SlideShare a Scribd company logo
1 of 16
BLOCKCHAIN
DESIGNTECHNOLOGY BUSINESS
OVERVIEW
To familiarize ourselves with the potential implementations of blockchain
technology, we must explore the concept through three separate paradigms:
technology, business, and user experience. Bellow are questions whose answers
are integral to understanding and applying blockchain. We hope to answer through
graphic visualizations of conceptual systems
What is a distributed vs centralized ledger?
What is a blockchain?
How does it work?
How is it maintained?
How will blockchain inpact business
enterprise?
What businesses should adopt blockchain?
What are the advantages of switching to a
blockchain platform?
How can blockchain enterprise be integrated
to current systems?
What design opportunities does blockchain
open?
What constraints does it set?
How should an experience designed on
blockchain
look and feel?
Currently, most transaction computing is managed in a
centralized infrastructure, wherein all computing resources
reside in a primary data-center. The alternative to this is a
distributed ledger, in which components are located on individual,
networked computers.
Centralized Database
Internal and external reconciliation required
No restrictions
Single point of failure
Single point of control
Unnecessary gateways and middlemen
Cryptography must be added as afterthought
Backups must be set up manually
Distributed Ledger
Blocks are records of transactions whose content has
been pushed through a hash function. This hash function
creates a cybercriptic hash (a unique fingerprint) for that
file.
This hash is now assigned to the transaction
and is a direct result of the document’s content.
Because of this, no two hashes are the same.
transaction #1
e03fswe4
hash:
HASH FUNCTION
App Development
Patient records
Recordkeeping
(M
icro)paym
ents
Information Reliability
Home automation
Reputation management
Enables authenticity of a review
Digital identity
IT portal
Digitizing assets
Decentralized Internet and
computing resources
Company incorporations
Ride-sharing
Marketplace for sales and
purchases of digital assets:
Digitization of documents/contracts
Digital security trading
Valuable assets
Digital content:
Decentralized storage
Prediction platform
P2P transction
Digitizing assets
OPPORTUNITIES: CASES
App Development
Proof of ownership of modules in app development
Digital content:
Proof of ownership for digital content storage and delivery
Ride-sharing:
Points-based value transfer for ride-sharing
Digital security trading:
Ownership and transfer
Digitization of documents/contracts:
Digitization of documents/contracts and proof of ownership for transfers
Decentralized storage:
Decentralized storage using a network of computers on blockchain
Company incorporations:
Digitizing company incorporations, transfer of equity/ownership and governance
Decentralized Internet and computing resources:
Decentralized Internet and computing resources to cover every home and business
Home automation:
Platform to link the home network and electrical devices to the cloud
Digital identity:
Provides digital identity that protects consumer privacy
Escrow/custodian service:
Escrow/custodian service for the gaming industry; loan servicing and e-commerce
IT portal:
A smart contract IT portal executing order fulfillment in ecommerce/manufacturing
Patient records:
Decentralized patient records management
Digitizing assets:
Improves anti-counterfeit measures
Reputation management:
Helps users engage, share reputation and collect feedback
Prediction platform:
Decentralized prediction platform for the share markets, elections, etc.
Enables authenticity of a review:
Enables authenticity of a review through trustworthy endorsements for
