SlideShare a Scribd company logo
1 of 51
Introduction to
Blockchain Technology
Lesson One Fundamentals
By: Professor Lili Saghafi
proflilisaghafi@gmail.com
@Lili_PLS
Rights Reserved @PLS 2
Learning Objectives
• By the end of this lesson, you should be
able to:
– Discuss about blockchain, its characteristics and uses.
– Discuss about the roles and users in a blockchain.
– Explain how blockchain is using cryptography.
– Discuss about public and private blockchains:
differences, advantages/disadvantages, use cases.
– Explain what consensus is and why consensus is
needed in a blockchain.
Rights Reserved @PLS 3
Rights Reserved @PLS 4
Learning Outcomes
• By the end of this section, you should be
able to:
– Explain the concept of blockchain.
– Discuss the importance of blockchain.
– Understand how bitcoin is using blockchain.
Rights Reserved @PLS 5
What Is Blockchain?
• There's a new technology that has the power to
revolutionize how you, businesses, and the
world interact!
• Hearing the word "blockchain" is comparable to
hearing the word "internet" in the early 90s.
• more than 20 years later. Think about how the
Internet has transformed businesses, commerce,
communication, even music and video.
• The next technology to have that kind of impact
isn't some of the buzzwords you hear.It's not big
data. It's not artificial intelligence. It's not even
social media. It's BLOCKCHAIN!
Rights Reserved @PLS 6
Blockchain promises
• blockchain has vast promises for every
business, every society, and for everyone
listening today.
Rights Reserved @PLS 7
Rights Reserved @PLS 8
Example
• When you attach a file, a Word document, an
Excel sheet, a PDF to an email, you aren't
sending an original.
• You are actually sending the recipient a copy,
and that's a great way to move information
around.
• But it's not so great when it comes to things like
money, stocks and bonds, music, loyalty points,
intellectual property, tickets to a game or
concert. Then, sending a copy is suddenly a
very bad idea.
Rights Reserved @PLS 9
Example
• If I send you tickets to a concert, it's important
that I don't send you a copy.
• You now own the original asset and I can no
longer use or sell those tickets.
• Similarly, if I send you $100, it's important that I
still don't own the $100, or have the ability to
send it to anyone else.
• Both of these examples illustrate a double spend
problem, and those can be eliminated with
blockchain.
Rights Reserved @PLS 10
Rights Reserved @PLS 11
Outcome
• So now every kind of asset, from tickets,
to money, to music, can be stored, moved,
exchanged, and transacted without an
intermediary.
• People everywhere can transact peer-to-
peer and trust each other by using
collaboration and cryptography.
Rights Reserved @PLS 12
Rights Reserved @PLS 13
How did we get here
• It began when Satoshi Nakamoto, whose true
identity is still unknown, released a white paper
in 2008, introducing a purely peer-to-peer
version of electronic cash known as Bitcoin.
• It is here that blockchain technology made its
first appearance .
• Even today people believe Bitcoin and
blockchain are one and the same.
• They are not!
Rights Reserved @PLS 14
Rights Reserved @PLS 15
• Bitcoin is not Blockchain
• Blockchain has Far-Reaching Importance
for Many Networked Electronic Systems
Including IoT Devices
Rights Reserved @PLS 16
Bitcoin
• Bitcoin, another alternative currency,
utilize blockchain technology.
• While an important one, Bitcoin is only one
use case for blockchain.
• Blockchain allows people to exchange
assets and perform transactions without a
third party.
Rights Reserved @PLS 17
public uses for blockchain (exp.
Bitcoins )
• There’s a significant difference between
public uses for blockchain (think Bitcoin
and Etherium) and private uses.
• When public use is involved, anyone can
access the blockchain ledger and will see
every transaction on the network.
• That’s supposed to be part of the
attraction for these crypto-currencies.
• There’s a downside too.
Rights Reserved @PLS 18
public uses for blockchain (exp.
Bitcoins )
• Because these public uses are based on
public/private crypto-key technology, if you
