Introducción de Alberto Gómez al protocolo de Bitcoin y al lenguaje Bitcoin Scripting, el cual permite desarrollar características y comportamiento sobre el dinero y las transferencias de valor.
Intro. to Lightning Network (Bitcoin/Litecoin) - Blockchain Developers MalaysiaTM Lee
Introduction to Lightning Network for Bitcoin and Litecoin presented at the first Blockchain Developers Malaysia meetup by TM Lee, co-founder of https://www.coingecko.com
Presented images cited from BitcoinMagazine and Lightning Network Slide Decks
The presentation slides for a blockchain event - All About TenX Cryptopayment Technology, Lightning Network & Bitcoin Mining.
Presenter: Sun Sagong
Venue: Tenx (Singapore)
Date: 07Feb2018
Everybody nowadays talks about the blockchain and how it could empower a new and incredible range of applications. But what it's stored inside a block and what is suitable for?
What is worth to store in and what is better to store outside?
In this webinar, we will take a look at Bitcoin and Ethereum blockchains, and read some blocks and transactions using a mix open-source libraries and web-based explorers.
Discover more at http://blog.zigolab.it
Intro. to Lightning Network (Bitcoin/Litecoin) - Blockchain Developers MalaysiaTM Lee
Introduction to Lightning Network for Bitcoin and Litecoin presented at the first Blockchain Developers Malaysia meetup by TM Lee, co-founder of https://www.coingecko.com
Presented images cited from BitcoinMagazine and Lightning Network Slide Decks
The presentation slides for a blockchain event - All About TenX Cryptopayment Technology, Lightning Network & Bitcoin Mining.
Presenter: Sun Sagong
Venue: Tenx (Singapore)
Date: 07Feb2018
Everybody nowadays talks about the blockchain and how it could empower a new and incredible range of applications. But what it's stored inside a block and what is suitable for?
What is worth to store in and what is better to store outside?
In this webinar, we will take a look at Bitcoin and Ethereum blockchains, and read some blocks and transactions using a mix open-source libraries and web-based explorers.
Discover more at http://blog.zigolab.it
Talk slide at Blockchain&DAPPs technologies meetup held on 11th April 2018 @ Microsoft - Singapore.
The slides cover the basic concept of bitcoin wallet functionalities.
RootedCON 2020 talk. In this talk, we showed the research about software dependencies that led us to rule the world for a day. Surprisingly, we could take control of more than 800 developer machines in less than 24 hours with the collusion of the most famous software dependency repositories... And with the "collaboraiton" of the developers ;)
In parallel to mainstream cryptography world, Russia has a strong school of crypto algorithms development, including block ciphers, hash functions, digital signature, etc. There is slow but ongoing trend of harmonizing GOST algorithms usage with the
rest of Internet community. This talk is dedicated to debunking several myths and presenting current state of support in open source projects.
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)Svetlin Nakov
Crypto-Wallets: A Technical Perspective
Svetlin Nakov @ OpenFest 2018 - https://www.openfest.org/2018/en/
Sofia, 4 November 2018
In this talk the speaker explains the concepts of crypto-wallets used by the blockchain developers to securely keep the private keys controlling the blockchain addresses and crypto-assets. The different wallet types (brain, paper, desktop, mobile, online, hardware) will be introduced and how to build and interact with wallets, sign and send blockchain transactions are demonstrated. The speaker explains the basic concepts and will give examples how to use and interact with keystores (holding a single ECC-based private key) and hierarchical deterministic wallets (HD wallets), which use mnemonic phrases with key-derivation based on the BIP39 and the BIP44 standards to keep multiple private keys.
All attendees are invited to create their own crypto-wallet and to get some testing crypto-coins (Ethereum Ropsten Testnet ethers – ETHt) and to send a few payment transactions on the Testnet.
