Recently Network Nervous System (NNS) neuron holders can combine multiple neurons owned by the same controller key into a single neuron. Literally, Internet Computer blockchain is controlled by the Network Nervous System (NNS), an open, permissionless algorithmic governance system. ICP utility token holders can stake their tokens within neurons in the NNS to engage in network governance and vote on whether to adopt or reject network proposals, while earning voting rewards for their participation. NNS neuron holders who own more than a single neuron have been interested in the option of combining them into one neuron.
Accordingly, the DFINITY Foundation R&D team has implemented a feature in the NNS to permit the merging of multiple neurons owned by the same controller key into a single neuron, which can be done via the command line or the NNS front-end dapp. The merging of neurons is implemented by transferring all stake, age, and maturity from a source neuron into a target neuron, provided that the necessary preconditions are met. The properties of the resulting neuron are derived from those of all of the source neurons by weighting them according to their respective stake. The fact that when you merge two neurons such as what happens to your stake, your maturity, your neuron’s aging bonus. However, merging is not currently supported for neurons controlled through hotkey or hardware wallet or neurons that have been dedicated to the NNS Community fund.
For the example if you own multiple neurons, it can be cumbersome to repeatedly spawn or merge maturity in each of them as the maturity reaches 1 ICP token in value. In the case where several of your neurons have a similar dissolve delay, merging them into a single neuron makes managing them easier and allows for the more frequent merging of maturity.
Enterprise Software on the Internet Computer Blockchain
In fact there is a massive market opportunity that can be seized by developing on-chain solutions to operational challenges for organizations of all sizes. Then blockchain technology is already rapidly transforming software, but the Internet Computer is particularly well positioned to disrupt a multi-billion-dollar industry that is not getting much attention in the world of Web3.
Enterprise software is what businesses and organizations of all sizes depend on to run their day-to-day operations and secure their digital property. These tools help with everything from payroll and human resources management to customer support, manufacturing production, and data analysis. Because the sector includes many software solutions that have been slow to evolve, the development of on-chain alternatives running on the Internet Computer would seize on an immense market opportunity. It also gives rise to the potential that decentralized enterprise tools might be shared across businesses and projects, beyond the control of a single party.
Actually, there are many specific advantages to building enterprise software on the Internet Computer versus the standard software as a service (SaaS) model. The advantages are including as follows
• The security properties of the Internet Computer minimize the attack surface for data leaks, hacks, and breaches
• The Internet Computer natively runs decentralized web applications on-chain, including Web3 concepts like DAOs and NFTs that can be incorporated into the design of enterprise software.
• Internet Identity on the Internet Computer makes it far simpler to manage an identity across multiple applications.
• Financial transactions can execute far more seamlessly on the Internet Computer ledger than through the current Web2 technology stack.
These combined advantages present some pretty exciting opportunities for enterprise software development on the Internet Computer that delivers unique solutions to operational challenges.
Some of the many enterprise software use cases in which the above advantages could be leveraged for superior software running on the Internet Computer versus the current technology stack.
• Disaster recovery software is used to help a company recover from a hack or ransomware. It is basically a data backup that is stored off the company’s networks. The problem is these backups tend to be targeted by hackers as well just ask Colonial Pipelines. Running the disaster recovery backup and storing the data on the Internet Computer would make the system far less vulnerable to attacks and disruption.
• IT organizations within large companies spend millions of dollars to purchase and configure software to manage employee identities across multiple applications. This software enables automation of account activities such as removing accounts when an employee leaves the company. These tools need to be heavily customized since every company’s IT landscape is vastly different. However, as a company moves its applications to those running on the Internet Computer, identity management becomes simplified.
The source is including Enterprise Software on the Internet Computer Blockchain | by Kyle Langham | The Internet Computer Review | Apr, 2022 | Medium, Internet Computer NNS Neurons Can Now Be Merged | by DFINITY | The Internet Computer Review | Apr, 2022 | Medium