lose your private key, you lose access to
all of your crypto-currency.
• It’s an anonymous network, so no one can
get your key back for you.
• Imagine running your bank account that
way.
Rights Reserved @PLS 19
Private uses for blockchain
• For private uses of blockchain, entities
must be invited to participate in the
network.
• Others are barred by strong cryptography
and crypto-key technology.
• Everyone participating in a private
blockchain network is known, at least to
the entity running the network.
Rights Reserved @PLS 20
Private uses for blockchain
• So use of the blockchain distributed ledger
is more like today’s accounting systems,
but with highly networked, distributed
ledger systems.
Rights Reserved @PLS 21
Example : Diamonds
• A blockchain ledger is nothing more than a
historical record of all transactions related
to a resource.
• Take diamonds for example.
• A diamond is mined, sorted, cut, polished,
boxed, mounted in a setting, sold, and
resold.
Rights Reserved @PLS 22
Example : Diamonds
• There are transportation events taking
place between many of these events.
Diamonds are valuable enough and
unique enough to track.
• In a private blockchain network for tracking
diamonds, every party in the network will
have the same blockchain ledger that
accounts for the diamonds at each stage.
Rights Reserved @PLS 23
Example: Food
• Another example is food. Whether it’s beef
or leaf lettuce, there have been food
scares and recalls.
• Instead of mass recalls, a blockchain
ledger system to track beef or vegetables
from grower to processor, to distributor, to
retailer, to restaurant or end customer
would allow targeted recalls to occur
quickly.
Rights Reserved @PLS 24
Example: Food
• Blockchain technology would also permit
investigators to determine why the food
was spoiled.
• For example, did the truck carrying the
food from one point to another maintain
the food at the proper temperature during
the entire trip?
Rights Reserved @PLS 25
Example: Food
• A blockchain ledger system creates a
master database that can be readily
queried to access that sort of information.
• It’s one short hop from this blockchain
scenario to one where the blockchain
ledger is partially or fully informed by a
swarm of IoT devices distributed
worldwide.
Rights Reserved @PLS 26
Example : Container Shipping
• Someone, somewhere fills a container with
metals, sliced granite, toys, car parts, tools, or
electronics.
• The container then goes on a truck to a port
where it’s loaded onto a ship, sent to some
intermediate port where it might be loaded onto
another ship, and then sent to a final destination
port where the container is unloaded, stacked
for a while, loaded onto a truck, sent on to its
final destination, and finally unloaded.
Rights Reserved @PLS 27
Example : Container Shipping
• There’s a lot of tracking involved in these
operations conducted by multiple entities,
and, consequently, there’s plenty of
opportunity for shrinkage, damage,
spillage, or spoilage.
Rights Reserved @PLS 28
Example : Container Shipping
• This is precisely the reason that cargo
carrier Pacific International Lines (PIL),
terminal operator PSA International (PSA,
based in Singapore), and IBM recently
conducted a pilot exercise based on IBM’s
Blockchain Platform —to investigate how
such a system might perform even at this
early stage in blockchain’s development.
Rights Reserved @PLS 29
McKinsey graph of all the commercial,
business, and government sectors that will
be affected by blockchain
Rights Reserved @PLS 30
Blockchain ledger runs on
Mainframe computers
• Blockchain ledgering simply doesn’t work
without the cloud and, in ibm’s case, it
runs on a mainframe.
• Mainframe computers provide the highest
level of security for blockchain
transactions.
Rights Reserved @PLS 31
No need for central authorities
• While traditionally we have needed central
authorities to trust one another and fulfill
contracts,
• blockchain makes it possible to have our
peers guarantee that for us.
Rights Reserved @PLS 32
“Crypto Anchor Verifier”
• IBM has developed something it calls the “Crypto Anchor