All concepts are demonstrated with live examples in JavaScript: creating a simple wallet, encrypting and saving it; creating a new random HD wallet and creating an HD wallet from mnemonic phrase, along with deriving private keys.
Learn more at: http://www.nakov.com/blog/2018/11/04/crypto-wallets-a-technical-perspective-nakov-at-openfest-2018/
Ethereum Smart Contracts on Hyperledger Fabric Horea Porutiu
I'll show you how to run EVM compatible smart contracts on a Hyperledger Fabric network. Using the fabric-chaincode-evm repo found here, we install an EVM smart contract on the Hyperledger peer and run the simple storage smart contract that is found in the Solidity documentation.
Segregated witness and bitcoin scaling debatedalcanto
Presentation held at Pisa Bitcoin Meetup about the implementation of segregated witness and bitcoin scaling debate. I collected public available material from many different sources so I couldn't credit all of them, I mentioned only the biggest ones.
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...Dace Barone
He will give an introduction talk about Blockchain technology technical aspects like cryptography, protocols, APIs and scripting with focus on explaining how Bitcoin and other blockchain works and what they consist of.
Yurijs is a Chief Technical Officer at Paybis, blogger at coinside.ru , blockchain enthusiast since 2011.
Cryptography for Absolute Beginners (May 2019)Svetlin Nakov
Cryptography for Absolute Beginners
Svetlin Nakov @ Sofia Science Festival, May 2019
Video (Bulgarian language): https://youtu.be/-QzFcUkM7_4
Blog: https://nakov.com/blog/2019/05/13/cryptography-for-absolute-beginners-nakov-at-sofia-science-festival-may-2019/
In the blockchain, contracts may be lost but are never forgotten. Over 1,500,000 Ethereum smart contracts have been created on the blockchain but under 7,000 unique contracts have value today. An even smaller fraction of those have source code to analyze. Old contracts have been purged from the world computer's working memory but they can be reconstructed and analyzed. When a contract's purpose is fulfilled, the owner typically triggers a self-destruct switch that removes code and state. These steps are similar to what an attacker would do after hijacking a contract. Is it likely the self-destruct was intentional or performed by a trusted third party? Or was it a hack or fraud? By investigating the transactions leading up to the termination of a binary-only contract, we can determine if there was an attack. After identifying an attacker, we can find patterns that lead to a possible motive by carefully examining their other transactions.
This presentation will introduce Ethereum smart contracts, explain how to reverse engineer binary-only contracts, describe common classes of vulnerabilities, and then show how to investigate attacks on contracts by demonstrating new tools that re-process blockchain ledger data, recreate contracts with state, and analyze suspect transactions using traces and heuristics.
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
This presentation is about world's hot trending topic known as "Cryptocurrency". This presentation covers a general knowledge about cryptocurrency, crypto coins, bitcoin, coin mining. It specifically shows people about how to start mining and what are the basic requirements.
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
Talk slide at Blockchain&DAPPs technologies meetup held on 11th April 2018 @ Microsoft - Singapore.
The slides cover the basic concept of bitcoin wallet functionalities.
RootedCON 2020 talk. In this talk, we showed the research about software dependencies that led us to rule the world for a day. Surprisingly, we could take control of more than 800 developer machines in less than 24 hours with the collusion of the most famous software dependency repositories... And with the "collaboraiton" of the developers ;)
In parallel to mainstream cryptography world, Russia has a strong school of crypto algorithms development, including block ciphers, hash functions, digital signature, etc. There is slow but ongoing trend of harmonizing GOST algorithms usage with the
rest of Internet community. This talk is dedicated to debunking several myths and presenting current state of support in open source projects.
