SlideShare a Scribd company logo
1 of 22
Download to read offline
How to benchmark distributed ledger
technologies for the enterprise in 2019 Zug, 24.June.2019
Zug, 24.June.2019
Enterprise
Advisory
Tokenization
Services
Blockchain
as a Service
Compliance
Services
Blockchain
Academy
Jorge Alvarado
Jorge.AlvaradoFlores@swisscom.com
Background
Architect, consultant and manager with 10 years of experience, specialized in software
development, cloud computing, cyber-security and distributed ledger technologies. Zug, 24.June.2019
How to benchmark distributed ledger
technologies for the enterprise in 2019 Zug, 24.June.2019
…the methodology of comparing business processes and
performance metrics to industry bests and best practices.
Dimensions typically measured are quality, time and cost.
…using a specific indicator … resulting in a metric of
performance that is then compared to others.
https://en.wikipedia.org/wiki/Benchmarking
Benchmarking
Components for benchmarking distributed ledger technologies
Value drivers
Core characteristics/outcomes
expected
1
Weighting table
A multiplication factor given the
presence/absence,
weakness/strength of a value driver
2
Quantitative Analysis -
Score ranking
An objective measurement
obtained by direct observation
4
Utility/Price Analysis
The value obtained divided by the
cost of sustaining the network
3
Qualitative Analysis –
Capabilities Radar
Subjective measurements of the
weakness/strength of a value driver
5
7
Examples of Value drivers
Programmability
Transaction management
How easy/difficult it is to:
✓ Build transaction
✓ Broadcast transaction
✓ Confirm transaction
1
Language paradigms
✓ Imperative
✓ Object-oriented
✓ Procedural
✓ Declarative
✓ Functional
2
Memory Operations
Ability to optimize memory usage.
3
IO Operations
✓ Access to network resources
✓ Access to out-of-network
resource
4
CPU Operations
✓ Ability to optimize
instructions/operations
executed.
5
Asset tradeability
Asset issuance
✓ How easy/difficult it is to:
✓ Create a fungible asset
✓ Create an non-fungible asset
1
Marketplace
✓ Ability to set a instrument or
system that enables the purchasing
of digital assets.
3
Exchange
✓ Ability to set a instrument or
system that enables the exchange
of an asset with other digital assets.
2
Extensibility
Consensus mechanism
Examples such as:
✓ Proof-of-work
✓ Proof-of-authority
✓ Proof-of-stake
✓ Pre-byzantine fault tolerance
1
Block configuration
How easy/difficult it is optimize the
chain of blocks:
✓ Block-time
✓ Block-size
3
Data models
How easy/difficult it is to store:
✓ Key-value store
✓ An arbitrary set of data
✓ An arbitrary data schema
2
Execution
How easy/difficult it is to perform the
execution of business logic through:
✓ Turing completeness
✓ Oracles
4
Infrastructure Key Performance Indicators
Throughput
How capable is the network to
process state changes according to
the business environment.
2
Latency tolerance
How tolerant is the network when
there are multiple hops in the
network such as Network delay
5
Scalability
How capable is the network to accept
more nodes according to the business
environment.
3
Fault tolerance
How tolerant is the network's
behavior on:
✓ Crash failure
✓ Corrupt messengers
4
Deployability
How "scriptable" is the network to
enable automation in the enterprise
environment.
1
Cryptography maturity
Public/Private Keys
1
Re-certification / Re-keying
2
Encryption
4
Zero-Knowledge Proofs
5
Key derivation
3
Multi-signatures
6
Development tools maturity
API
✓ Coherence of entities & relationships
✓ Domain-related naming conventions
✓ HTTP/REST Conventions
✓ Version history
✓ Age (in years)
1
SDKs
✓ Code editor plugins/templates
✓ Languages available
✓ Entities representations
✓ Cryptographic functions
✓ Integration to other systems
2
Documentation
✓ Attention to detail in github README
✓ Quality of ReadTheDocs-like content
✓ API documentation
✓ Hello-world Tutorials
✓ Advanced tutortials
3
Community/Ecosystem
✓ Github stars
✓ Github issues
✓ Commit activity
✓ PR activity
✓ Available technical training
✓ Stackoverflow questions
✓ Reddit posts
✓ Compatibility with legacy systems
4
Information security maturity
Confidentiality
is the property, that information is
not made available or disclosed to
unauthorized individuals, entities, or
processes.
1
Integrity
maintaining and assuring the accuracy
and completeness of data over its
entire lifecycle.
2
Availability
the information must be available
when it is needed... High availability
systems aim to remain available at all
times, preventing service disruptions.
3
Encryption
1a
Zero-knowledge proofs
1b
Consensus mechanism
2a
Fault tolerance
3a
15
Examples of Measurements
How to measure, categorize and score
Baseline calculation
✓ BETTER THAN BASELINE: 1.3
✓ BASELINE: 1.0
✓ WORSE THAN BASELINE: 0.7
3
Categorization
✓ GREAT DOCUMENTATION
✓ NOT BAD DOCUMENTATION
✓ POOR/TERRIBLE DOCUMENTATION
✓ CAPABLE OF FUNGIBLE TOKENS (YES/NO)
✓ EXTENSIBLE WITH ORACLES (YES/NO)
1
Measurement
✓ 200 Txs/sec
✓ 1.5TB of hard disk needed
✓ 5K stars on Github
✓ 120 issues on Github
2
17
Score Examples
Capabilities radar
0
0.5
1
1.5
2
2.5
3
CAPABILITY A
CAPABILITY B
CAPABILITY CCAPABILITY D
CAPABILITY E
CAPABILITIES RADAR
Weighted score
WEIGHT
FEATURE 1
WEIGHT
FEATURE 2
WEIGHT
FEATURE C
CATEGORY A 1 1 100
CATEGORY B 2 1 10
CATEGORY C 3 0 1
Weighting
FEATURE 1
SCORE (0-1)
FEATURE 1
WEIGHT TOTAL
NETWORK 1 0.2 1 0.2
NETWORK 2 0.4 3 1.2
NETWORK 3 0.1 6 0.6
Weighted Score
20
Conclusion
1. Make a list of the value drivers you aim (find inspiration in this doc)
2. Make a weighting table and score ranking for every quantitative value
driver
3. Make a capabilities radar chart for every qualitative value driver
4. Calculate the costs of infrastructure and development and estimate the
utility/price ratio
5. Make a list of technologies you're interested to score
6. Compare results
7. Profit.
DLTs are flourishing and it's hard to choose, so…
Zug, 24.June.2019
THANK YOU!

