-
classical compilers that have different backend/targets seem to have an intermediate representation in which they can compute optimizations.
Should we have an IR? There's different ones that exist …
mimoo updated
7 months ago
-
Allow encrypting validator keys in `wallet.toml`.
sug0 updated
2 months ago
-
What is the reason?
![20220118151212851](https://user-images.githubusercontent.com/63135573/149888348-83c2a880-5167-499e-89c9-60b18930af02.jpg)
-
A lot of our coverage is provided by two large E2E tests (MASP & ledger transactions), which should be mostly replaced with / supplanted by unit / prop tests with proper mocks so that we can reach suf…
-
Hi, 'npphen' is really a great tool! Best i've ever seen in this field.
But i have some ideas to improve the package.
1) The calculating speed is frustrating slowly, even on high-performance mach…
-
I am making guides for your software for use on Windows and the Raspberry Pi. Your logo was a fish and so I threw together something simple. I use square dimensions, feel free to use it http://www.med…
-
customer:
performer:
deadline:
estimated:
started:
actual:
completed:
confirmed:
dependencies:
- [ ]
supersedes:
-
---
We need a very basic CLI for the following:
1. The Anoma Node
2. The Anoma Clie…
-
To be able to send notification emails and keep people engaged with the project, we want to email people who signed up when we have a new monthly round-up blog post.
-
## Description
We should establish some way to test how "good" (throughput? latency?) Typhon is (relative to Tendermint). This means creating some kind of benchmark now that can at least measure ten…
-
Ok so, I was looking through some data tables from the shielded expedition, and came across something that could be a potential issue when it comes to slashing:
When looking at the records of "eviden…