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)Svetlin Nakov
Crypto-Wallets: A Technical Perspective
Svetlin Nakov @ OpenFest 2018 - https://www.openfest.org/2018/en/
Sofia, 4 November 2018
In this talk the speaker explains the concepts of crypto-wallets used by the blockchain developers to securely keep the private keys controlling the blockchain addresses and crypto-assets. The different wallet types (brain, paper, desktop, mobile, online, hardware) will be introduced and how to build and interact with wallets, sign and send blockchain transactions are demonstrated. The speaker explains the basic concepts and will give examples how to use and interact with keystores (holding a single ECC-based private key) and hierarchical deterministic wallets (HD wallets), which use mnemonic phrases with key-derivation based on the BIP39 and the BIP44 standards to keep multiple private keys.
All attendees are invited to create their own crypto-wallet and to get some testing crypto-coins (Ethereum Ropsten Testnet ethers – ETHt) and to send a few payment transactions on the Testnet.
All concepts are demonstrated with live examples in JavaScript: creating a simple wallet, encrypting and saving it; creating a new random HD wallet and creating an HD wallet from mnemonic phrase, along with deriving private keys.
Learn more at: http://www.nakov.com/blog/2018/11/04/crypto-wallets-a-technical-perspective-nakov-at-openfest-2018/
Ethereum Smart Contracts on Hyperledger Fabric Horea Porutiu
I'll show you how to run EVM compatible smart contracts on a Hyperledger Fabric network. Using the fabric-chaincode-evm repo found here, we install an EVM smart contract on the Hyperledger peer and run the simple storage smart contract that is found in the Solidity documentation.
Segregated witness and bitcoin scaling debatedalcanto
Presentation held at Pisa Bitcoin Meetup about the implementation of segregated witness and bitcoin scaling debate. I collected public available material from many different sources so I couldn't credit all of them, I mentioned only the biggest ones.
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...Dace Barone
He will give an introduction talk about Blockchain technology technical aspects like cryptography, protocols, APIs and scripting with focus on explaining how Bitcoin and other blockchain works and what they consist of.
Yurijs is a Chief Technical Officer at Paybis, blogger at coinside.ru , blockchain enthusiast since 2011.
Cryptography for Absolute Beginners (May 2019)Svetlin Nakov
Cryptography for Absolute Beginners
Svetlin Nakov @ Sofia Science Festival, May 2019
Video (Bulgarian language): https://youtu.be/-QzFcUkM7_4
Blog: https://nakov.com/blog/2019/05/13/cryptography-for-absolute-beginners-nakov-at-sofia-science-festival-may-2019/
In the blockchain, contracts may be lost but are never forgotten. Over 1,500,000 Ethereum smart contracts have been created on the blockchain but under 7,000 unique contracts have value today. An even smaller fraction of those have source code to analyze. Old contracts have been purged from the world computer's working memory but they can be reconstructed and analyzed. When a contract's purpose is fulfilled, the owner typically triggers a self-destruct switch that removes code and state. These steps are similar to what an attacker would do after hijacking a contract. Is it likely the self-destruct was intentional or performed by a trusted third party? Or was it a hack or fraud? By investigating the transactions leading up to the termination of a binary-only contract, we can determine if there was an attack. After identifying an attacker, we can find patterns that lead to a possible motive by carefully examining their other transactions.
This presentation will introduce Ethereum smart contracts, explain how to reverse engineer binary-only contracts, describe common classes of vulnerabilities, and then show how to investigate attacks on contracts by demonstrating new tools that re-process blockchain ledger data, recreate contracts with state, and analyze suspect transactions using traces and heuristics.
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
This presentation is about world's hot trending topic known as "Cryptocurrency". This presentation covers a general knowledge about cryptocurrency, crypto coins, bitcoin, coin mining. It specifically shows people about how to start mining and what are the basic requirements.
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
Best practices to build secure smart contractsGautam Anand
- Quick update in blockchain tech space
- Comparision between tech
- Security in Blockchain (Focusing on ETH Solidity attack vectors)
- Design patterns
- 2 Popular hacks (Case study)
KubeCon EU 2016 Keynote: Pushing Kubernetes ForwardKubeAcademy
The Kubernetes community has aspirations of becoming the Linux kernel of distributed systems. Together we want to build a scalable, stable, and secure platform for distributed system that is the ubiquitous choice for people building server infrastructure. This talk will discuss the major community efforts made in recent months to deliver this goal and the work we need to do to continue our momentum.