employee peer reviews
Marketplace for sales and purchases of digital assets:
Proof of ownership and a marketplace for sales and purchases of digital assets
Valuable assets:
tracks and protects valuable assets throughout their lifetime journey
P2P transction:
Makes the transaction entire process easier and cheaper without mediator.
OPPORTUNITIES
There are considered opportunities for organizations that
adopt blockchain technology internally using bespoke
blockchains or so-called side-chains, which provide
some interoperability with public blockchains, like
Bitcoin. while adding new functionality. Perhaps the most
significant opportunity, though, comes from blockchains
that link currently disparate parts of one enterprise
together or even many different organizations from within
the same sector. -From Deloitte UK
Small Merchants
in lieu of cash
Steamlined
Bearer Instrument
Auditing
Data Ownership
+ Sales
Standardization
Personal Data
Supply Chain
IoT Logs
Copyright
Rent
Shipping
Music Distribution
Smart Contracts
Antifraud
Travel
Consensus
+Truth
Recordkeeping
(M
icro)paym
ents
Information Reliability
Blocks are connected in a chain to other blocks which each have
individual hashes. They hold this and the hash of the previous
block in the sequence.
transaction #1
e03fswe4
hash:
transaction #2
we832fw1
hash:
e03fswe4
previous:
transaction #3
ff94023a
hash:
we832fw1
previous:
HASH FUNCTION HASH FUNCTION
If any document is changed within the blockchain, it will produce
a new hash that will not correspond to what the subsequent
block had encrypted as the previous. This makes any apparent
tampering of documents immediately identifyable.
In this blockhain, the original file within a block have been altered
in some way. When pushed through the hash function, the
different data will generate a different hash. However, this new
hash does not correspond to what is indicated as the previous
hash on the next block. It is clear data was tampered with.
transaction #1
e03fswe4
hash:
transaction #2
we832fw1
hash:
e03fswe4
previous:
transaction #3
ff94023a
hash:
we832fw1
previous:
transaction #4
q129f2w1
hash:
ff94023a
previous:
transaction #5
f28h39fs
hash:
q129f2w1
previous:
transaction #6
bl90s8v
hash:
f28h39fs
previous:
transaction #1
e03fswe4
hash:
transaction #2
pp21ef8
hash:
e03fswe4
previous:
transaction #3
ff94023a
hash:
we832fw1
previous:
transaction #4
q129f2w1
hash:
ff94023a
previous:
transaction #5
f28h39fs
hash:
q129f2w1
previous:
transaction #6
bl90s8v
hash:
f28h39fs
previous:
we832fw1 == we832fw1
pp21ef8 != we832fw1
Within this blockchain, every hash corresponds to what is indicated as the
previous hash on the next block. The blockchain is valid.
HASH FUNCTION
This unique characteristic of the blockchain, in addition to the
distributed infrastructure, creates a system in which if one server
is fails, the system stays in tact, and if any document is altered, it
is immediately identifiable.
CAR LIFE CYCLE RECORD: BLOCKCHAIN SYSTEM
Blockchain
SUPPLY CHAIN
GOVERNMENT GOVERNMENT
PRODUCTION
Voitures
DEALERSHIP INSURANCE MAINTANENCE COLLISION
$
RESALE
This diagram shows how a blockchain system could keep a record
of each event along a vehicle’s life cycle. Each of these touch
points represents an need for interaction designers to create an
interface or system to facilitate the recording.
CAR LIFE CYCLE RECORD: BLOCKCHAIN SYSTEM
While the task in every touch point is to upload transaction
information onto the blockchain, the context, content, and
user will differ in each. This means each have unique design
considerations.
Blockchain
SUPPLY CHAIN PRODUCTION
Voitures
DEALERSHIP INSURANCE MAINTENANCE COLLISION
$
RESALE
User: worldwide parts manufacturers
Content: proof of part production
