Blockchain is a decentralized approach to solving the double spend problem of digital currencies without a central authority. It uses a distributed ledger maintained on many computers to record transactions in blocks linked through cryptography. This allows participants to verify transactions without trusting a central party. Blockchain addresses issues like single points of failure, censorship, and high fees by achieving consensus across a peer-to-peer network through proof of work and an incentive for honest participation in maintaining the ledger. Potential applications include cryptocurrencies like Bitcoin and programmable platforms for smart contracts.
Over the past year, we have seen a rapid increase of interest in regards to the Blockchain Technology. During this presentation, we will break down the very basics of what the mysterious Blockchain actually is. We will cover what the Blockchain comprises of, hashing and proof of work, what happens during a transaction and the case for a global currency.
Main points covered:
• Outline potential uses for the technology and what it means for you.
• Secured Hash Algorithm 256 and the proof of work concept.
• What happens during a transaction?
• Breakdown the beginnings of bitcoin.
Presenter:
Our presenter for this webinar will be Kenneth Kimbel who is a cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Kenneth has knowledge on both current technical and legal issues in security.
Link to the recorded webinar: https://youtu.be/mSiAqOZ6fNs
Litecoin Genesis Date - October 7, 2011
Founder Charlie Lee, a former Google and Coinbase employee.
Litecoin reached a $1 billion marketcap in November 2013.[
In May 2017, Litecoin became the first of the top-5 (by market cap) cryptocurrencies to adopt Segregated Witness .
Later in May of the same year, the first Lightning Network transaction was completed through litecoin, transferring 0.00000001 LTC from Zurich to San Francisco in under one second.
A CIO Roundtable briefing on the disruptive nature of the Blockchain, Bitcoin and Ethereum. We'll take a look at Smart Contracts, Digital Tokens and a dozen or so use cases within Financial Services, IOT, Healthcare and Government.
Topics Covered:
What is the BlockChain
Economics behind Digital Currencies
Blockchain Trivia
Use Cases
Over the past year, we have seen a rapid increase of interest in regards to the Blockchain Technology. During this presentation, we will break down the very basics of what the mysterious Blockchain actually is. We will cover what the Blockchain comprises of, hashing and proof of work, what happens during a transaction and the case for a global currency.
Main points covered:
• Outline potential uses for the technology and what it means for you.
• Secured Hash Algorithm 256 and the proof of work concept.
• What happens during a transaction?
• Breakdown the beginnings of bitcoin.
Presenter:
Our presenter for this webinar will be Kenneth Kimbel who is a cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Kenneth has knowledge on both current technical and legal issues in security.
Link to the recorded webinar: https://youtu.be/mSiAqOZ6fNs
Litecoin Genesis Date - October 7, 2011
Founder Charlie Lee, a former Google and Coinbase employee.
Litecoin reached a $1 billion marketcap in November 2013.[
In May 2017, Litecoin became the first of the top-5 (by market cap) cryptocurrencies to adopt Segregated Witness .
Later in May of the same year, the first Lightning Network transaction was completed through litecoin, transferring 0.00000001 LTC from Zurich to San Francisco in under one second.
A CIO Roundtable briefing on the disruptive nature of the Blockchain, Bitcoin and Ethereum. We'll take a look at Smart Contracts, Digital Tokens and a dozen or so use cases within Financial Services, IOT, Healthcare and Government.
Topics Covered:
What is the BlockChain
Economics behind Digital Currencies
Blockchain Trivia
Use Cases
A brief description of how Blockchain Technology works. It is the technology behind the cryptocurrency. The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
Are you interested to know about how blockchain works? Then This PPT might help you.
It explains BlockChain Technology, How it work and its applications.