Sched Link: http://sched.co/68lU
Microservices in Scala - theory & practiceŁukasz Sowa
Presentation from Warsaw Scala Enthusiasts Group, July 8th, 2015.
It was a brief introduction to microservice-based project https://github.com/theiterators/reactive-microservices
A blockchain, originally blockchain is a growing list of records, called blocks, which are linked using cryptography Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree root hash).
The slower the stronger a story of password hash migrationOWASP
Did you know that a single modern GPU is able to compute almost 20 billion MD5 hashes in a second? That’s why we need SLOW hashing algorithms!
This talk is a case study of a successful migration of www.ocado.com customer password hashes. I will not only show you the “why”, “what” and “how”, but also what was problematic, what went wrong and how we dealt with it.
I will talk about slow hashing algorithms - such as Argon2, PBKDF2, BCrypt or SCrypt - and compare them to other popular hashing algorithms - like MD5 or SHA1. Next, I will tell you a story of hashes which took about 80 ms to compute - not slow enough, fairly easy to crack. I will show you what our password hashing code looks like and I will guide you through our migration plan, describing in detail how we executed it, and what problems we encountered on the way.
Conference presentation of "Gaihre, Anil, Yan Luo, and Hang Liu. "Do bitcoin users really care about anonymity? an analysis of the bitcoin transaction graph." 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018."
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
Streaming Trend Discovery: Real-Time Discovery in a Sea of Events with Scott ...Databricks
Time is the one thing we can never get in front of. It is rooted in everything, and “timeliness” is now more important than ever especially as we see businesses automate more and more of their processes. This presentation will scratch the surface of streaming discovery with a deeper dive into the telecommunications space where it is normal to receive billions of events a day from globally distributed sub-systems and where key decisions “must” be automated.
We’ll start out with a quick primer on telecommunications, an overview of the key components of our architecture, and make a case for the importance of “ringing”. We will then walk through a simplified solution for doing windowed histogram analysis and labeling of data in flight using Spark Structured Streaming and mapGroupsWithState. I will walk through some suggestions for scaling up to billions of events, managing memory when using the spark StateStore as well as how to avoid pitfalls with the serialized data stored there.
What you’ll learn:
1. How to use the new features of Spark 2.2.0 (mapGroupsWithState / StateStore)
2. How to bucket and analyze data in the streaming world
3. How to avoid common Serialization mistakes (eg. how to upgrade application code and retain stored state)
4. More about the telecommunications space than you’ll probably want to know!
5. Learn a new approach to building applications for enterprise and production.
Assumptions:
1. You know Scala – or want to know more about it.
2. You have deployed spark to production at your company or want to
3. You want to learn some neat tricks that may save you tons of time!
Take Aways:
1. Fully functioning spark app – with unit tests!
Similar to Bitcoin protocol for developerBitcoin Protocol for Developers (20)
La arquitectura de microservicios persigue maximizar la adaptabilidad de las soluciones mediante la distribución de las responsabilidades del software en servicios con ciclo de vida independiente.
Lograr la independencia de los microservicios es clave para beneficiarse de las ventajas de la arquitectura. Esto exige un profundo entendimiento del dominio funcional, lo que se logra mediante DDD.
Por otro lado la arquitectura hexagonal nos permite estructurar el software de manera que la capa de código relacionada con el dominio funcional no se vea interferida por aspectos tecnológicos, es decir, que dicha capa sólo exprese el Ubiquitous Language, es decir el lenguaje del modelo en según lo llama DDD.
Dicha separación en capas y el invertir las dependencias permite además garantizar la máxima portabilidad del código.
¿Qué vamos a ver?
