Blockchain has been an essential part of day to day business. In this slide we will tackle different technologies such as the Cloud and DevOps in order to make a seamless developer experience.
Web directions 2018 Code - Blockchain for Web DevelopersMichael John Peña
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for web developers and how to get started writing your own Decentralised App. The speaker coming from a developer background himself, will bridge the gap the knowledge to fast-track the audience in DApps development.
The audience will also learn available platforms and tooling within the Blockchain space. The speaker will highlight some of the good use cases of Blockchain and when NOT to use it.
NuCypher ICO Review, Ratings And Complete AnalysisCoinGape
A decentralized Key management system (KMS), NuCypher KMS offers a privacy layer to the distributed systems and decentralized applications. Through its proxy re-encryption and access control services, NuCypher KMS allows DAPP developers to store, share, manage, and secure their data on the blockchain.
Ml.net machine learning for .net developers!Cameron Vetter
Machine Learning is quickly becoming a ubiquitous technology and expected skill of development teams. Python has dominated this space with all of the best libraries and tooling. As a .NET developer, you need to not only understand the terminology and techniques, but also learn a new language. ML.NET provides an alternative allowing you to do some Machine Learning in C#.
This talk will be code heavy, focused on showing as many demos as possible showing how these tools can be used effectively to bring Machine Learning to your .NET team. The topics covered will include:
• Brief machine learning terminology primer
• Primer on ML.NET and how it compares to other popular tools
• Demos of Classification, Regression, Deep Learning Image Classification, and Clustering
You'll leave with an understanding of ML.NET, how ML .NET can be used in your applications, and some exposure to the structure of working ML.NET solutions.
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
Microservices 101: From DevOps to Docker and beyondDonnie Berkholz
Containers and microservices are two of the fastest-growing trends in technology, enabled by a modern approach to software development and deployment called DevOps. This talk will delve into the increasingly mainstream trend of DevOps, the Docker and containers ecosystem including current enterprise adoption, and how they combine to form a new style of software architecture dubbed microservices. We'll close by looking at real-world examples of containers and microservices architectures at leading-edge companies.
Web directions 2018 Code - Blockchain for Web DevelopersMichael John Peña
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for web developers and how to get started writing your own Decentralised App. The speaker coming from a developer background himself, will bridge the gap the knowledge to fast-track the audience in DApps development.
The audience will also learn available platforms and tooling within the Blockchain space. The speaker will highlight some of the good use cases of Blockchain and when NOT to use it.
NuCypher ICO Review, Ratings And Complete AnalysisCoinGape
A decentralized Key management system (KMS), NuCypher KMS offers a privacy layer to the distributed systems and decentralized applications. Through its proxy re-encryption and access control services, NuCypher KMS allows DAPP developers to store, share, manage, and secure their data on the blockchain.
Ml.net machine learning for .net developers!Cameron Vetter
Machine Learning is quickly becoming a ubiquitous technology and expected skill of development teams. Python has dominated this space with all of the best libraries and tooling. As a .NET developer, you need to not only understand the terminology and techniques, but also learn a new language. ML.NET provides an alternative allowing you to do some Machine Learning in C#.
This talk will be code heavy, focused on showing as many demos as possible showing how these tools can be used effectively to bring Machine Learning to your .NET team. The topics covered will include:
• Brief machine learning terminology primer
• Primer on ML.NET and how it compares to other popular tools
• Demos of Classification, Regression, Deep Learning Image Classification, and Clustering
You'll leave with an understanding of ML.NET, how ML .NET can be used in your applications, and some exposure to the structure of working ML.NET solutions.
Role of blockchain technology in critical infrastructure securityGlobal Tech Council
Blockchain is a distributed ledger system that was once referred to as Bitcoin's underlying exchange technology, but has now widened its field and emerged as a mainstream technology that embraces other innovations such as artificial intelligence, machine learning, data science, big data, and more.
Microservices 101: From DevOps to Docker and beyondDonnie Berkholz
Containers and microservices are two of the fastest-growing trends in technology, enabled by a modern approach to software development and deployment called DevOps. This talk will delve into the increasingly mainstream trend of DevOps, the Docker and containers ecosystem including current enterprise adoption, and how they combine to form a new style of software architecture dubbed microservices. We'll close by looking at real-world examples of containers and microservices architectures at leading-edge companies.