Context: shipping stage of manufacturing
User: car salesman
Content: proof of sale
Context: auto dealership facilities
User: service engineer
Content: proof servicing
Context: auto service facilities
User: used car salesman
Content: proof of sale
Context: used auto dealership platform
User: insurance company
Content: proof of sale
Context: insurance purchase platform
User: police officer
Content: evidence of collision
Context: on-the-scene location
User: car manufacturer
Content: vehicle certifications
Context: car manufacturing facilities
CUSTOMER
broken car
cost of parts*
cost of labor
request for parts
cost of parts*
parts
parts
labor
#1
#2
#1
#2
#1
#1
#2
The manufacturer and the mechanic both
receive the same record of the transaction
that occurred between them
The customer and the mechanic both receive
the same record of the transaction that
occurred between them
MECHANIC
MANUFACTURERMANUFACTURER #1
This diagram describes the current system of recording
transactions between a customer, mechanic, and manufacturer in
the process of servicing a car.
#1 #2
This diagram describes a system of recording transactions
between a customer, mechanic, and manufacturer in the process
of servicing a car through a blockchain platform.
request for parts
cost of parts*
parts
broken car
cost of parts*
cost of labor
parts
labor
CUSTOMER
The transaction between the manufacturer
and mechanic is recorded as a block within a
distributed ledger
the transaction between the mechanic and
the customer is recorded as the next block
in that ledger
#1
#2
MECHANIC
MANUFACTURER
*The blockchain platform, wherein one
transaction is built on top of the other,links
the data within the interactions and makes it
impossible for information from the previous
one to be altered.
The mechanic cannot alter the cost of
parts.
#1 #2
MUSIC SALE RECORD: BLOCKCHAIN SYSTEM
This diagram shows how a blockchain system could keep
a record of each event following the making and sales of
music. Each of these touch-points represents an need for
interaction designers to create an interface or system to
facilitate the recording.
Blockchain
Writing
tr acking ownership
preventing
theft
rough cuts recording t akes post produc tion distribution record sales
$
money f lo w
tr acking numbers
MUSIC SALE RECORD: CURRENT SYSTEM
This diagram describes the current system of tracking music
between the artists, producers, and the customers in the process
of writing and selling songs.
CUSTOMERS
money
contract
rights to the music
#1
#2
#1
#2
#1
#1
#2
the contract between writer and producer
ensures a strict record of what music gets
released and the copy-write of that music.
the customer and the producer both have a
receipt of the sale.
PRODUCER
MANUFACTURERWRITER #1
lyric and
composition
#1 #2
*because there are so many directions that
a song can travel once it leaves the hands of
the writer, there is a vast margin for
copy-write infringement, contract abuse
and illegal use of the song
MUSIC SALE RECORD: BLOCKCHAIN SYSTEM
This diagram describes a system of recording
transactions and tracking the journey of a song between
a writer, producer and customer in the process of writing
and selling songs.
contract
lyric and
composition
money
rights to the music
CUSTOMERS
the transaction between thewriter and
producer is recorded as a block within a
distributed ledger
the transaction between the producer and
the customer is recorded as the next block
in that ledger
#1
#2
PRODUCER
WRITER
*the blockchain platform, wherein one
transaction is built on top of the other,links
the data within the interactions and makes it
impossible for information from the previous
one to be altered.
Every transaction is recorded and linked to
the consumer – therefore preventing theft.
#1 #2