1. Beneficios
2. Domain Driven Design.
- Conceptos - Big Picture.
- Conceptos - Code architecture.
- Event Storming.
3. Clean Code Architecture.
- Hexagonal Architecture.
- Onion Architecture.
Bots 3.0: Dejando atrás los bots conversacionales con Dialogflow.Paradigma Digital
Atención personalizada y automatización de operativas con IA de forma sencilla con DialogFlow. Al terminar esta charla serás capaz de crear un bot con Dialogflow que solucione tareas sencillas.
En esta charla veremos:
- Cuales son las necesidades de negocio que satisface este tipo de soluciones
- Alternativas en el mercado
- Solución de la necesidad con DialogFlow
Ponente: Alex Asensio - Business Lead en Paradigma Digital
Pragmático y siempre enfocado a objetivos de negocio. Enamorado de la tecnología pero también con la forma en que entregamos software a nuestros clientes, basada en el "empirismo". Tech + Biz mano a mano es la fórmula de éxito que queremos compartir con ellos.
En esta nueva entrega sobre service-mesh veremos el que probablemente se convertirá en el producto de referencia: Istio.
Analizaremos las funcionalidades que aporta, su arquitectura interna, la integración con productos de terceros así como su repercusión
dentro de las arquitecturas actuales. Realizaremos algunos ejemplos para mostrar la funcionalidad y configuración
Ponente:
Abraham Rodríguez está especializado en soluciones cloud native con arquitecturas de microservicios, stack con el que ha trabajado en diversos proyectos. Apasionado defensor de todo lo relacionado con cloud, metodologías ágiles, software libre y devops.
En esta presentación hablamos de Linkerd, uno de los pioneros en el ámbito de las "arquitecturas Service Mesh". Haremos un repaso por la historia de este producto, conoceremos sus principales funcionalidades y tendremos una parte práctica en la que mostraremos su integración en arquitecturas distribuidas junto a Docker y Kubernetes.
¿Cómo hago que mis APIs sean usables?
A través de un ejemplo desarrollado en Spring veremos como realizar todo el proceso de diseño aplicando un conjunto de buenas prácticas que te ayuden en el proceso de toma de decisión a la hora de enfrentarte al diseño de APIs.
En este meetup vamos a analizar uno de los pilares básicos en el proceso de transformación digital de las empresas: API Management. Para ello, explicaremos en qué consiste esta estrategia, y los diferentes conceptos y componentes que intervienen en la misma.Además, para completar esta visión con un caso práctico, mostraremos un ejemplo de implementación mediante uno de los productos OpenSource de API Management más exitoso del mercado: WSO2.
https://www.meetup.com/Microservicios
¿Cómo se despliega y autoescala Couchbase en Cloud? ¡Aprende de manera práctica!Paradigma Digital
En el pasado Meetup, presentamos Couchbase de manera general, pero ha llegado el momento de ir ahondando en los detalles del producto para conocer todas sus capacidades. Esto nos permitirá estar en mejor disposición para adoptarlo en nuestros proyectos.
En esta ocasión, se hablará de la capa de operaciones y despliegue de Couchbase aunque no con un enfoque tradicional en máquinas físicas, sino siguiendo las buenas prácticas del mercado. Explicaremos y haremos el despliegue en Google Cloud con escalabilidad horizontal elástica y automática.
Para llevar a cabo esto haremos uso, entre otras, de las siguientes tecnologías: Google Cloud, Kubernetes, Python y, por supuesto, Couchbase.
Pondremos a prueba nuestra infraestructura con una pequeña aplicación, si queréis ver los resultados, no os lo podéis perder!
