- D -
Dumping
A dumping may occur when the market is spooked by outside factors such as economic turmoil in global markets, or even as a response to a particular news story. Examples over the years have been the result of several factors. For instance, on the rare ...
Documentation
Documentation is one of the four essential components of token economies – which refers to the economics of goods and services that have been tokenized. Blockchain enables these economies to function without intermediaries while documenting and ...
Diversification
Diversification is a risk-management strategy that mixes a wide variety of investments within a portfolio. Portfolio holdings themselves can be diversified across asset classes and within classes, as well as geographically, through investing in ...
Distributed Network
In a distributed network, data, computing tasks, and applications are spread across several (often many) machines, which communicate with and depend on each other. Distributed networks are established with the intention of spreading out work and ...
Distributed Denial of Service (DDoS) Attack
DDoS attacks are among the most common forms of cyberattack. They often make use of networks (botnets) of devices (bots) that have been compromised by malware — placing them under the control of the bad actor. The attacker instructs every bot to ...
Discord
In the world of gaming, Discord probably isn’t an unheard thing. At its core, Discord is a communication application where users can send text messages, participate in voice and video calls, and participate in communities (servers). When launched in ...
Dip
Dip means to put or let something down quickly or briefly into liquid in the traditional sense. However, in the world of cryptocurrencies, a dip is the process of buying an asset after it has declined in value. Buying a dip implies that you have an ...
Digital Signature
Digital signatures employ cryptography to provide a way of determining whether a digital message or document is real. If a signature is deemed valid, it can be assumed that the communication is from the person it says it's from (known as ...
Digital Identity
There are several types of digital identity already in widespread use. The most obvious of these is government identification, which is used for purposes including access to banking, corporate registration, and, of course, for surveillance purposes. ...
Digital Currency
Digital currencies (theoretically) perform all the functions of fiat money, in that users can pay for goods or services with them. However, they present a number of potential advantages. These can include faster transaction speeds, lower transaction ...
Digital Commodity
There is a huge range of things that might be termed a digital commodity. These include things like computing power and storage. Increasingly, however, the term digital commodity is primarily taken to mean digital currencies. In practical terms, ...
Digital Asset
A digital asset, in the world of crypto and fintech, refers to the digital representation of something of value. Typically, this value is tokenized, and the resulting tokens can represent either full ownership or fractional ownership that is verified ...
Digital Art
In simple terms, digital art can be defined as anything crafted or viewed with digital means. Digital art has been around since the 1960s. With the advent of computers and multimedia technology, artists began incorporating new forms of media into ...
Digital
Digital can be described as electronic technology which can generate, store as well as process data in two states, positive as well as non-positive. The positive is expressed or represented through the number 1 and the non-positive is expressed or ...
Difficulty
In proof-of-Work based blockchains (such as Bitcoin), new blocks are added to the chain through mining, which involves solving cryptographic puzzles. The Bitcoin blockchain is designed to have a new block added roughly every 10 minutes. However, as ...
Desktop Wallet
A desktop wallet is a type of software wallet that is usually non-custodial. This means no central platform or third party has custody of cryptocurrencies belonging to a particular wallet. Only the end-user has the ability to move funds using private ...
Depth Chart
A graph that plots the requests to buy (bids) and the requests to sell (asks) on a chart, based on limit orders. The chart shows the point at which the market is most likely to accept a transaction.
Denial-of-Service (DoS) Attack
A denial-of-service attack restricts access to a computer or network in order to prevent intended users from using it. DoS attacks have become one of the go-to tools hackers employ in order to disturb the normal operation of computer-based services. ...
Delisting
When a project no longer meets the exchange's listing standards, it may get delisted. The reasons behind delisting can be many, some of them are: Lack of regular trading activity; Absence of protocol development; Faulty network or smart ...
Deflation
In macroeconomic terms, deflation usually accompanies a contraction in monetary supply. However, prices can decline for a wide range of reasons — including low levels of productivity in the economy, advances in technology, or simply lower levels of ...
DeFi Aggregator
A DeFi aggregator brings together trades across various decentralized finance platforms (DeFi) into one location, saving users time and increasing efficiency for cryptocurrency trades. As the name suggests, DeFi is spread out across different ...