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
Short Intro class to Ethereum. Ethereum is the main blockchain platform thats widely used. We will cover what a blockchain is, what Ether is, What the difference between Bitcoin and Ethereum is, what a crypto currency is., how to but ether and how to find out more about development with Solidity of distributed apps. (DAPPS)
Explains the motivation for private/permissioned blockchains and their characteristics, particularly in comparison to traditional centralized databases. Lists seven "tomatoes" that people throw at the notion of private blockchains, evaluating which represent valid criticisms and which do not.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
An introduction to the technology underlying blockchains. If you want to hear a voice over, you can find it at http://presentationtube.com/watch?v=tCZDIEezrpbhttp://presentationtube.com/watch?v=tCZDIEezrpb
Blockchain general presentation nov 2017 v engDavid Vangulick
These slides are used to introduce the concept of blockchain and how this technology can be used for peer to peer energy exchange linked with the wholesale energy market
Compared with existing payment systems, Bitcoin’s throughput is low. Designed to address Bitcoin’s scalability challenge, the Lightning Network (LN) is a protocol allowing two parties to secure bitcoin payments and escrow holdings between them. In a lightning channel, each party commits collateral towards future payments to the counterparty and payments are cryptographically secured updates of collaterals. The network of channels increases transaction speed and reduces blockchain congestion. This paper (i) identifies conditions for two parties to optimally establish a channel, (ii) finds explicit formulas for channel costs, (iii) obtains the optimal collaterals and savings entailed, and (iv) derives the implied reduction in congestion of the blockchain. Unidirectional channels costs grow with the square-root of payment rates, while symmetric bidirectional channels with their cubic root. Asymmetric bidirectional channels are akin to unidirectional when payment rates are significantly different, otherwise to symmetric bidirectional.
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
During this presentation, we will cover a brief introduction into Blockchain technology, historic use cases & emerging trends for Blockchain technology. We will also touch on what to expect from Blockchain technology in 2019. It is important to understand the progress that is being achieved every day with every single step we take towards real use cases for Blockchain projects. 2019 might be the first year where the Blockchain starts to become a central part in people’s lives and in some industries.
Main points covered:
• Conduct a brief introduction to Blockchain technology;
• Discuss both historic use cases and emerging trends for Blockchain technology;
• What to expect from Blockchain technology in 2019
Presenter:
Our presenter for this webinar is Kenneth Kimbel, a Cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Currently, Kenneth is a data privacy and Cybersecurity Advisory Consultant with Deloitte. He is also knowledgeable on both current technical and legal issues in security.
Date: March 27th, 2019
Recorded webinar: https://youtu.be/fLjVgj6MAPY
A brief description of how Blockchain Technology works. It is the technology behind the cryptocurrency. The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
Are you interested to know about how blockchain works? Then This PPT might help you.
It explains BlockChain Technology, How it work and its applications.
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
Short Intro class to Ethereum. Ethereum is the main blockchain platform thats widely used. We will cover what a blockchain is, what Ether is, What the difference between Bitcoin and Ethereum is, what a crypto currency is., how to but ether and how to find out more about development with Solidity of distributed apps. (DAPPS)
Explains the motivation for private/permissioned blockchains and their characteristics, particularly in comparison to traditional centralized databases. Lists seven "tomatoes" that people throw at the notion of private blockchains, evaluating which represent valid criticisms and which do not.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
An introduction to the technology underlying blockchains. If you want to hear a voice over, you can find it at http://presentationtube.com/watch?v=tCZDIEezrpbhttp://presentationtube.com/watch?v=tCZDIEezrpb
Blockchain general presentation nov 2017 v engDavid Vangulick
These slides are used to introduce the concept of blockchain and how this technology can be used for peer to peer energy exchange linked with the wholesale energy market
Compared with existing payment systems, Bitcoin’s throughput is low. Designed to address Bitcoin’s scalability challenge, the Lightning Network (LN) is a protocol allowing two parties to secure bitcoin payments and escrow holdings between them. In a lightning channel, each party commits collateral towards future payments to the counterparty and payments are cryptographically secured updates of collaterals. The network of channels increases transaction speed and reduces blockchain congestion. This paper (i) identifies conditions for two parties to optimally establish a channel, (ii) finds explicit formulas for channel costs, (iii) obtains the optimal collaterals and savings entailed, and (iv) derives the implied reduction in congestion of the blockchain. Unidirectional channels costs grow with the square-root of payment rates, while symmetric bidirectional channels with their cubic root. Asymmetric bidirectional channels are akin to unidirectional when payment rates are significantly different, otherwise to symmetric bidirectional.
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
During this presentation, we will cover a brief introduction into Blockchain technology, historic use cases & emerging trends for Blockchain technology. We will also touch on what to expect from Blockchain technology in 2019. It is important to understand the progress that is being achieved every day with every single step we take towards real use cases for Blockchain projects. 2019 might be the first year where the Blockchain starts to become a central part in people’s lives and in some industries.