More Related Content

What's hot

Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
 
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Joel W. King
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...Ulf Mattsson
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsKaspersky
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupMaeva Ghonda
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCNizar Ben Neji
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...Cisco Canada
 
DevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKDevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKJoel W. King
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityNizar Ben Neji
 
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Edureka!
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™Katie Nickels
 

What's hot (20)

Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
Analytics for Application Security and Policy Enforcement in Cloud Managed Ne...
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
 
DevNet Study Group: Using a SDK
DevNet Study Group: Using a SDKDevNet Study Group: Using a SDK
DevNet Study Group: Using a SDK
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
 

Similar to Blockchain spreads

Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...
Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...
Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...Fluence.sh
 
computerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docxcomputerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docxmccormicknadine86
 
How Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain JigsawHow Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain JigsawCognizant
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainIRJET Journal
 
Blockchain in telecom industry
Blockchain in telecom industryBlockchain in telecom industry
Blockchain in telecom industryCeline George
 
IRJET- Different Blockchain Platforms and Algorithms
IRJET-  	  Different Blockchain Platforms and AlgorithmsIRJET-  	  Different Blockchain Platforms and Algorithms
IRJET- Different Blockchain Platforms and AlgorithmsIRJET Journal
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTURohit Verma
 
How Retirement Services Providers Can Tap Blockchain Thinking and Technology
How Retirement Services Providers Can Tap Blockchain Thinking and TechnologyHow Retirement Services Providers Can Tap Blockchain Thinking and Technology
How Retirement Services Providers Can Tap Blockchain Thinking and TechnologyCognizant
 
The Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C CarriersThe Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C CarriersCognizant
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on AzureNuri Cankaya
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Mike Nejad
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET Journal
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0Mujahid Hussain
 
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and EfficiencyTomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and EfficiencySusanna Harper
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfCustom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfJPLoft Solutions
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
A complete overview about the blockchain technology
  A complete overview about the blockchain technology   A complete overview about the blockchain technology
A complete overview about the blockchain technology Octal IT Solution
 

Similar to Blockchain spreads (20)

Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...
Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...
Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...
 
computerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docxcomputerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docx
 
How Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain JigsawHow Integrated Process Management Completes the Blockchain Jigsaw
How Integrated Process Management Completes the Blockchain Jigsaw
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain in telecom industry
Blockchain in telecom industryBlockchain in telecom industry
Blockchain in telecom industry
 
IRJET- Different Blockchain Platforms and Algorithms
IRJET-  	  Different Blockchain Platforms and AlgorithmsIRJET-  	  Different Blockchain Platforms and Algorithms
IRJET- Different Blockchain Platforms and Algorithms
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
How Retirement Services Providers Can Tap Blockchain Thinking and Technology
How Retirement Services Providers Can Tap Blockchain Thinking and TechnologyHow Retirement Services Providers Can Tap Blockchain Thinking and Technology
How Retirement Services Providers Can Tap Blockchain Thinking and Technology
 
The Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C CarriersThe Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C Carriers
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0
 
Blockchain in FinTech
Blockchain in FinTechBlockchain in FinTech
Blockchain in FinTech
 
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and EfficiencyTomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfCustom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
A complete overview about the blockchain technology
  A complete overview about the blockchain technology   A complete overview about the blockchain technology
A complete overview about the blockchain technology
 

Recently uploaded

Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
chapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendschapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendslemlemtesfaye192
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthShaheen Kumar
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 

Recently uploaded (20)

Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
chapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendschapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trends
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 