DeFi
Traditionally, almost all financial transactions involve an intermediary of some sort. When a customer makes a payment with a credit card, there are several parties involved, including acquirers and banks. At multiple stages, third parties have ...
Deep Web
There are several names for the "deep web." Some refer to it as the "dark web"; others, the "invisible web," but all refer to the parts of the internet not accessible via generic browsers like Google, Bing and Firefox. Instead, those curious enough ...
Decryption
Encryption is used to protect sensitive data from bad actors, and to ensure that it is difficult to view or understand in the event that it is stolen. There are many reasons why a party might wish to encrypt data, such as for transmitting credit card ...
Decentralized Stablecoin
A stablecoin is a digital asset built on the blockchain that is designed to maintain a price peg at a designated price, most often $1. This effectively removes holders from the swings of the market whilst providing a secure and stable way. ...
Decentralized Social Media
Decentralized social media, also known as blockchain-based social media, refers to social media platforms powered by distributed ledger technologies (DLT) like blockchain or DAG. As such, activities on these platforms are irrevocably recorded on a ...
Decentralized Payment Network
A decentralized payment network refers to a system where users, customers and vendors can exchange money without having to trust any third party to keep the network secure and operational. These networks are possible thanks to the globalization of ...
Decentralized Network
A decentralized network is a combination of protocols spread across numerous computer devices, known as nodes. The capacity of nodes to communicate without the need for a monitoring body enables the element of decentralization. In a distributed ...
Decentralized Marketplace
A decentralized marketplace, built on blockchain technology, allows traders or investors to trade with each other while eliminating middlemen. They are available globally and require no intermediaries to make trades possible. No one has to know or ...
Decentralized Governance
Decentralized governance entails a variety of voting techniques for platform technology, strategy, upgrades, and regulations. On-chain governance and off-chain governance are the two most common approaches to blockchain governance. On-chain ...
Decentralized Database
Due to the rapid growth of blockchain products, there has been an increasing need for robust data storage solutions. While most DApps store data on blockchains like Ethereum, the costs are extremely high. As a result, most DApps are forced to migrate ...
Decentralized Currency
Decentralized currency refers to bank-free methods of transferring wealth or ownership of any other commodity without needing a third party. The money we have traditionally used is centralized, controlled by a central authority. The third-party ...
Decentralized Autonomous Organizations (DAO)
With the mass adoption of blockchain technology, a new form of company or organization has become increasingly popular. A decentralized autonomous organization, or DAO, is a company governed in a decentralized manner through blockchain-based smart ...
Decentralized Autonomous Initial Coin Offerings (DAICO)
Proposed in 2018 by Vitalik Buterin, the creator of Ethereum (ETH), it aims to combiner ideas from Decentralized Autonomous Organizations (DAOs) and initial coin offerings (ICOs) in order to increase the investors’ trust in the latter and put more ...
Decentralized Applications (DApps)
DApps are any computer applications whose operation is maintained by a distributed network of computer-nodes, as opposed to a single server. The concept of a decentralized application was enabled by blockchain platforms that support smart contracts, ...
Decentralized
Decentralized organizations are those that do not rely on a single center of authority to enforce the rules and maintain operation. Instead, they are composed of numerous decision-makers with the same or comparable degrees of authority over the rest ...
Decentralization Ratio
The Decentralization Ratio (DR) is the ratio of collateral value that is decentralized over the total stablecoin supply backed for those assets. It is a function that measures the proportion of an asset’s value that comes from decentralized sources. ...
Dead Coin
Dead coins are digital tokens that have failed or been revelaed as scams, and thus, no longer viable. There are thousands of failed cryptocurrency projects or ICOs that are no longer active for a number of reasons ranging from internal corruption ...
Day Trading
In stock, cryptocurrency and other markets the prices of assets tend to change continuously during the day under the effects of the market forces of supply and demand. Most of the time, especially in the less volatile environments, these fluctuations ...
Date of Launch
An initial coin offering (ICO) is a type of funding campaign used when launching cryptocurrency coins or tokens. During an ICO, the development team behind a new cryptoasset announces that it will sell a certain amount of its asset to investors, ...
Next page