SlideShare a Scribd company logo
1 of 16
Download to read offline
Token Engineering
“Show me the incentive and I’ll show you the outcome.”
Charlie Munger
Matt Lockyer
Background
Full Stack Developer
Academia and University Lecturing
Blockchain Solutions Consultant
Currently
Token Engineering Advisor - FansUnite.io
Token Mechanism Team - Wireline.io
Founder, Soloblock.solutions
Building blocks of
digital scarcity
3
https://blog.cofound.it/asset-tokenisation-a-primer-fbcc0393a944
4
Types of Cryptoassets
Cryptoassets
Stores of Value (MV = PQ)
Utility Tokens (?)
Security Tokens (DCF)
Work Tokens
Burn & Mint
Discount Tokens
StablecoinsCrypto Collectible (NFT)
Proof of Service
Access Control
Signalling & Curation
Governance
https://medium.com/paratii/on-the-immaturity-of-tokenized-value-capture-mechanisms-1fde33f2bc8e
https://goo.gl/cPXpdX - Dimitri De Jonghe - Decentralized Web Summit - Token Engineering Community 5
Designing networks with
rewards and punishments
6
1.
Define the problem
7
Define the problem
1. Why is this network protocol being built?
a. What objective(s) is it optimizing and/or maximizing for?
b. What problem(s), immediate and real world, is the network addressing?
2. Who are the stakeholders?
a. What do they want? What type of people are they? What do they know?
b. What can/do they provide? Is it money? Is it work? Ideas? Creativity?
3. How could a stakeholder / adversary attack the network?
8
2.
Evaluate mechanisms
9
Evaluate mechanisms
1. Use a series of constraints and questions
a. Does the mechanism broadly address the problem(s)?
b. Define pass / fail criteria, codifying outcomes for completeness
2. Any open ended questions (likely)?
a. Does any mechanism solve these questions i.e. close the loop?
b. Are there any attacks on these mechanisms?
3. Does the mechanism have a balanced incentive model?
10
Balanced Incentives - Bitcoin Example
Intrinsic Subjective
Positive Win block reward
Belief: bitcoin is an amazing SOV
that will change the world
(increase in value)
Negative Lose electricity $$$
Belief: attacking Bitcoin leads to
fork making efforts worthless
(decrease in value)
11
3.
Simulate, verify, design
12
Simulate, verify, design
1. Are we adequately supported with tooling?
a. Simulation entrants - IncentiveAI, Consensys, ???
2. Verification of subjective vs. objective goals
a. Best restaurants in NYC vs. 2 + 2 = 4
3. Lacking intrinsic measures for creative economy
a. Nothing at stake problem
b. What is the value of a photograph NOT being licensed on a network?
13
Example:
Incentivized Data Provider
14
FansUnite - incentivize fans to provide accurate sports data
15
Thank You
Questions?

More Related Content

Similar to The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite

Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Mayank Jain
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfJyotirmayaMaharana2
 
Blockchain in Practice, ETH Computational Social Science, Fall 2019
Blockchain in Practice, ETH Computational Social Science, Fall 2019Blockchain in Practice, ETH Computational Social Science, Fall 2019
Blockchain in Practice, ETH Computational Social Science, Fall 2019Rafael Kallis
 
Blockchain Fundamentals - Day 1 - Introduction (new style)
Blockchain Fundamentals - Day 1 - Introduction (new style)Blockchain Fundamentals - Day 1 - Introduction (new style)
Blockchain Fundamentals - Day 1 - Introduction (new style)Chhay Lin Lim
 
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Precisely
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018Christophe Rochefolle
 
從台積電看敏捷帶來的改變.pdf
從台積電看敏捷帶來的改變.pdf從台積電看敏捷帶來的改變.pdf
從台積電看敏捷帶來的改變.pdfDerek Chen
 
Anaconda and PyData Solutions
Anaconda and PyData SolutionsAnaconda and PyData Solutions
Anaconda and PyData SolutionsTravis Oliphant
 
Introducing the world's first token engineering framework
Introducing the world's first token engineering frameworkIntroducing the world's first token engineering framework
Introducing the world's first token engineering frameworkToken Engineering
 
Blockchain Fundamentals - Day 3 - PoW consensus and ICOs (new style)
Blockchain Fundamentals - Day 3 -  PoW consensus and ICOs (new style)Blockchain Fundamentals - Day 3 -  PoW consensus and ICOs (new style)
Blockchain Fundamentals - Day 3 - PoW consensus and ICOs (new style)Chhay Lin Lim
 
Whats Next for Machine Learning
Whats Next for Machine LearningWhats Next for Machine Learning
Whats Next for Machine LearningOgilvy Consulting
 
Machine Learning for Finance Master Class
Machine Learning for Finance Master Class Machine Learning for Finance Master Class
Machine Learning for Finance Master Class QuantUniversity
 
BlockChain_Chap3_RP _Consensus.pptx
BlockChain_Chap3_RP _Consensus.pptxBlockChain_Chap3_RP _Consensus.pptx
BlockChain_Chap3_RP _Consensus.pptxRajChauhan226834
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain appsCigniti Technologies Ltd
 
[2022.02] Umee blockchain - Final Report - Public(1).pdf
[2022.02] Umee blockchain - Final Report - Public(1).pdf[2022.02] Umee blockchain - Final Report - Public(1).pdf
[2022.02] Umee blockchain - Final Report - Public(1).pdfKennyNajarro2
 
[2022.02] umee blockchain final report - public
[2022.02] umee blockchain   final report - public[2022.02] umee blockchain   final report - public
[2022.02] umee blockchain final report - publicKennyNajarro2
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of BlockchainSota Watanabe
 