An Insider's Guide on How Blockchain is Disrupting the App Development LandscapeSeven Bits Technologies
Enterprises are increasingly seeking the aid of Blockchain application development to incline towards a more efficient, orchestrated, and secure tech infrastructure. Wondering why? Let's explore.
Blockchain and Artificial Intelligence for Nonprofits and Impact Amy Neumann ...Resourceful Nonprofit
Future Nonprofit Technology is Already Here:
How Blockchain and AI Are Creating Impact Right Now
Nonprofit Leadership Summit - Business Volunteers Unlimited (BVU) October 2019
Presented by Amy Neumann
How is blockchain affecting nonprofits, NGOs, social enterprise, and other organizations creating positive impact -- right now? This presentation gives examples and use cases, as well as resources and tools you can use to stay updated on trends in blockchain and other emerging technology.
Presented at Better World Day 2019 in Cleveland, OH by Amy Neumann, founder and executive director of the 501(c)3 nonprofit, Free Tech for Nonprofits.
OWASP AppSec Cali 2018 - Enabling Product Security With Culture and Cloud (As...Patrick Thomas
Abstract from OWASP AppSec California 2018:
----------------------------
What would it look like if security never had to say “no”?
This talk explores that counter-intuitive premise, and shows how it is not just possible but *necessary* to discard many traditional security behaviors in order to support modern high-velocity, cloud-centric engineering teams. For the product security team at Netflix, this is the logical implication of a cultural commitment to enabling the organization.
Attendees will learn how to replace heavy-handed gating with an automation-first approach, and build powerful security capabilities on top of cloud deployment primitives. Specific examples including provable application identity, immutable and continuous deployment, and secret bootstrapping illustrate how this approach balances security impact with engineering enablement.
Contact:
@astha_singhal
@coffeetocode
Version with speaker notes: https://www.slideshare.net/coffeetocode/owasp-appsec-cali-2018-enabling-product-security-with-culture-and-cloud-astha-singhal-patrick-thomas-with-speaker-notes-public
Erik Costlow, Product Evangelist at Contrast Security, was Oracle's principal product manager for Java 8 and 9, focused on security and performance. His security expertise involves threat modeling, code analysis, and instrumentation of security sensors. He is working to broaden this approach to security with Contrast Security. Before becoming involved in technology, Erik was a circus performer who juggled fire on a three-wheel vertical unicycle.
Pragmatic approach to Microservice Architecture: Role of MiddlewareAsanka Abeysinghe
Microservice Architecture (MSA) is emerging as a popular architecture pattern in today’s agile enterprise. Its iterative architecture and development methodologies are particularly attracting the interest of architects who need continuous delivery to fulfil business needs.
But, is every characteristics of MSA new or even pragmatic? Asanka Abeysinghe, vice president of solutions architecture at WSO2, will provide insights into MSA requirements from real-world examples and provide details of an architect friendly pragmatic approach for this architecture pattern.
Middleware plays a key role in successful MSA-based implementations. Using the correct middleware capabilities enable enterprises to fully leverage advantages provided by MSA, and ensures ease of implementation and faster time to market.
Asanka will explain essential middleware capabilities required to resolve the MSA puzzle, where you can also utilize supportive technologies such as Continuous Integration (CI), containerization and Container as a Service (CaaS).
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...Resourceful Nonprofit
What is blockchain?
What are examples of how blockchain is being used for business?
Will blockchain impact my business?
What can I learn and do right now for my business?
Presented by Amy Neumann at Power Hour CLE August 22, 2019. #Cleveland #blockchain
Every big firm is now plunging into the pool of Blockchain. The technology has taken the world by storm, and we have seen some huge transformation across the different industrial segments. The latest name that has emerged is Samsung. South-Korean electronics giant Samsung has started to work on Ethereum-based Blockchain, and the company also aims to issue its token down the line.
5 major advantages of blockchain technology for engineering students Blockchain Council
Have you ever been wondered what are benefits of blockchain for engineering students? Have you ever been wondered what is the blockchain developer salary. If yes, then you have landed on the right page. The blockchain platform is the new era of emerging technology. There are various types of blockchain courses available online. In this blog, we will discuss why engineers should learn blockchain technology.
The first workshop earlier in the week at New York University, exploring #Analytics on a #DLT #Blockchain platform and the intersection of DLT and #AI.
The proliferation of Blockchain technology is so much so that it has also emerged as a popular career option; the demand for Blockchain certification and Blockchain online training program has increased.