Blockchain spreads

  • 2. DESIGNTECHNOLOGY BUSINESS OVERVIEW To familiarize ourselves with the potential implementations of blockchain technology, we must explore the concept through three separate paradigms: technology, business, and user experience. Bellow are questions whose answers are integral to understanding and applying blockchain. We hope to answer through graphic visualizations of conceptual systems What is a distributed vs centralized ledger? What is a blockchain? How does it work? How is it maintained? How will blockchain inpact business enterprise? What businesses should adopt blockchain? What are the advantages of switching to a blockchain platform? How can blockchain enterprise be integrated to current systems? What design opportunities does blockchain open? What constraints does it set? How should an experience designed on blockchain look and feel?
  • 3. Currently, most transaction computing is managed in a centralized infrastructure, wherein all computing resources reside in a primary data-center. The alternative to this is a distributed ledger, in which components are located on individual, networked computers. Centralized Database Internal and external reconciliation required No restrictions Single point of failure Single point of control Unnecessary gateways and middlemen Cryptography must be added as afterthought Backups must be set up manually Distributed Ledger
  • 4. Blocks are records of transactions whose content has been pushed through a hash function. This hash function creates a cybercriptic hash (a unique fingerprint) for that file. This hash is now assigned to the transaction and is a direct result of the document’s content. Because of this, no two hashes are the same. transaction #1 e03fswe4 hash: HASH FUNCTION
  • 5. App Development Patient records Recordkeeping (M icro)paym ents Information Reliability Home automation Reputation management Enables authenticity of a review Digital identity IT portal Digitizing assets Decentralized Internet and computing resources Company incorporations Ride-sharing Marketplace for sales and purchases of digital assets: Digitization of documents/contracts Digital security trading Valuable assets Digital content: Decentralized storage Prediction platform P2P transction Digitizing assets OPPORTUNITIES: CASES App Development Proof of ownership of modules in app development Digital content: Proof of ownership for digital content storage and delivery Ride-sharing: Points-based value transfer for ride-sharing Digital security trading: Ownership and transfer Digitization of documents/contracts: Digitization of documents/contracts and proof of ownership for transfers Decentralized storage: Decentralized storage using a network of computers on blockchain Company incorporations: Digitizing company incorporations, transfer of equity/ownership and governance Decentralized Internet and computing resources: Decentralized Internet and computing resources to cover every home and business Home automation: Platform to link the home network and electrical devices to the cloud Digital identity: Provides digital identity that protects consumer privacy Escrow/custodian service: Escrow/custodian service for the gaming industry; loan servicing and e-commerce IT portal: A smart contract IT portal executing order fulfillment in ecommerce/manufacturing Patient records: Decentralized patient records management Digitizing assets: Improves anti-counterfeit measures Reputation management: Helps users engage, share reputation and collect feedback Prediction platform: Decentralized prediction platform for the share markets, elections, etc. Enables authenticity of a review: Enables authenticity of a review through trustworthy endorsements for employee peer reviews Marketplace for sales and purchases of digital assets: Proof of ownership and a marketplace for sales and purchases of digital assets Valuable assets: tracks and protects valuable assets throughout their lifetime journey P2P transction: Makes the transaction entire process easier and cheaper without mediator.
  • 6. OPPORTUNITIES There are considered opportunities for organizations that adopt blockchain technology internally using bespoke blockchains or so-called side-chains, which provide some interoperability with public blockchains, like Bitcoin. while adding new functionality. Perhaps the most significant opportunity, though, comes from blockchains that link currently disparate parts of one enterprise together or even many different organizations from within the same sector. -From Deloitte UK Small Merchants in lieu of cash Steamlined Bearer Instrument Auditing Data Ownership + Sales Standardization Personal Data Supply Chain IoT Logs Copyright Rent Shipping Music Distribution Smart Contracts Antifraud Travel Consensus +Truth Recordkeeping (M icro)paym ents Information Reliability
  • 7. Blocks are connected in a chain to other blocks which each have individual hashes. They hold this and the hash of the previous block in the sequence. transaction #1 e03fswe4 hash: transaction #2 we832fw1 hash: e03fswe4 previous: transaction #3 ff94023a hash: we832fw1 previous: HASH FUNCTION HASH FUNCTION