Accelerating the ML Lifecycle with an Enterprise-Grade Feature Store
Accelerating the ML Lifecycle with an Enterprise-Grade Feature StoreAccelerating the ML Lifecycle with an Enterprise-Grade Feature Store
Accelerating the ML Lifecycle with an Enterprise-Grade Feature StoreDatabricks
 

Similar to The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite (20)

Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101Nasscom Ahmedabad Demystifying blockchain 101
Nasscom Ahmedabad Demystifying blockchain 101
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdf
 
Blockchain in Practice, ETH Computational Social Science, Fall 2019
Blockchain in Practice, ETH Computational Social Science, Fall 2019Blockchain in Practice, ETH Computational Social Science, Fall 2019
Blockchain in Practice, ETH Computational Social Science, Fall 2019
 
Blockchain Fundamentals - Day 1 - Introduction (new style)
Blockchain Fundamentals - Day 1 - Introduction (new style)Blockchain Fundamentals - Day 1 - Introduction (new style)
Blockchain Fundamentals - Day 1 - Introduction (new style)
 
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 
從台積電看敏捷帶來的改變.pdf
從台積電看敏捷帶來的改變.pdf從台積電看敏捷帶來的改變.pdf
從台積電看敏捷帶來的改變.pdf
 
Anaconda and PyData Solutions
Anaconda and PyData SolutionsAnaconda and PyData Solutions
Anaconda and PyData Solutions
 
Introducing the world's first token engineering framework
Introducing the world's first token engineering frameworkIntroducing the world's first token engineering framework
Introducing the world's first token engineering framework
 
Blockchain Fundamentals - Day 3 - PoW consensus and ICOs (new style)
Blockchain Fundamentals - Day 3 -  PoW consensus and ICOs (new style)Blockchain Fundamentals - Day 3 -  PoW consensus and ICOs (new style)
Blockchain Fundamentals - Day 3 - PoW consensus and ICOs (new style)
 
Whats Next for Machine Learning
Whats Next for Machine LearningWhats Next for Machine Learning
Whats Next for Machine Learning
 
Blockchain, Cloud and DevOps
Blockchain, Cloud and DevOpsBlockchain, Cloud and DevOps
Blockchain, Cloud and DevOps
 
Machine Learning for Finance Master Class
Machine Learning for Finance Master Class Machine Learning for Finance Master Class
Machine Learning for Finance Master Class
 
BlockChain_Chap3_RP _Consensus.pptx
BlockChain_Chap3_RP _Consensus.pptxBlockChain_Chap3_RP _Consensus.pptx
BlockChain_Chap3_RP _Consensus.pptx
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps
 
[2022.02] Umee blockchain - Final Report - Public(1).pdf
[2022.02] Umee blockchain - Final Report - Public(1).pdf[2022.02] Umee blockchain - Final Report - Public(1).pdf
[2022.02] Umee blockchain - Final Report - Public(1).pdf
 
[2022.02] umee blockchain final report - public
[2022.02] umee blockchain   final report - public[2022.02] umee blockchain   final report - public
[2022.02] umee blockchain final report - public
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
Accelerating the ML Lifecycle with an Enterprise-Grade Feature Store
Accelerating the ML Lifecycle with an Enterprise-Grade Feature StoreAccelerating the ML Lifecycle with an Enterprise-Grade Feature Store
Accelerating the ML Lifecycle with an Enterprise-Grade Feature Store
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite

  • 1. Token Engineering “Show me the incentive and I’ll show you the outcome.” Charlie Munger
  • 2. Matt Lockyer Background Full Stack Developer Academia and University Lecturing Blockchain Solutions Consultant Currently Token Engineering Advisor - FansUnite.io Token Mechanism Team - Wireline.io Founder, Soloblock.solutions
  • 5. Types of Cryptoassets Cryptoassets Stores of Value (MV = PQ) Utility Tokens (?) Security Tokens (DCF) Work Tokens Burn & Mint Discount Tokens StablecoinsCrypto Collectible (NFT) Proof of Service Access Control Signalling & Curation Governance https://medium.com/paratii/on-the-immaturity-of-tokenized-value-capture-mechanisms-1fde33f2bc8e https://goo.gl/cPXpdX - Dimitri De Jonghe - Decentralized Web Summit - Token Engineering Community 5
  • 8. Define the problem 1. Why is this network protocol being built? a. What objective(s) is it optimizing and/or maximizing for? b. What problem(s), immediate and real world, is the network addressing? 2. Who are the stakeholders? a. What do they want? What type of people are they? What do they know? b. What can/do they provide? Is it money? Is it work? Ideas? Creativity? 3. How could a stakeholder / adversary attack the network? 8
  • 10. Evaluate mechanisms 1. Use a series of constraints and questions a. Does the mechanism broadly address the problem(s)? b. Define pass / fail criteria, codifying outcomes for completeness 2. Any open ended questions (likely)? a. Does any mechanism solve these questions i.e. close the loop? b. Are there any attacks on these mechanisms? 3. Does the mechanism have a balanced incentive model? 10
  • 11. Balanced Incentives - Bitcoin Example Intrinsic Subjective Positive Win block reward Belief: bitcoin is an amazing SOV that will change the world (increase in value) Negative Lose electricity $$$ Belief: attacking Bitcoin leads to fork making efforts worthless (decrease in value) 11
  • 13. Simulate, verify, design 1. Are we adequately supported with tooling? a. Simulation entrants - IncentiveAI, Consensys, ??? 2. Verification of subjective vs. objective goals a. Best restaurants in NYC vs. 2 + 2 = 4 3. Lacking intrinsic measures for creative economy a. Nothing at stake problem b. What is the value of a photograph NOT being licensed on a network? 13
  • 15. FansUnite - incentivize fans to provide accurate sports data 15