How Blockchain Technology affects Mobile Application Development Experience.pptxShelly Megan
We are a team of professional Blockchain developers providing top-of-the-line Blockchain app development services to several businesses across the globe
Developing DeFi (decentralised finance) apps with EthereumMichael John Peña
Blockchain is not dead. Actually, quite the contrary is happening in the past year. There are more and more interest and it's gaining a lot more traction than before. A big portion of this growth is due to "DeFi" AKA Decentralised Finance applications. From the hyped cryptocurrencies, we are now seeing the new next wave of this transformation as we see more financial products being developed: lending, exchanges, yield farming, and pools just to name a few.
Using Xamarin and Microsoft Azure, you can have an end-to-end Native Mobile blockchain application. We also explored the technology architecture of Azure Blockchain workbench.
An Insider's Guide on How Blockchain is Disrupting the App Development LandscapeSeven Bits Technologies
Enterprises are increasingly seeking the aid of Blockchain application development to incline towards a more efficient, orchestrated, and secure tech infrastructure. Wondering why? Let's explore.
Blockchain and Artificial Intelligence for Nonprofits and Impact Amy Neumann ...Resourceful Nonprofit
Future Nonprofit Technology is Already Here:
How Blockchain and AI Are Creating Impact Right Now
Nonprofit Leadership Summit - Business Volunteers Unlimited (BVU) October 2019
Presented by Amy Neumann
How is blockchain affecting nonprofits, NGOs, social enterprise, and other organizations creating positive impact -- right now? This presentation gives examples and use cases, as well as resources and tools you can use to stay updated on trends in blockchain and other emerging technology.
Presented at Better World Day 2019 in Cleveland, OH by Amy Neumann, founder and executive director of the 501(c)3 nonprofit, Free Tech for Nonprofits.
OWASP AppSec Cali 2018 - Enabling Product Security With Culture and Cloud (As...Patrick Thomas
Abstract from OWASP AppSec California 2018:
----------------------------
What would it look like if security never had to say “no”?
This talk explores that counter-intuitive premise, and shows how it is not just possible but *necessary* to discard many traditional security behaviors in order to support modern high-velocity, cloud-centric engineering teams. For the product security team at Netflix, this is the logical implication of a cultural commitment to enabling the organization.
Attendees will learn how to replace heavy-handed gating with an automation-first approach, and build powerful security capabilities on top of cloud deployment primitives. Specific examples including provable application identity, immutable and continuous deployment, and secret bootstrapping illustrate how this approach balances security impact with engineering enablement.
Contact:
@astha_singhal
@coffeetocode
Version with speaker notes: https://www.slideshare.net/coffeetocode/owasp-appsec-cali-2018-enabling-product-security-with-culture-and-cloud-astha-singhal-patrick-thomas-with-speaker-notes-public
Erik Costlow, Product Evangelist at Contrast Security, was Oracle's principal product manager for Java 8 and 9, focused on security and performance. His security expertise involves threat modeling, code analysis, and instrumentation of security sensors. He is working to broaden this approach to security with Contrast Security. Before becoming involved in technology, Erik was a circus performer who juggled fire on a three-wheel vertical unicycle.
Pragmatic approach to Microservice Architecture: Role of MiddlewareAsanka Abeysinghe
Microservice Architecture (MSA) is emerging as a popular architecture pattern in today’s agile enterprise. Its iterative architecture and development methodologies are particularly attracting the interest of architects who need continuous delivery to fulfil business needs.
But, is every characteristics of MSA new or even pragmatic? Asanka Abeysinghe, vice president of solutions architecture at WSO2, will provide insights into MSA requirements from real-world examples and provide details of an architect friendly pragmatic approach for this architecture pattern.
Middleware plays a key role in successful MSA-based implementations. Using the correct middleware capabilities enable enterprises to fully leverage advantages provided by MSA, and ensures ease of implementation and faster time to market.
Asanka will explain essential middleware capabilities required to resolve the MSA puzzle, where you can also utilize supportive technologies such as Continuous Integration (CI), containerization and Container as a Service (CaaS).
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...Resourceful Nonprofit
What is blockchain?
What are examples of how blockchain is being used for business?
Will blockchain impact my business?
What can I learn and do right now for my business?
Presented by Amy Neumann at Power Hour CLE August 22, 2019. #Cleveland #blockchain
Every big firm is now plunging into the pool of Blockchain. The technology has taken the world by storm, and we have seen some huge transformation across the different industrial segments. The latest name that has emerged is Samsung. South-Korean electronics giant Samsung has started to work on Ethereum-based Blockchain, and the company also aims to issue its token down the line.