Google Analytics es una herramienta de analítica la que se conoce sólo una parte de su potencial. Además de medir audiencias y su comportamiento, Google Analytics permite priorizar las inversiones en marketing online, recoger comportamientos de Single Page Applications y visualizar datos offline, por ejemplo de CRM y combinarlos con los de visitas online. También es posible recoger datos en tiempo real de ventas, por ejemplo de ecommerce y de dispositivos físicos como bluetooth beacons. Las funcionalidades de Google Analytics, en combinación con Big Query y otros servicios de Google Cloud Platform, la convierte en una de las plataformas más interesantes de analítica para la transformación digital.
Si quieres ver el vídeo en el que fue usada esta presentación, pulsa aquí: https://www.youtube.com/watch?v=2mfIU-NXGXI
Para ver la convocatoria en nuestra web, clic aquí: https://www.paradigmadigital.com/eventos/usar-google-analytics/
La convocatoria a través del grupo de Meetup.com, clic aquí: https://www.meetup.com/es-ES/Front-end-Developers-Madrid/events/231793469/
¿Cómo definir el roadmap de transformación digital? En Paradigma llevamos más de 20 años ayudando a grandes compañías en su camino hacia la digitalización.
Esta presentación nos muestra qué es la programación reactiva, en qué consiste, qué nos permite hacer y por qué está tan de moda. Además, podemos ver el uso concreto de esta programación utilizando RxJava.
Autor: Juan Pablo González de Gracia.
En Paradigma creemos que los grandes dragones digitales han desbancado a las empresas tradicionales. La clave para combatir esos dragones es la transformación digital.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Bitcoin protocol for developerBitcoin Protocol for Developers
1. Leganés
6 Febrero 2013
Alberto Gómez Toribio ( @gotoalberto )
Bitcoin protocol for developers
Except where otherwise noted, this work is licensed under: http://creativecommons.org/licenses/by-nc-sa/3.0/
c_b_n_a
2. Coinffeine.com
Leganés
6 Febrero 2013
Alberto Gómez
@gotoalberto
“OpenData and Bitcoin Developer on fire.
Great coders are today’s rock stars. That’s it!”
Alvaro Polo
@apolovald
“Software development enthusiast and aviation geek. Give me a
higher-order function and I shall move the world.”
A P2P Bitcoin exchange
Sebastián Ortega @_sortega
“Vocational coder since childhood, he will annoy you with concepts
like "monad" and "actor model" but gets the work done.”
Ximo Guanter
“Theoretical computer science believer by night, pragmatic ship-it developer by day.
My brain runs on glucose, caffeine, general abstract nonsense and type theory.”
Except where otherwise noted, this work is licensed under: http://creativecommons.org/licenses/by-nc-sa/3.0/
c_b_n_a
3. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
What is the Bitcoin Protocol?
● Network protocol
○ Blockchain mining
○ Fees and commitment rules
○ Sharing protocol: Gossip, Bittorrent, Gnutella...
● Transactions Mechanics
○ Validations of the money source
○ Protocol to spend the money
○ Bitcoin Scripting
4. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Network protocol
● Blockchain
○ The Blockchain is a distributed ledger book
○ Create a Block in chain require a proof of work
dc7047be… = SHA256(new_block_hash)
○ Forks are discarded, the most complex chain wins.
5. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Network protocol
● Other services:
○ The Blockchain is used to storage
usernames.
○ Tweets are shared between users using a DHT protocol.
○ The older messages are discarded.
○ Incentive to generate blocks on Blockchain:
Sponsored messages.
6. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Network protocol
● Colored Coins:
○ The Blockchain is used to storage key-value strings,
as internet web domains / IP.
○ You can register a domain spending Namecoins.
○ The fee by register a name is decreased in time.
17. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Bitcoin Script
● It Allows to define how an output will be spent
and by whom.
● Is a non Turing-Complete language which is
evaluated as a Stack, from left to right.
● It just allows to write pure functions
(without context)
● Is a non Turing-Complete language which is
evaluated with a stack machine.
18. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
OP_EQUALVERIFY OP_CHECKSIG
19. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Signature)
(Public Key)
bbba3f5… 172D5w7C…
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
OP_EQUALVERIFY OP_CHECKSIG
20. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Signature)
(Public Key)
bbba3f5… 172D5w7C…
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
Stack
OP_EQUALVERIFY OP_CHECKSIG
21. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Signature)
(Public Key)
bbba3f5… 172D5w7C…
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
Stack
OP_EQUALVERIFY OP_CHECKSIG
22. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key)
(Public Key Hash)
172D5w7C…
OP_DUP OP_HASH160 cb1f48…
Stack
(Signature)
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
23. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key)
(Public Key Hash)
172D5w7C…
OP_DUP OP_HASH160 cb1f48…
Stack
(Signature)
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
24. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
Stack
(Public Key)
(Signature)
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
25. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
OP_DUP OP_HASH160 cb1f48…
Stack
(Public Key)
(Signature)
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
26. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
OP_HASH160 cb1f48…
Stack
(Public Key)
(Public Key)
(Signature)
172D5w7C…
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
27. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
OP_HASH160 cb1f48…
Stack
(Public Key)
(Public Key)
(Signature)
172D5w7C…
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
28. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
cb1f48…
Stack
(Public Key Hash)
(Public Key)
(Signature)
cb1f48…
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
29. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
(Public Key Hash)
cb1f48…
Stack
(Public Key Hash)
(Public Key)
(Signature)
cb1f48…
172D5w7C…
bbba3f5…
OP_EQUALVERIFY OP_CHECKSIG
30. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
OP_EQUALVERIFY OP_CHECKSIG
Stack
(Public Key Hash)
(Public Key Hash)
(Public Key)
(Signature)
cb1f48…
cb1f48…
172D5w7C…
bbba3f5…
31. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
OP_EQUALVERIFY OP_CHECKSIG
Stack
(Public Key Hash)
(Public Key Hash)
(Public Key)
(Signature)
cb1f48…
cb1f48…
172D5w7C…
bbba3f5…
32. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
OP_CHECKSIG
Stack
(Public Key)
(Signature)
172D5w7C…
bbba3f5…
33. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
How Bitcoin Script works?
OP_CHECKSIG
Stack
(Public Key)
(Signature)
172D5w7C…
bbba3f5…
34. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
How Bitcoin Script works?
(EMPTY)
Stack
(EMPTY)
SUCCESS!
#BitcoinT3F
45. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_SWAP
OP_HASH160 <bHash> OP_EQUALVERIFY <1> OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<5aa>
<7bb>
<7bb>
<PubKeyB>
<Sig>
46. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_HASH160 <bHash> OP_EQUALVERIFY <1> OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<7bb>
<5aa>
<7bb>
<PubKeyB>
<Sig>
47. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
<bHash> OP_EQUALVERIFY <1> OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<bHash>
<5aa>
<7bb>
<PubKeyB>
<Sig>
48. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_EQUALVERIFY <1> OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<bHash>
<bHash>
<5aa>
<7bb>
<PubKeyB>
<Sig>
49. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
<1> OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<5aa>
<7bb>
<PubKeyB>
<Sig>
50. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_LEFT OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<1>
<5aa>
<7bb>
<PubKeyB>
<Sig>
51. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_SWAP <1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<5>
<7bb>
<PubKeyB>
<Sig>
52. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
<1> OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<7bb>
<5>
<PubKeyB>
<Sig>
53. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_LEFT OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<1>
<7bb>
<5>
<PubKeyB>
<Sig>
54. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
OP_ADD <2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<7>
<5>
<PubKeyB>
<Sig>
55. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
The sky is the limit! (Odd/Even Bet)
<2>
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<12>
<PubKeyB>
<Sig>
56. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
The sky is the limit! (Odd/Even Bet)
OP_SWAP OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<2>
<12>
<PubKeyB>
<Sig>
#BitcoinT3F
57. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
The sky is the limit! (Odd/Even Bet)
OP_MOD
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<12>
<2>
<PubKeyB>
<Sig>
#BitcoinT3F
58. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
The sky is the limit! (Odd/Even Bet)
OP_IF
OP_DUP OP_HASH160 <pubKeyAHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ELSE
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
OP_ENDIF
Stack
<0>
<PubKeyB>
<Sig>
#BitcoinT3F
59. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
The sky is the limit! (Odd/Even Bet)
OP_DUP OP_HASH160 <pubKeyBHash> OP_EQUALVERIFY OP_CHECKSIG
Stack
<PubKeyB>
<Sig>
(Standard Script)
#BitcoinT3F
60. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
The sky is the limit! (Odd/Even Bet)
● Possible real use:
○ Random user to pay the transaction fees.
