NEM is a highly versatile crypto solution which seeks to adhere to a host of mainstream industry requirements. It is written in Java and JavaScript with 100% original source code. NEM has a stated goal of a wide distribution model and has introduced new features in blockchain technology in its proof-of-importance (POI) algorithm. NEM also features an integrated P2P secure and encrypted messaging system, multisignature accounts and an Eigentrust++ reputation system. Essentially, NEM is designed as a financial blockchain solution and can be used for payment, clearing and settlement in a private environment which is highly controlled. This means that NEM meets several of the regulatory requirements and guidelines in the financial industry. This allows it to be used to settle (change of ownership) any asset via the blockchain. Mijin which is a private chain of NEM has gained popularity and companies such as Hitachi have already embraced it. Why NEM? Many banks around the world have come to accept the importance of blockchain technology. In fact, a good number of banks in the U.S, India and Japan have already started using the technology. Because banks generally employ the smart contract concept, NEM’s platform which is asset-friendly can be used to settle any asset. In settling assets, speed, security, and reliability are very important to a mainstream institution which is what this crypto offers. NEM addresses these issues by repackaging its blockchain into a private chain and presenting it as Mijin. NEM crypto is also applicable in the technology world. Unlike Bitcoin and Dogecoin which use mining to increase the number of coins, XEM uses something called ‘harvesting’. In this process, blocks are generated and a person is rewarded for work contributed using transaction fees. Every block has a certain number of transactions which attract an unknown amount of fees. This keeps the participants incentivized to continue harvesting. For a blockchain user to be allowed to harvest, one must go through a forging mechanism process called Proof-of-Importance (POI). POI is the algorithm used in NEM to time stamp transactions. A NEM user's importance is determined by how many coins they have and the number of transactions made to and from their wallet. POI uses the NCDawareRank network centrality measure, the topology of the transaction graph, as well as a number of other relevant signals to achieve consensus. POI is different from other initiatives which use a fee-sharing model that does not take into consideration one's overall support of the network. In proof-of-stake systems a person needs to have large numbers of coins to form a block, but in NEM transactions volume and trust become factors. This was designed to encourage users of NEM to not simply hold XEM but instead actively carry out transactions. To be eligible for entering the importance calculation, an account must have at least 10,000 vested XEM. All accounts owning more than 10,000 vested XEM have a non-zero importance score. With a supply of 8,999,999,999 XEM, the theoretical maximum number of accounts with non-zero importance is 899,999. In practice, the number of actual accounts with non-zero importance is not expected to approach the theoretical max due to inequalities in held XEM and also the temporal costs associated with vesting. If NEM becomes very popular, a threshold of 10,000 vested XEM could be undesirable. If necessary, this number could be updated in the future via a hard fork, which is the same procedure for adjusting transaction fees and other parameters related to harvesting.
IOST is building an ultra-high TPS blockchain infrastructure to meet the security and scalability needs of a decentralized economy. Led by a team of proven founders and backed by $40 million from world-class investors, including Sequoia and Matrix, IOST aims to be the underlying architecture for the future of online services. The powerful consensus algorithm “Proof-of-Believability” enables next-gen transaction throughput speeds while ensuring nodes stay compliant, using factors including IOST token balance, reputation-based token balance, network contributions and user behaviors. A faster grade Byzantine Fault Tolerance mechanism, microstate blocks, Atomic Commit protocol and a dynamic sharding protocol (Efficient Distributed Sharding) all ensure transactions are safeguarded, consistent and lightning fast while reducing storage, configuration costs and processing power for validators. Anyone is able to participate in every layer of our system, from using services on our blockchain to running a node and validating transactions. Our rules and code are open for all to see and no preconditions will limit participation. IOST aims to fundamentally disrupt previous methods of business by creating a self-operated, trustless network that maximizes network value for all parties. The project places great emphasis on decentralized and secure ways of storing information. It also provides for Dapps and smart contracts, and anyone who is familiar with blockchain technology knows just how integral these two concepts have become. Adhering to the quintessential egalitarian values of blockchain technology, IOST is creating a censorship-resistant and trustless network that is open to all, using blockchain technology to cut out middlemen and maximize network value for all parties. Terrace Wang, Kimmy Zhong, and Ray Xiao, who are extremely brilliant, have co-founded the project. In addition to these original three, the project has 12 employees and 4 advisors. It is also worth noting that Ryan Bubiski, a co-founder of CodeAcademy and a winner of Times Most Influential People award plays a major role in the advisory board of the project. The team has partnered with about sixteen blockchain and cryptocurrency oriented companies such as Sequoia, Nirvana Capital, and DFund. The project, therefore, has strong investors.'