The YAMA Token
LEO HYUNG WAN
In this context, management refers to the process of solving issues related to the consensus-building that cannot be resolved algorithmically. The main source of power in the OKAYAMA blockchain is the network token holder. More specifically, token holders transfer their power to the block producers and grant them limited and verifiable power to freeze accounts,search for and fix defective applications, and submit fork proposals to the basic protocol. The feature to designate block producers is embedded in the OKAYAMA software. When making changes to the blockchain, block manufacturers must approve them. When a block producer refuses to fulfill the wish of the token holders, they may initiate a vote to eliminate the producer. If the block producer makes changes without the permission of the network users, the testifiers of the full nodes reject the change process.
Who Can Participate?
OKAYAMA can provide services for several types of participants, including:
– Business owners: Individuals, private companies, non-profit organizations,
and governmental entities, among others, can use OKAYAMA to provide a
significant variety of products and services. A functional distributed business
environment will require the active participation of all the members in the
– Smart Contract Providers: Participants can create smart contracts and
provide them to others in exchange for coins, goods, or services.
– Infrastructure Providers: Users can protect the OKAYAMA ecosystem through block generation and verification.
The Token Model
Any blockchain has a resource base limitation and has the need for a security
system. The main resource classes of OKAYAMA includes the following:
– Bandwidth and Log Storage (Disk)
– Computation and Computational Backlog (CPU)
– State Storage (RAM)
The blockchain stores the history of all messages. Any of the network nodes
must download and store a complete history for network synchronization,
which makes it possible to restore the state of any application. The
computational backlog is used to deploy the blockchain state, that is, a list of
calculations necessary to restore the network’s history.
Key Features of Distributed
Three important features of a distributed business network are 1) the use of blockchain clouds that eliminate businesses’ need to invest in IT infrastructure;2) data is protected through proven mechanisms; and 3) well-designed distributed networks comply with regulatory standards that offer the needed legal protection. Each community (e.g., company, governmental agency) can operate on its own cloud-a system wh4ich organizes hardware, software, and liability nodes through the protocols set on the globular network that allows for peer-to-peer coordination. Domains within a cloud can be used to set procedures for business services for long-term trading for storage, traffic, and CPU. More specifically, organizations can connect with each other through delegation (discussed in the next section) at faster speeds compared to traditional networks without the need to rely on their own IT infrastructure but relying instead on blockchain clouds.