  • 8. If any document is changed within the blockchain, it will produce a new hash that will not correspond to what the subsequent block had encrypted as the previous. This makes any apparent tampering of documents immediately identifyable. In this blockhain, the original file within a block have been altered in some way. When pushed through the hash function, the different data will generate a different hash. However, this new hash does not correspond to what is indicated as the previous hash on the next block. It is clear data was tampered with. transaction #1 e03fswe4 hash: transaction #2 we832fw1 hash: e03fswe4 previous: transaction #3 ff94023a hash: we832fw1 previous: transaction #4 q129f2w1 hash: ff94023a previous: transaction #5 f28h39fs hash: q129f2w1 previous: transaction #6 bl90s8v hash: f28h39fs previous: transaction #1 e03fswe4 hash: transaction #2 pp21ef8 hash: e03fswe4 previous: transaction #3 ff94023a hash: we832fw1 previous: transaction #4 q129f2w1 hash: ff94023a previous: transaction #5 f28h39fs hash: q129f2w1 previous: transaction #6 bl90s8v hash: f28h39fs previous: we832fw1 == we832fw1 pp21ef8 != we832fw1 Within this blockchain, every hash corresponds to what is indicated as the previous hash on the next block. The blockchain is valid. HASH FUNCTION
  • 9. This unique characteristic of the blockchain, in addition to the distributed infrastructure, creates a system in which if one server is fails, the system stays in tact, and if any document is altered, it is immediately identifiable.
  • 10. CAR LIFE CYCLE RECORD: BLOCKCHAIN SYSTEM Blockchain SUPPLY CHAIN GOVERNMENT GOVERNMENT PRODUCTION Voitures DEALERSHIP INSURANCE MAINTANENCE COLLISION $ RESALE This diagram shows how a blockchain system could keep a record of each event along a vehicle’s life cycle. Each of these touch points represents an need for interaction designers to create an interface or system to facilitate the recording.
  • 11. CAR LIFE CYCLE RECORD: BLOCKCHAIN SYSTEM While the task in every touch point is to upload transaction information onto the blockchain, the context, content, and user will differ in each. This means each have unique design considerations. Blockchain SUPPLY CHAIN PRODUCTION Voitures DEALERSHIP INSURANCE MAINTENANCE COLLISION $ RESALE User: worldwide parts manufacturers Content: proof of part production Context: shipping stage of manufacturing User: car salesman Content: proof of sale Context: auto dealership facilities User: service engineer Content: proof servicing Context: auto service facilities User: used car salesman Content: proof of sale Context: used auto dealership platform User: insurance company Content: proof of sale Context: insurance purchase platform User: police officer Content: evidence of collision Context: on-the-scene location User: car manufacturer Content: vehicle certifications Context: car manufacturing facilities
  • 12. CUSTOMER broken car cost of parts* cost of labor request for parts cost of parts* parts parts labor #1 #2 #1 #2 #1 #1 #2 The manufacturer and the mechanic both receive the same record of the transaction that occurred between them The customer and the mechanic both receive the same record of the transaction that occurred between them MECHANIC MANUFACTURERMANUFACTURER #1 This diagram describes the current system of recording transactions between a customer, mechanic, and manufacturer in the process of servicing a car. #1 #2
  • 13. This diagram describes a system of recording transactions between a customer, mechanic, and manufacturer in the process of servicing a car through a blockchain platform. request for parts cost of parts* parts broken car cost of parts* cost of labor parts labor CUSTOMER The transaction between the manufacturer and mechanic is recorded as a block within a distributed ledger the transaction between the mechanic and the customer is recorded as the next block in that ledger #1 #2 MECHANIC MANUFACTURER *The blockchain platform, wherein one transaction is built on top of the other,links the data within the interactions and makes it impossible for information from the previous one to be altered. The mechanic cannot alter the cost of parts. #1 #2
  • 14. MUSIC SALE RECORD: BLOCKCHAIN SYSTEM This diagram shows how a blockchain system could keep a record of each event following the making and sales of music. Each of these touch-points represents an need for interaction designers to create an interface or system to facilitate the recording. Blockchain Writing tr acking ownership preventing theft rough cuts recording t akes post produc tion distribution record sales $ money f lo w tr acking numbers
  • 15. MUSIC SALE RECORD: CURRENT SYSTEM This diagram describes the current system of tracking music between the artists, producers, and the customers in the process of writing and selling songs. CUSTOMERS money contract rights to the music #1 #2 #1 #2 #1 #1 #2 the contract between writer and producer ensures a strict record of what music gets released and the copy-write of that music. the customer and the producer both have a receipt of the sale. PRODUCER MANUFACTURERWRITER #1 lyric and composition #1 #2 *because there are so many directions that a song can travel once it leaves the hands of the writer, there is a vast margin for copy-write infringement, contract abuse and illegal use of the song
  • 16. MUSIC SALE RECORD: BLOCKCHAIN SYSTEM This diagram describes a system of recording transactions and tracking the journey of a song between a writer, producer and customer in the process of writing and selling songs. contract lyric and composition money rights to the music CUSTOMERS the transaction between thewriter and producer is recorded as a block within a distributed ledger the transaction between the producer and the customer is recorded as the next block in that ledger #1 #2 PRODUCER WRITER *the blockchain platform, wherein one transaction is built on top of the other,links the data within the interactions and makes it impossible for information from the previous one to be altered. Every transaction is recorded and linked to the consumer – therefore preventing theft. #1 #2