Main points covered:
• Conduct a brief introduction to Blockchain technology;
• Discuss both historic use cases and emerging trends for Blockchain technology;
• What to expect from Blockchain technology in 2019
Presenter:
Our presenter for this webinar is Kenneth Kimbel, a Cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Currently, Kenneth is a data privacy and Cybersecurity Advisory Consultant with Deloitte. He is also knowledgeable on both current technical and legal issues in security.
Date: March 27th, 2019
Recorded webinar: https://youtu.be/fLjVgj6MAPY
Block chain and Bitcoin. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers.
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
Blockchain is one of the most innovative discoveries of the past century.
The first cryptocurrency, Bitcoin, was proposed in 2008 by Satoshi Nakamoto with a white paper.
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
A blockchain is a general digital ledger of transactions that are executed on the network, e.g. using Bitcoin to buy a cup of coffee is a transaction.
All users of the network, ‘Nodes’, have a copy of the transaction records and can access them freely, a role previously played by centralized institutions. Therefore, the blockchain network is ‘decentralized’.
A Primer on Blockchain and its Potential, with a Focus on the GCCZeyad T. Al Mudhaf
During my summer internship at BECO Capital, a technology-focused Venture Capital firm based in Dubai, I put together this primer on blockchain that demystifies this hyped up technology, covers key investment trends in the space both globally and regionally within the GCC*, and highlights both the barriers and enablers for wider blockchain adoption in the region. *The GCC is the Gulf Cooperation Council - comprised of the United Arab Emirates, Saudi Arabia, Kuwait, Bahrain, Qatar, and Oman.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Contents
• What is Blockchain and why do we need it?
• How Blockchain works?
• Data Structure
• Protocol
• Networking
• Applications of Blockchain
• Future of Blockchain
3. Internet Of Information
• Since the advent of Internet, we have been exchanging information
over the internet in the form of text, images, videos, etc.
• Everything we share over the internet is a copy. There is no
original.
• E.g. A digital image sent to a friend is a copy. I still have the image even after
sending it to a friend.
4. Internet of Value
• How do we exchange things of value over Internet?
• E.g. money, stocks, property ownership, etc.
• How do we create Digital Scarcity?
• A thing of value on the digital platform that is scarce or limited.
5. Double Spend Problem
• If a person has a digital asset, say money, he can give it to some
other person and still have a copy of the original digital asset which
he may spend again.
• How do we make sure that once an asset is spent, it cannot be spent
again by the previous owner?
6. Approaches to Double Spend Problem
• Centralized:
• This is usually implemented using an on-line central trusted third party that
can verify whether a token has been spent.
• Decentralized:
• Blockchain
7. Problems with Centralized Approach
• This approach normally represents a single point of failure from
both availability and trust viewpoints.
• E.g. In Banking,
• If the bank’s website goes down, no way to transact.
• Easy to be attacked by the hackers.
• Both parties have to trust that the bank transfers money securely without errors.
• The central party often charges us a hefty fee for using their service.
• E.g. Sending money cross-country using services like Western Union, etc.
takes a fee of 10-20% of the amount.
8. Blockchain
• It is a decentralized approach of solving the Double Spend
Problem.
• This approach was first introduced in 2008 and since then
hundred’s of different implementations have been done.
• Bitcoin is the first application that uses Blockchain technology.
• We will sometimes refer to its implementation to understand Blockchain.
9. What is Blockchain?
• In the decentralized approach, we use a public ledger to record the
transactions. This ledger was originally termed as Blockchain.
• It is like a giant data store that is used by everyone to read and
write transactions.
10. Properties
• Decentralized and Distributed
• No single point of failure from both availability and trust viewpoints.
• Immutable
• Once a transaction is recorded in this data store, it cannot be changed.
• Durability and Attack Resistance
• It is practically not possible to record false transactions.
• Fault Tolerance
• Service is available at all time.
12. Hash Pointer
• Like a normal pointer but stores two things:
• Address
• Hash of the data in that address
• Benefit
• Verify data integrity
• In layman’s terms a liked-list using hash pointers instead of normal
pointer is the Blockchain.
• Each node is like a block and linked together forms the Blockchain.
18. Aspects of Decentralization
• Who maintains the ledger?
• Peer-to-peer network: open to anyone, low barrier to entry.
• Every peer maintain a copy of the ledger and remain in sync with each other.
• Who has the authority over which transactions are valid?
• Who creates the digital coins?
• Should be limited to achieve digital scarcity.