More Related Content

Similar to How to benchmark distributed ledger technologies for the enterprise

Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)Amazon Web Services
 
Hadoop Migration to databricks cloud project plan.pptx
Hadoop Migration to databricks cloud project plan.pptxHadoop Migration to databricks cloud project plan.pptx
Hadoop Migration to databricks cloud project plan.pptxyashodhannn
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
 
Blockchain testing strategy
Blockchain testing strategyBlockchain testing strategy
Blockchain testing strategyrajni singh
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Types of cloud computing services - cloud based ai services | V2Soft
Types of cloud computing services - cloud based ai services | V2SoftTypes of cloud computing services - cloud based ai services | V2Soft
Types of cloud computing services - cloud based ai services | V2SoftV2Soft2
 
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Editor IJCATR
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxPadmaNaban32
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementEnterprise Management Associates
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architectureCloud Genius
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise AnalyticsDATAVERSITY
 

Similar to How to benchmark distributed ledger technologies for the enterprise (20)

Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
 
Hadoop Migration to databricks cloud project plan.pptx
Hadoop Migration to databricks cloud project plan.pptxHadoop Migration to databricks cloud project plan.pptx
Hadoop Migration to databricks cloud project plan.pptx
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
Blockchain testing strategy
Blockchain testing strategyBlockchain testing strategy
Blockchain testing strategy
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Cloud Design Patterns
Cloud Design PatternsCloud Design Patterns
Cloud Design Patterns
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Types of cloud computing services - cloud based ai services | V2Soft
Types of cloud computing services - cloud based ai services | V2SoftTypes of cloud computing services - cloud based ai services | V2Soft
Types of cloud computing services - cloud based ai services | V2Soft
 