5 major advantages of blockchain technology for engineering students Blockchain Council
Have you ever been wondered what are benefits of blockchain for engineering students? Have you ever been wondered what is the blockchain developer salary. If yes, then you have landed on the right page. The blockchain platform is the new era of emerging technology. There are various types of blockchain courses available online. In this blog, we will discuss why engineers should learn blockchain technology.
The first workshop earlier in the week at New York University, exploring #Analytics on a #DLT #Blockchain platform and the intersection of DLT and #AI.
The proliferation of Blockchain technology is so much so that it has also emerged as a popular career option; the demand for Blockchain certification and Blockchain online training program has increased.
How Blockchain Technology affects Mobile Application Development Experience.pptxShelly Megan
We are a team of professional Blockchain developers providing top-of-the-line Blockchain app development services to several businesses across the globe
Developing DeFi (decentralised finance) apps with EthereumMichael John Peña
Blockchain is not dead. Actually, quite the contrary is happening in the past year. There are more and more interest and it's gaining a lot more traction than before. A big portion of this growth is due to "DeFi" AKA Decentralised Finance applications. From the hyped cryptocurrencies, we are now seeing the new next wave of this transformation as we see more financial products being developed: lending, exchanges, yield farming, and pools just to name a few.
Using Xamarin and Microsoft Azure, you can have an end-to-end Native Mobile blockchain application. We also explored the technology architecture of Azure Blockchain workbench.
In this slide, I talked about why Blockchain as a technology may not be a feasible solution to your problems. This is a lightning talk that I presented in NDC Sydney 2018.
Blockchain and Angular.js What it means for web developersMichael John Peña
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for web developers and how to get started writing your own Decentralised App. The speaker coming from a developer background himself, will bridge the gap the knowledge to fast-track the audience in DApps development.
The audience will also learn available platforms and tooling within the Blockchain space. The speaker will highlight some of the good use cases of Blockchain and when NOT to use it.
Blockchain has been a big buzz lately. There are a lot of demand for DApps (Decentralised Applications) developers in the market right now.
In this session, the audience will understand the fundamentals of a Blockchain platform, what it means for businesses and what to expect from Blockchain.
== Blockchain and Angular (by Michael John Pena)
Blockchain has been a big buzz in the technology world lately. But why should it matter to web developers? In this session, MJ will walk you through on what is a Blockchain, Ethereum and Smart Contracts. This will then be followed on how you can interface your Angular web app to Ethereum with the use of Web3.js.
Presented on NG-Sydney
Industry Best Practices and Trends in Information Technology 2016Michael John Peña
In this Presentation, you will learn the latest trends and best practices in the field of software engineering and it. It covers from Web, Mobile, Cloud and DevOps for 2016.
An introduction of Xamarin.Forms for C# Developers.
This discusses the basic features for Xamarin.Forms: ListView, Pages and some Platform Specific handlings.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
6. A Block is a series of facts with
Append only operations
A Chain is formed through
Consensus Algorithm
Mining is the act of looking for
blocks for the facts
Blockchain 101Block 77
Fact A
Fact H
Fact G
Block 78
Fact Z
Fact I
Fact F
Block 78
Fact Z
Fact I
Fact F
Unmined Facts
Fact AA
Fact BB
Fact CC
Fact DD
7. DApps (Decentralised Applications)
A Blockchain app can be both Decentralized and Distributed
Source: http://www.cs.cmu.edu/~artigas/classproj/osproj.pdf
8. DApp Architecture
A Blockchain app can be both Decentralized and Distributed
Source: https://medium.com/@mvmurthy/ethereum-for-web-developers-890be23d1d0c
9. Smart Contracts and Solidity
A contract-oriented programming language.
Cuts the middlemen (becomes
the middleman)
Defines the logic for Token
distribution
Inspired by C++, Python, and
JavaScript
10. Dev Tools – Truffle Suite
Truffle Ganache Drizzle
All images shown here are property of respected trademarks.
11. Dev Tools
VS Code Metamask Etherscan
All images shown here are property of respected trademarks.
12. Environments
MainNet and TestNets (Ropsten, Kovan and Rinkeby)
IAAS Templates: Azure, AWS, Google and IBM
Advanced Scaffold: Azure Blockchain Workbench
14. If you treat it like a Centralised
Database
No partnership / Inter-business
transactions
Infrastructure cost is not
justifiable
When it doesn’t make
sense