Verifier.”
• The Crypto Anchor Verifier uses a special lens attached
to a mobile phone to capture microscopic details of an
object’s surface, including optical characteristics such as
shape, viscosity, saturation value, and spectral values.
• These images go into the blockchain ledger with
everything else and can be used to verify that the object
that went into a container is the same object that came
out of the container.
• Now there’s a technology that’s ripe for development.
Rights Reserved @PLS 33
Preference
• We might want to prefers private blockchain
networks because the chances of someone
misbehaving in such a network is much less
than for the public networks that deal with
crypto-currency.
• Considering its reach, it’s highly unlikely that
something you’re doing won’t be touched by
blockchain technology.
• It solves multi-user database problems that we
have been trying to solve for decades.
Rights Reserved @PLS 34
How Blockchain Works
• Assets, like we've discussed, are no
longer stored in a central place, but
distributed across a global ledger, using
the highest level of cryptography.
• When a transaction is conducted, it's
posted across tens of thousands of
computers around the globe.
• These transactions are recorded as
blocks.
Rights Reserved @PLS 35
Rights Reserved @PLS 36
How it works
• Let's imagine a sheet of paper that has 25 lines.
• When a sheet is filled up with 25 transactions,
the block is validated via group consensus.
• Once the page has been validated, it is added to
a stack of previously validated sheets.
• Each sheet on the stack can be assumed to be
trustworthy because, once a sheet is validated, it
can't be changed.
• Because at this point, all the sheets are linked
together.
Rights Reserved @PLS 37
How it works
• And to link our sheets together, we embed
information from the previous sheet of paper into
the new, recently validated sheet.
• In blockchain, our sheet of paper is equal to a
block.
• The act of embedding a previous block of
information into the current block of information
is called chaining, hence, the name blockchain.
Rights Reserved @PLS 38
Rights Reserved @PLS 39
How it works
• In order to compromise or hack a
blockchain network, someone would have
to gain control of the majority of computers
in that network.
• This is extremely difficult to do.
• There is no longer a single point of failure,
and this is what makes blockchain
infinitely more secure than what we have
today.
Rights Reserved @PLS 40
Rights Reserved @PLS 41
Other use example : Contracts
• Blockchain isn't just for assets, though.
• It extends to contracts.
• These are called Smart Contracts.
• A smart contract self-executes and handles
enforcement, the management, and
performance of agreements between people.
• Examples of smart contracts include insurance
policies, copyrighted content, escrow and
lending, wills, and trusts.
• Smart contracts will revolutionize how we do
business.
Rights Reserved @PLS 42
Rights Reserved @PLS 43
Other use
• There are so many possibilities with
blockchain; not just in the now, but with
things we haven't begun to think about yet.
Rights Reserved @PLS 44
In summary
Rights Reserved @PLS 46
Rights Reserved @PLS 47
Comparing Blockchain to the
Early Internet
• When the internet first came along, we had no
idea how it would forever change our lives.
• From smart phones and text messages to
streaming movies and FaceTime visits with
loved ones, no one knew the ways the world
would change with the invention of the Internet.
• We are currently in the early phases of
blockchain and there is much potential yet to be
unlocked.
Rights Reserved @PLS 48
Comparing Blockchain to the
Early Internet
Rights Reserved @PLS 49
Blockchain Is NOT Bitcoin
• Bitcoin is transacted over an open, public,
anonymous blockchain network.
• Bitcoin and cryptocurrencies are great use
cases for blockchain, but there are many
more use cases that utilize blockchain
technology.
Rights Reserved @PLS 50
Blockchain Is NOT Bitcoin
Introduction to
Blockchain Technology
Lesson One Fundamentals
By: Professor Lili Saghafi
proflilisaghafi@gmail.com
@Lili_PLS