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

How to benchmark distributed ledger technologies for the enterprise

  • 1. How to benchmark distributed ledger technologies for the enterprise in 2019 Zug, 24.June.2019
  • 3. Jorge Alvarado Jorge.AlvaradoFlores@swisscom.com Background Architect, consultant and manager with 10 years of experience, specialized in software development, cloud computing, cyber-security and distributed ledger technologies. Zug, 24.June.2019
  • 4. How to benchmark distributed ledger technologies for the enterprise in 2019 Zug, 24.June.2019
  • 5. …the methodology of comparing business processes and performance metrics to industry bests and best practices. Dimensions typically measured are quality, time and cost. …using a specific indicator … resulting in a metric of performance that is then compared to others. https://en.wikipedia.org/wiki/Benchmarking Benchmarking
  • 6. Components for benchmarking distributed ledger technologies Value drivers Core characteristics/outcomes expected 1 Weighting table A multiplication factor given the presence/absence, weakness/strength of a value driver 2 Quantitative Analysis - Score ranking An objective measurement obtained by direct observation 4 Utility/Price Analysis The value obtained divided by the cost of sustaining the network 3 Qualitative Analysis – Capabilities Radar Subjective measurements of the weakness/strength of a value driver 5
  • 8. Programmability Transaction management How easy/difficult it is to: ✓ Build transaction ✓ Broadcast transaction ✓ Confirm transaction 1 Language paradigms ✓ Imperative ✓ Object-oriented ✓ Procedural ✓ Declarative ✓ Functional 2 Memory Operations Ability to optimize memory usage. 3 IO Operations ✓ Access to network resources ✓ Access to out-of-network resource 4 CPU Operations ✓ Ability to optimize instructions/operations executed. 5
  • 9. Asset tradeability Asset issuance ✓ How easy/difficult it is to: ✓ Create a fungible asset ✓ Create an non-fungible asset 1 Marketplace ✓ Ability to set a instrument or system that enables the purchasing of digital assets. 3 Exchange ✓ Ability to set a instrument or system that enables the exchange of an asset with other digital assets. 2
  • 10. Extensibility Consensus mechanism Examples such as: ✓ Proof-of-work ✓ Proof-of-authority ✓ Proof-of-stake ✓ Pre-byzantine fault tolerance 1 Block configuration How easy/difficult it is optimize the chain of blocks: ✓ Block-time ✓ Block-size 3 Data models How easy/difficult it is to store: ✓ Key-value store ✓ An arbitrary set of data ✓ An arbitrary data schema 2 Execution How easy/difficult it is to perform the execution of business logic through: ✓ Turing completeness ✓ Oracles 4
  • 11. Infrastructure Key Performance Indicators Throughput How capable is the network to process state changes according to the business environment. 2 Latency tolerance How tolerant is the network when there are multiple hops in the network such as Network delay 5 Scalability How capable is the network to accept more nodes according to the business environment. 3 Fault tolerance How tolerant is the network's behavior on: ✓ Crash failure ✓ Corrupt messengers 4 Deployability How "scriptable" is the network to enable automation in the enterprise environment. 1
  • 12. Cryptography maturity Public/Private Keys 1 Re-certification / Re-keying 2 Encryption 4 Zero-Knowledge Proofs 5 Key derivation 3 Multi-signatures 6
  • 13. Development tools maturity API ✓ Coherence of entities & relationships ✓ Domain-related naming conventions ✓ HTTP/REST Conventions ✓ Version history ✓ Age (in years) 1 SDKs ✓ Code editor plugins/templates ✓ Languages available ✓ Entities representations ✓ Cryptographic functions ✓ Integration to other systems 2 Documentation ✓ Attention to detail in github README ✓ Quality of ReadTheDocs-like content ✓ API documentation ✓ Hello-world Tutorials ✓ Advanced tutortials 3 Community/Ecosystem ✓ Github stars ✓ Github issues ✓ Commit activity ✓ PR activity ✓ Available technical training ✓ Stackoverflow questions ✓ Reddit posts ✓ Compatibility with legacy systems 4
  • 14. Information security maturity Confidentiality is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes. 1 Integrity maintaining and assuring the accuracy and completeness of data over its entire lifecycle. 2 Availability the information must be available when it is needed... High availability systems aim to remain available at all times, preventing service disruptions. 3 Encryption 1a Zero-knowledge proofs 1b Consensus mechanism 2a Fault tolerance 3a
  • 16. How to measure, categorize and score Baseline calculation ✓ BETTER THAN BASELINE: 1.3 ✓ BASELINE: 1.0 ✓ WORSE THAN BASELINE: 0.7 3 Categorization ✓ GREAT DOCUMENTATION ✓ NOT BAD DOCUMENTATION ✓ POOR/TERRIBLE DOCUMENTATION ✓ CAPABLE OF FUNGIBLE TOKENS (YES/NO) ✓ EXTENSIBLE WITH ORACLES (YES/NO) 1 Measurement ✓ 200 Txs/sec ✓ 1.5TB of hard disk needed ✓ 5K stars on Github ✓ 120 issues on Github 2
  • 18. Capabilities radar 0 0.5 1 1.5 2 2.5 3 CAPABILITY A CAPABILITY B CAPABILITY CCAPABILITY D CAPABILITY E CAPABILITIES RADAR
  • 19. Weighted score WEIGHT FEATURE 1 WEIGHT FEATURE 2 WEIGHT FEATURE C CATEGORY A 1 1 100 CATEGORY B 2 1 10 CATEGORY C 3 0 1 Weighting FEATURE 1 SCORE (0-1) FEATURE 1 WEIGHT TOTAL NETWORK 1 0.2 1 0.2 NETWORK 2 0.4 3 1.2 NETWORK 3 0.1 6 0.6 Weighted Score
  • 21. 1. Make a list of the value drivers you aim (find inspiration in this doc) 2. Make a weighting table and score ranking for every quantitative value driver 3. Make a capabilities radar chart for every qualitative value driver 4. Calculate the costs of infrastructure and development and estimate the utility/price ratio 5. Make a list of technologies you're interested to score 6. Compare results 7. Profit. DLTs are flourishing and it's hard to choose, so…