The Bank of Canada is not a bank that is open to the public. Their main responsibility is the promotion of the Nation’s economic and welfare. They're also responsible for ...
Burn/Burned
When a cryptocurrency token has been purposely removed from the circulating supply then they are considered Burned. Compared to when the assets are accidentally lost, for example if it was sent to the wrong address with no owner or if the owner has ...
Bull Trap
Bull traps are low-risk, short-term trading opportunities that tempt investors to overleverage their holdings. Unlike a crash, these trades frequently result in financial loss. Bull traps frequently fool traders into thinking the stock is becoming ...
Bull Run
In a clear bull market, there is more interest in crypto assets and the values of them are constantly rising. This attitude is where investment opportunities take shape & causes an increase in demand for these assets. As the price increases, it ...
Bull Market
When shares of assets such as crypto, stocks, commodities and bonds start to increase in value then the phrase “Bull Market“ starts to take place in conversation. It may also apply for other types of investments like real estate. In a bull market ...
Bull
Bull, or “bullish,” can refer to: People who plan on investing or trading based on the anticipation of an asset (stock, bond, cryptocurrency) increasing in value Traders who use the strategy of buying an asset low and selling it high, based on the ...
Bug Exploit
Bug exploits are used to attack in the form of a program, they are used to take advantage of any system’s vulnerabilities in order to expose a particular system. Typically Bug Exploits are run by bitter people with intention, if enabling them it’ll ...
Bug Bounty
Bug bounties are offered in the hope that good security news will get out to the owner of software before they can be exploited by a nefarious actor. Bug bounties are also commonly offered by cryptocurrency businesses in order to win customer and ...
Bubble
Throughout the years crypto influencers have been using the word Bubble another word for cryptocurrencies (mainly bitcoin). From their perspective, there’s a far higher price of crypto coins and other digital assets than what their “real” value would ...
Brute Force Attack (BFA)
Brute force attacks use complex software to flood the system with all potential passwords or keys to find the right value. In theory, such attacks could be used to guess passwords and keys and access encrypted data. The theoretical time required for ...
Browser Extension
Browser extensions are add-ons that allow you to customize your internet browser so that it functions better, so it does not feel like it limits you. It is like customizing a new car by adding accessories to it, or adding color changing lights. ...
Bridges
The blockchain bridge allows you to participate in an activity on another blockchain without selling your Bitcoins. It is a good option for those who do not want to go through the hassle of converting their Bitcoin assets into other cryptocurrencies ...
Breaking
Breaking on the blockchain is when a certain event causes the system to break down or split into a new blockchain. It can also be referred to as breaking because it makes said record or hard fork of some sort invalid. When these types of events ...
Bounty
Crypto bounties are an important rewards mechanism that blockchain projects utilize in order to secure the successful accomplishments of certain tasks required by the network. Initially, bounties were intended as a marketing tool to attract users to ...
Bots
Trading bots have been used on stock markets for several decades, arguably reaching their zenith with complex high-frequency trading (HFT) software. The most advanced bots can analyze many markets at once, and automatically buy or sell in response to ...
Blockchain-Enabled Smart Locks
A smart lock is a connected device that can be controlled digitally from a device like a mobile phone. Consumer-grade smart locks have become increasingly popular in homes over the past few years, but they are vulnerable to potential cybersecurity ...
Blockchain Transmission Protocol (BTP)
BTP is a technology that allows diverse blockchains, even those with wholly distinct algorithms and consensus models, to be compatible, enabling service invocation, value transfer, and data exchange. Token exchanges across multiple blockchains are a ...
Blockchain Explorer
Blockchain explorers facilitate one of the most important features of blockchain technology — browsing through the records of the distributed ledger. Transparency is one of the main characteristics of cryptocurrencies, and blockchain explorers allow ...
Blockchain
Blockchains are made up of a series of individual blocks. Each block contains information about transactions conducted within a given time period. They also contain a unique identifier to differentiate them from every other block in the chain. Blocks ...
