Posted 8 months ago | by Ben Armstrong

Latest Version of Golem is Officially Here!

The Golem project team just shot out an official announcement that its – “Alpha Reveal (TNM) of New Golem” has been released.

The new version, according to the team’s post on the website, focuses on simplifying application development on the Golem network, which remained questionable issues for developers over the last few years.

The team commented,

“As we have been mentioning in our communications over the last few months, we have made use of all the experience we had gathered while developing and running Brass and then Clay Golem. We spent countless days and nights thinking about how we could address what’s most important to our users and for the future of Golem and arrived at a strong vision of what we want to build.”

New Tools for Devs

With this new release, every task is designed to function on the Alpha testnet.

Golem’s upgrade comes with useful tutorials for developers to follow and learn to handle their dockerized payloads. Another notable part is the additional ability to convert dockerized images into Golem’s custom virtual system image format, which has been linked to containers through API establishment.

Speaking of the decision to develop this platform, the company pointed out that they are, “building with a developer-first approach and to achieve this we need feedback.”

The team expected this new version “can be used for a myriad of use-cases that can really make a difference” and they also showed the willingness to get feedback to better optimize their work for those use-cases.

A Long Time to Now for Golem

Launched in 2017, Golem is known as a decentralized peer-to-peer platform that enables users to sell unused computing power of their devices to other people in need. The supercomputer network combines the processing power of dozens of devices, in an effort to set up the first global marketplace for idle computing power.

On June 5, the Golem team disclosed their study of Proof-of-Device or PoD for identity authentication. The concept’s key factor lays beneath the fact that users are in need of a method that can both verify identity in an anonymous yet trusted manner and automatically validate users’ hardware.

Articles on Bitboy may contain affiliate links that help us to remain profitable. It might come as a surprise, but all these great articles aren’t cheap to produce. If you don’t mind helping us out, please click on the links!