More Related Content

Similar to Intro to Blockchain Fundamentals (39

What is blockchain public
What is blockchain   publicWhat is blockchain   public
What is blockchain publicScott Wilkinson
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainKrzysztof Bury
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - BlockchainJoel Binn
 
IP Considerations for Blockchain Technology
IP Considerations for Blockchain TechnologyIP Considerations for Blockchain Technology
IP Considerations for Blockchain TechnologyNelson Rosario
 
Blockchain Technology for Public and Commercial Libraries
Blockchain Technology for Public and Commercial LibrariesBlockchain Technology for Public and Commercial Libraries
Blockchain Technology for Public and Commercial LibrariesDavid Nzoputa Ofili
 
The deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalThe deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalDavid Lee Kuo Chuen 李国权
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCZeyad T. Al Mudhaf
 
Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Rajeev Soni
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare Alex Tsado
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxmeena466141
 
Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620Blokcert
 
C13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptxC13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptxhaifaazka
 

Similar to Intro to Blockchain Fundamentals (39 (20)

module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
 
What is blockchain public
What is blockchain   publicWhat is blockchain   public
What is blockchain public
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - Blockchain
 
IP Considerations for Blockchain Technology
IP Considerations for Blockchain TechnologyIP Considerations for Blockchain Technology
IP Considerations for Blockchain Technology
 
Blockchain Technology for Public and Commercial Libraries
Blockchain Technology for Public and Commercial LibrariesBlockchain Technology for Public and Commercial Libraries
Blockchain Technology for Public and Commercial Libraries
 
The deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 finalThe deep skill of blockchain david lee 27_april2017 final
The deep skill of blockchain david lee 27_april2017 final
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
 
Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)
 
Block Chain technology.pptx
Block Chain technology.pptxBlock Chain technology.pptx
Block Chain technology.pptx
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
dfgsdjghkjsdhfg.pptx
dfgsdjghkjsdhfg.pptxdfgsdjghkjsdhfg.pptx
dfgsdjghkjsdhfg.pptx
 
Blockchain and Hook model of engagement
Blockchain and Hook model of engagement Blockchain and Hook model of engagement
Blockchain and Hook model of engagement
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare
 
Blockchain
BlockchainBlockchain
Blockchain
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 
Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620
 
C13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptxC13_blockchain introduction public (1).pptx
C13_blockchain introduction public (1).pptx
 

More from Professor Lili Saghafi

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili SaghafiProfessor Lili Saghafi
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsProfessor Lili Saghafi
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiProfessor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Professor Lili Saghafi
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Professor Lili Saghafi
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Professor Lili Saghafi
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiProfessor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiProfessor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiProfessor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiProfessor Lili Saghafi
 
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi Professor Lili Saghafi
 

More from Professor Lili Saghafi (20)

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Ai
AiAi
Ai
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: Fundamentals
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili Saghafi
 
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
 
Quick Sort By Prof Lili Saghafi
Quick Sort By Prof Lili SaghafiQuick Sort By Prof Lili Saghafi
Quick Sort By Prof Lili Saghafi
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Intro to Blockchain Fundamentals (39