○ Help to define asymmetric scenario (secrets)
#BitcoinT3F
61. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Context: Oracles
● The oracle contract allow define how the money
is spent including external state.
○ Allows to make reversible transactions.
○ Allow to pay, only if an external condition is true, for
example the result of a search in google, or the API SEUR
response.
62. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Context: Oracles
● Example of a reversible payment using a Oracle
○ First you generate (in private) a multisig transaction as
this:
TX1
in { 1 BTC BOB }
out { 1 BTC MULTISIGVERIFY BOB SAM }
○ Then you must obtain signed from counterpart:
TX2
in { TX1[0] }
out { 1 BTC
TX3
in { TX1[0] }
out { 1 BTC
<SeurAPI(trackID) == ‘RETURNED’>
OP_HASH160 <ExternalScriptHash> OP_EQUALSVERIFY
<OraclePubKey> <SamPubKey> 2 OP_CHECKMULTISIGVERIFY }
<SeurAPI(trackID) == ‘DELIVERED’>
OP_HASH160 <ExternalScriptHash> OP_EQUALSVERIFY
<OraclePubKey> <BobPubKey> 2 OP_CHECKMULTISIGVERIFY }
63. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
Context: Oracles
● Execution
TX2
in { TX1[0] }
out { 1 BTC
<SeurAPI(trackID) == ‘RETURNED’>
OP_HASH160 <ExternalScriptHash>
OP_EQUALSVERIFY
<OraclePubKey> <SamPubKey> 2
OP_CHECKMULTISIGVERIFY }
#BitcoinT3F
72. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Fees? Micro Payment Channels!
● Transactions from a checkpoint without
broadcast
● Allows commit money safely
● Allows to pay on demand by the second
● For example: decentralized WiFi Hotspots or
subcontracting services in third world countries.
73. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
#BitcoinT3F
74. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
#BitcoinT3F
75. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
#BitcoinT3F
76. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
#BitcoinT3F
77. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
IN {TX1[0] 1 BTC
}
OUT {0: 0,9 BTC BOB
0,1 BTC SAM }
78. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
IN {TX1[0] 1 BTC
}
OUT {0: 0,8 BTC BOB
0,2 BTC SAM }
79. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
IN {TX1[0] 1 BTC
}
OUT {0: 0,7 BTC BOB
0,3 BTC SAM }
80. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
IN {TX1[0] 1 BTC
}
OUT {0: 0,6 BTC BOB
0,4 BTC SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
BREAK!
81. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
Micro Payment Channels Mechanic
TX1
IN {0: 1 BTC
}
OUT {0: 1 BTC MULTISIG BOB SAM }
TX2
IN {TX1[0]: 1 BTC
}
OUT {
0 : 1 BTC BOB }
LOCKTIME : 18
IN {TX1[0] 1 BTC
}
OUT {0: 0,6 BTC BOB
0,4 BTC SAM }
82. Leganés
6 Febrero 2013
Bitcoin Protocol for Developers
#BitcoinT3F
THANKS!
● BigData is the current wave, P2P is the next.
● APIs and P2P are the next challenge on finantial world.
● Bitcoin technology and protocol is here to stay.