Block Time
Block time refers to the approximate time it takes for a blockchain-based system to produce a new block, dictating the speed of transaction confirmation, which is measured in transactions per second (TPS). When a block reaches completion, it appears ...
Block Size
Blocks are some of the smallest components in a blockchain ledger. Essentially, blocks are bundles of transaction data clumped together, which are later combined in a chain that forms the distributed ledger. Block size is pretty straightforward — it ...
Block Reward
Blockchains are sequences of individual blocks, each of which contains a record of transactions completed within a given period. Each block has an associated cryptographic hashing problem. This problem must be solved in order for the block to be ...
Block Explorer
Block explorers connect directly to a specific blockchain, such as Bitcoin or Ethereum. They allow the user to view and query individual blocks — providing visibility to anyone of the transactions or other actions made by holders of ...
Block
Blocks are ordered sequentially, with new blocks added to the end of the chain. Every block contains a reference to the preceding block, in the form of a hash. This is one of the key security features of blockchain technology, making it virtually ...
Bitstream
Typically, a Field Programmable Gate Array (FPGA) has a file containing a set of instructions or a program which is called FPGA Bitstream as it contains a stream of bits. FPGA Bitstream FPGA bitstream file is used to configure the pinout and set up ...
Bits
Bitcoin, like any currency, must have the capacity to be subdivided. This is especially important for the use of Bitcoin and other cryptocurrency as a unit of exchange rather than pure speculation. Subdivision also became increasingly vital when ...
BitPay
BitPay is a Bitcoin payment service provider. It has headquarters in Atlanta, Georgia in the United States, and was originally founded in May of 2011 by Stephen Pair and Tony Gallippi. Through using BitPay, clients have the opportunity to directly be ...
BitLicense
Coming into effect in August 2015, the BitLicense was the first regulatory regime targeted at cryptocurrency businesses in the U.S. It regulates a broad range of crypto activities — including the transmission of cryptocurrency, the provision ...
Bitcointalk
Today, Bitcointalk is one of the largest online forums where people can ask questions and discuss topics related to Bitcoin, blockchain technology and cryptocurrency in general. The forum was created by the infamous inventor of Bitcoin itself ...
Bitcoiner
A Bitcoiner may be that friend you have who cannot stop talking about Bitcoin. Many Bitcoiners have been HODLing their Bitcoins since the early 2010s. Most likely, your Bitcoiner friend will be checking their phone to update you on the current price ...
Bitcoin Pizza
A historic Bitcoin transaction was done on May 22, 2010, in which a man from Florida used the cryptocurrency to pay for two pizzas. The day is celebrated every year, not because of the transaction, but because of the price: the individual in ...
Bitcoin ATM (BTM) Easy
Bitcoin ATMs work in a similar fashion to conventional cash machines — but instead of being shown their bank account details, users are presented with a series of options for trading Bitcoin in exchange for cash. BATMs that only offer buying ...
Bit
A bit is essentially a basic unit of information in the case of computing. The name is a contraction of the binary digit and represents a logical state with one of two possible values. These two values are only 0 and 1. Bits are typically grouped up ...
Binary Code
Binary code is the most basic form of programming data that a computer can directly comprehend. It is made up of a series of 0s and 1s that is organized and structured so that it can be received and processed as part of a bigger computer application. ...
Binance Labs
Binance Labs empowers sustainable blockchain entrepreneurs, companies, and communities, as well as provides funding to industry projects that contribute to the overall growth of the blockchain ecosystem. It is dedicated to assisting technological ...
Big Tech
Facebook, Amazon, Apple, and Google are among the five largest firms in the information technology (IT) industry in the United States and are known as the Big Tech. Microsoft is occasionally added to this list when it fulfills certain criteria ...
Bid Price
The highest price that a buyer is willing to pay for a certain product or service is known as the bid price. It is the amount of money that buyers offer for an item, such as a commodity, security, or cryptocurrency, in the context of financial ...
Beta (Release)
The word beta is used in computer science to describe the second stage of a software development cycle, following the alpha stage. During this phase, the key functional requirements of the application software are operational and tests are done for ...
Next page