  • 1. Introduction to Blockchain Technology Lesson One Fundamentals By: Professor Lili Saghafi proflilisaghafi@gmail.com @Lili_PLS
  • 2. Rights Reserved @PLS 2 Learning Objectives • By the end of this lesson, you should be able to: – Discuss about blockchain, its characteristics and uses. – Discuss about the roles and users in a blockchain. – Explain how blockchain is using cryptography. – Discuss about public and private blockchains: differences, advantages/disadvantages, use cases. – Explain what consensus is and why consensus is needed in a blockchain.
  • 4. Rights Reserved @PLS 4 Learning Outcomes • By the end of this section, you should be able to: – Explain the concept of blockchain. – Discuss the importance of blockchain. – Understand how bitcoin is using blockchain.
  • 5. Rights Reserved @PLS 5 What Is Blockchain? • There's a new technology that has the power to revolutionize how you, businesses, and the world interact! • Hearing the word "blockchain" is comparable to hearing the word "internet" in the early 90s. • more than 20 years later. Think about how the Internet has transformed businesses, commerce, communication, even music and video. • The next technology to have that kind of impact isn't some of the buzzwords you hear.It's not big data. It's not artificial intelligence. It's not even social media. It's BLOCKCHAIN!
  • 6. Rights Reserved @PLS 6 Blockchain promises • blockchain has vast promises for every business, every society, and for everyone listening today.
  • 8. Rights Reserved @PLS 8 Example • When you attach a file, a Word document, an Excel sheet, a PDF to an email, you aren't sending an original. • You are actually sending the recipient a copy, and that's a great way to move information around. • But it's not so great when it comes to things like money, stocks and bonds, music, loyalty points, intellectual property, tickets to a game or concert. Then, sending a copy is suddenly a very bad idea.
  • 9. Rights Reserved @PLS 9 Example • If I send you tickets to a concert, it's important that I don't send you a copy. • You now own the original asset and I can no longer use or sell those tickets. • Similarly, if I send you $100, it's important that I still don't own the $100, or have the ability to send it to anyone else. • Both of these examples illustrate a double spend problem, and those can be eliminated with blockchain.
  • 11. Rights Reserved @PLS 11 Outcome • So now every kind of asset, from tickets, to money, to music, can be stored, moved, exchanged, and transacted without an intermediary. • People everywhere can transact peer-to- peer and trust each other by using collaboration and cryptography.
  • 13. Rights Reserved @PLS 13 How did we get here • It began when Satoshi Nakamoto, whose true identity is still unknown, released a white paper in 2008, introducing a purely peer-to-peer version of electronic cash known as Bitcoin. • It is here that blockchain technology made its first appearance . • Even today people believe Bitcoin and blockchain are one and the same. • They are not!
  • 15. Rights Reserved @PLS 15 • Bitcoin is not Blockchain • Blockchain has Far-Reaching Importance for Many Networked Electronic Systems Including IoT Devices
  • 16. Rights Reserved @PLS 16 Bitcoin • Bitcoin, another alternative currency, utilize blockchain technology. • While an important one, Bitcoin is only one use case for blockchain. • Blockchain allows people to exchange assets and perform transactions without a third party.
  • 17. Rights Reserved @PLS 17 public uses for blockchain (exp. Bitcoins ) • There’s a significant difference between public uses for blockchain (think Bitcoin and Etherium) and private uses. • When public use is involved, anyone can access the blockchain ledger and will see every transaction on the network. • That’s supposed to be part of the attraction for these crypto-currencies. • There’s a downside too.
  • 18. Rights Reserved @PLS 18 public uses for blockchain (exp. Bitcoins ) • Because these public uses are based on public/private crypto-key technology, if you lose your private key, you lose access to all of your crypto-currency. • It’s an anonymous network, so no one can get your key back for you. • Imagine running your bank account that way.
  • 19. Rights Reserved @PLS 19 Private uses for blockchain • For private uses of blockchain, entities must be invited to participate in the network. • Others are barred by strong cryptography and crypto-key technology. • Everyone participating in a private blockchain network is known, at least to the entity running the network.
  • 20. Rights Reserved @PLS 20 Private uses for blockchain • So use of the blockchain distributed ledger is more like today’s accounting systems, but with highly networked, distributed ledger systems.
  • 21. Rights Reserved @PLS 21 Example : Diamonds • A blockchain ledger is nothing more than a historical record of all transactions related to a resource. • Take diamonds for example. • A diamond is mined, sorted, cut, polished, boxed, mounted in a setting, sold, and resold.
  • 22. Rights Reserved @PLS 22 Example : Diamonds • There are transportation events taking place between many of these events. Diamonds are valuable enough and unique enough to track. • In a private blockchain network for tracking diamonds, every party in the network will have the same blockchain ledger that accounts for the diamonds at each stage.
  • 23. Rights Reserved @PLS 23 Example: Food • Another example is food. Whether it’s beef or leaf lettuce, there have been food scares and recalls. • Instead of mass recalls, a blockchain ledger system to track beef or vegetables from grower to processor, to distributor, to retailer, to restaurant or end customer would allow targeted recalls to occur quickly.
  • 24. Rights Reserved @PLS 24 Example: Food • Blockchain technology would also permit investigators to determine why the food was spoiled. • For example, did the truck carrying the food from one point to another maintain the food at the proper temperature during the entire trip?