19. P2P Protocol
• Ad-hoc network with random topology
• All nodes are equal
• New nodes can join at any time
• A new node joining the network ask any existing node for neighbor addresses
and then ask neighbor’s neighbor and in this way gets connected to many
nodes.
20. Distributed Consensus
• Key technical challenge of a decentralized digital coin system is :
Distributed Consensus.
• How do all the nodes in the system agree on only one fact?
• Traditional motivation:
• Reliability in Distributed Systems like Distributed Databases, etc.
• Build a distributed key-value store.
• Not much progress in such models.
• Hard to reach consensus because network is imperfect, latency, etc.
• Nodes crash time to time.
21. Distributed Consensus in Blockchain
• Introduce Incentives
• Possible because it’s a currency.
• Embrace randomness
• Consensus happens over a long time.
• Consensus is probabilistic and not deterministic.
22. Algorithm
1. New transaction is sent to any of the nodes in the network.
• If the transaction is invalid, it is rejected.
• If valid, the node stores it in the list of unconfirmed transaction.
• The transaction is then broadcasted to neighbor nodes.
2. In each round a random node gets to broadcast its block.
• A block contains a list of unconfirmed but valid transactions.
• It also contains the hash of the previous block.
3. Other nodes accept the block after checking the block.
• Nodes express acceptance by adding the block to its own copy of the
Blockchain.
4. Nodes always maintain their copy with the longest valid chain.
27. Race Conditions
• Transactions may conflict
• Nodes may accept/reject the conflicting transaction.
• The transaction that ultimately ends up in the block chain is the one that is
finally accepted.
34. Incentive
• Creator of the block gets to include a special transaction in the
block, the coin creation transaction.
• It creates coin and store it in the name of the block creator.
• Those coins are only useful if it ends up in the long-term consensus
branch.
35. Remaining problems
• How to pick random node?
• How to avoid a free-for-all due to rewards?
• How to prevent Sybil attack?
36. Proof of Work
• All the nodes who wants to propose the next block, needs to do
some work before they proposes the block and attach the proof of
their work in the block.
• Nodes need to make sure that the hash of the block is of form:
• “00000000ahdn48b37r3b…nbf7f48”
• Few zeros in the beginning.
• Try adding random string in the block so that the hash is of the above form.
• The node which find it first, broadcast the new block and all nodes accept after
check the block validity and the proof of work.
37. Sybil Attack
• The network is secure unless 51% of the nodes are malicious.
• Perspective:
• In case of Bitcoin, the amount of computing power required to attack the
network is more than the computing power of top 500 Supercomputers
combined.
• No person or organization have anything close to that amount of computing
power as of now.
38. Drawbacks of Blockchain
• Distributed consensus in probabilistic and no deterministic.
• We need to wait for few more blocks to consider a transaction to be truly confirmed.
• Probability increases exponentially but never 100%.
• Takes a long time for the block to get propagated to the entire network.
• Not suitable for instant payments.
• All nodes need to maintain an entire copy of the block chain since the genesis
block.
• The block only increases with time. Eventually, we will face storage issues.
• 51% attack possible.
• Bootstrapping problem.
• Difficult to make changes in the software.
39. Applications of Blockchain
• 1st Generation:
• Bitcoin: A decentralized cryptocurrency.
• Many other crypto-currencies. Together called Altcoins.
• 2nd Generation:
• Ethereum:
• It’s a programmable Blockchain. Instead of simply storing records in the distributed
ledger, we can have store code in the ledger.
• Able to deploy smart contracts.
• 3rd Generation:
• Uses Directed Acyclic Graph instead of a Linked List style block chain.
• E.g. Iota, Cardano, etc.
40. Blockchain at Present
• “Encryption and cryptocurrency take power from centralized
systems and put it back into people's hands. But they come with
the risk of being harder to control. I'm interested to go deeper and
study the positive and negative aspects of these technologies, and
how best to use them in our services.”, posted Mark Zuckerberg,
CEO of Facebook, on 4th Jan 2018.
• Other Big companies working on Blockchain Technology Include:
• IBM, Walmart, Visa, ING, etc.
• 100s of startups working on Decentralized Applications:
• Open-Bazaar, Eth-Tweet, etc.
41. References
• Bitcoin White Paper: https://bitcoin.org/bitcoin.pdf
• Books:
• “Bitcoin and Cryptocurrency Technologies” by Arvind Narayan and Andrew
Miller from Princeton University.
• “The Internet of Money”, by Andreas M. Antonopoulos.