  • 25. Rights Reserved @PLS 25 Example: Food • A blockchain ledger system creates a master database that can be readily queried to access that sort of information. • It’s one short hop from this blockchain scenario to one where the blockchain ledger is partially or fully informed by a swarm of IoT devices distributed worldwide.
  • 26. Rights Reserved @PLS 26 Example : Container Shipping • Someone, somewhere fills a container with metals, sliced granite, toys, car parts, tools, or electronics. • The container then goes on a truck to a port where it’s loaded onto a ship, sent to some intermediate port where it might be loaded onto another ship, and then sent to a final destination port where the container is unloaded, stacked for a while, loaded onto a truck, sent on to its final destination, and finally unloaded.
  • 27. Rights Reserved @PLS 27 Example : Container Shipping • There’s a lot of tracking involved in these operations conducted by multiple entities, and, consequently, there’s plenty of opportunity for shrinkage, damage, spillage, or spoilage.
  • 28. Rights Reserved @PLS 28 Example : Container Shipping • This is precisely the reason that cargo carrier Pacific International Lines (PIL), terminal operator PSA International (PSA, based in Singapore), and IBM recently conducted a pilot exercise based on IBM’s Blockchain Platform —to investigate how such a system might perform even at this early stage in blockchain’s development.
  • 29. Rights Reserved @PLS 29 McKinsey graph of all the commercial, business, and government sectors that will be affected by blockchain
  • 30. Rights Reserved @PLS 30 Blockchain ledger runs on Mainframe computers • Blockchain ledgering simply doesn’t work without the cloud and, in ibm’s case, it runs on a mainframe. • Mainframe computers provide the highest level of security for blockchain transactions.
  • 31. Rights Reserved @PLS 31 No need for central authorities • While traditionally we have needed central authorities to trust one another and fulfill contracts, • blockchain makes it possible to have our peers guarantee that for us.
  • 32. Rights Reserved @PLS 32 “Crypto Anchor Verifier” • IBM has developed something it calls the “Crypto Anchor Verifier.” • The Crypto Anchor Verifier uses a special lens attached to a mobile phone to capture microscopic details of an object’s surface, including optical characteristics such as shape, viscosity, saturation value, and spectral values. • These images go into the blockchain ledger with everything else and can be used to verify that the object that went into a container is the same object that came out of the container. • Now there’s a technology that’s ripe for development.
  • 33. Rights Reserved @PLS 33 Preference • We might want to prefers private blockchain networks because the chances of someone misbehaving in such a network is much less than for the public networks that deal with crypto-currency. • Considering its reach, it’s highly unlikely that something you’re doing won’t be touched by blockchain technology. • It solves multi-user database problems that we have been trying to solve for decades.
  • 34. Rights Reserved @PLS 34 How Blockchain Works • Assets, like we've discussed, are no longer stored in a central place, but distributed across a global ledger, using the highest level of cryptography. • When a transaction is conducted, it's posted across tens of thousands of computers around the globe. • These transactions are recorded as blocks.
  • 36. Rights Reserved @PLS 36 How it works • Let's imagine a sheet of paper that has 25 lines. • When a sheet is filled up with 25 transactions, the block is validated via group consensus. • Once the page has been validated, it is added to a stack of previously validated sheets. • Each sheet on the stack can be assumed to be trustworthy because, once a sheet is validated, it can't be changed. • Because at this point, all the sheets are linked together.
  • 37. Rights Reserved @PLS 37 How it works • And to link our sheets together, we embed information from the previous sheet of paper into the new, recently validated sheet. • In blockchain, our sheet of paper is equal to a block. • The act of embedding a previous block of information into the current block of information is called chaining, hence, the name blockchain.
  • 39. Rights Reserved @PLS 39 How it works • In order to compromise or hack a blockchain network, someone would have to gain control of the majority of computers in that network. • This is extremely difficult to do. • There is no longer a single point of failure, and this is what makes blockchain infinitely more secure than what we have today.
  • 41. Rights Reserved @PLS 41 Other use example : Contracts • Blockchain isn't just for assets, though. • It extends to contracts. • These are called Smart Contracts. • A smart contract self-executes and handles enforcement, the management, and performance of agreements between people. • Examples of smart contracts include insurance policies, copyrighted content, escrow and lending, wills, and trusts. • Smart contracts will revolutionize how we do business.
  • 43. Rights Reserved @PLS 43 Other use • There are so many possibilities with blockchain; not just in the now, but with things we haven't begun to think about yet.
  • 47. Rights Reserved @PLS 47 Comparing Blockchain to the Early Internet • When the internet first came along, we had no idea how it would forever change our lives. • From smart phones and text messages to streaming movies and FaceTime visits with loved ones, no one knew the ways the world would change with the invention of the Internet. • We are currently in the early phases of blockchain and there is much potential yet to be unlocked.
  • 48. Rights Reserved @PLS 48 Comparing Blockchain to the Early Internet
  • 49. Rights Reserved @PLS 49 Blockchain Is NOT Bitcoin • Bitcoin is transacted over an open, public, anonymous blockchain network. • Bitcoin and cryptocurrencies are great use cases for blockchain, but there are many more use cases that utilize blockchain technology.
  • 50. Rights Reserved @PLS 50 Blockchain Is NOT Bitcoin
  • 51. Introduction to Blockchain Technology Lesson One Fundamentals By: Professor Lili Saghafi proflilisaghafi@gmail.com @Lili_PLS