Blockchain philosophy centers around distributed trust and shared truth through transparency. It moves the custody of information from centralized control by one entity to decentralized consensus among many participants. By ensuring everyone has access to the same verified information through an immutable record, blockchain creates certainty in a digital world that has long struggled with issues of identity, data security and authenticity. It extrapolates the idea of a close-knit village community where common knowledge and synchronous truth are the basis for transactions and asset ownership.
Apache Hive is a rapidly evolving project which continues to enjoy great adoption in the big data ecosystem. As Hive continues to grow its support for analytics, reporting, and interactive query, the community is hard at work in improving it along with many different dimensions and use cases. This talk will provide an overview of the latest and greatest features and optimizations which have landed in the project over the last year. Materialized views, the extension of ACID semantics to non-ORC data, and workload management are some noteworthy new features.
We will discuss optimizations which provide major performance gains, including significantly improved performance for ACID tables. The talk will also provide a glimpse of what is expected to come in the near future.
Apache Hive is a rapidly evolving project which continues to enjoy great adoption in the big data ecosystem. As Hive continues to grow its support for analytics, reporting, and interactive query, the community is hard at work in improving it along with many different dimensions and use cases. This talk will provide an overview of the latest and greatest features and optimizations which have landed in the project over the last year. Materialized views, the extension of ACID semantics to non-ORC data, and workload management are some noteworthy new features.
We will discuss optimizations which provide major performance gains, including significantly improved performance for ACID tables. The talk will also provide a glimpse of what is expected to come in the near future.
Technological Geeks Video 13 :-
Video Link :- https://youtu.be/mfLxxD4vjV0
FB page Link :- https://www.facebook.com/bitwsandeep/
Contents :-
Hive Architecture
Hive Components
Limitations of Hive
Hive data model
Difference with traditional RDBMS
Type system in Hive
In this session, I'll talk about phonetic matching with Apache Solr. We start off with an explanation of various Soundex algorithms and learn their shortcomings, then move on to the characteristics of the Beider-Morse algorithm for phonetic matching. I'll demonstrate how to integrate Beider-Morse into your Solr setup and discuss the benefits of it as part of an evaluation performed on real-world data.
This technical presentation shows you the best practices with EDB Postgres tools, that are designed to make database administration easier and more efficient:
● Tune a new database using Postgres Expert
● Set up streaming replication in EDB Postgres Enterprise Manager (PEM)
● Create a backup schedule in EDB Postgres Backup and Recovery
● Automatically failover with EDB Postgres Failover Manager
● Use SQL Profiler and Index Advisor to add indexes
The presentation also included a demonstration. To access the recording visit www.enterprisedb.com and access the webcast recordings section or email info@enterprisedb.com.
We talk a lot about Galera Cluster being great for High Availability, but what about Disaster Recovery (DR)? Database outages can occur when you lose a data centre due to data center power outages or natural disaster, so why not plan appropriately in advance?
In this webinar, we will discuss the business considerations including achieving the highest possible uptime, analysis business impact as well as risk, focus on disaster recovery itself, as well as discussing various scenarios, from having no offsite data to having synchronous replication to another data centre.
This webinar will cover MySQL with Galera Cluster, as well as branches MariaDB Galera Cluster as well as Percona XtraDB Cluster (PXC). We will focus on architecture solutions, DR scenarios and have you on your way to success at the end of it.
Deep Dive on Amazon Aurora with PostgreSQL Compatibility (DAT305-R1) - AWS re...Amazon Web Services
Amazon Aurora with PostgreSQL Compatibility is a relational database service that combines the speed and availability of high-end commercial databases with the simplicity and cost-effectiveness of open-source databases. We review the functionality in order to understand the architectural differences that contribute to improved scalability, availability, and durability. We also dive deep into the capabilities of the service and review the latest available features. Finally, we walk through the techniques that can be used to migrate to Amazon Aurora.
5 Scenarios: When To Use & When Not to Use HadoopEdureka!
Forrester predicts, CIOs who are late to the Hadoop game will finally make the platform a priority in 2015. Hadoop has evolved as a must-to-know technology and has been a reason for better career, salary and job opportunities for many professionals.
This Hadoop Hive Tutorial will unravel the complete Introduction to Hive, Hive Architecture, Hive Commands, Hive Fundamentals & HiveQL. In addition to this, even fundamental concepts of BIG Data & Hadoop are extensively covered.
At the end, you'll have a strong knowledge regarding Hadoop Hive Basics.
PPT Agenda
✓ Introduction to BIG Data & Hadoop
✓ What is Hive?
✓ Hive Data Flows
✓ Hive Programming
----------
What is Apache Hive?
Apache Hive is a data warehousing infrastructure built over Hadoop which is targeted towards SQL programmers. Hive permits SQL programmers to directly enter the Hadoop ecosystem without any pre-requisites in Java or other programming languages. HiveQL is similar to SQL, it is utilized to process Hadoop & MapReduce operations by managing & querying data.
----------
Hive has the following 5 Components:
1. Driver
2. Compiler
3. Shell
4. Metastore
5. Execution Engine
----------
Applications of Hive
1. Data Mining
2. Document Indexing
3. Business Intelligence
4. Predictive Modelling
5. Hypothesis Testing
----------
Skillspeed is a live e-learning company focusing on high-technology courses. We provide live instructor led training in BIG Data & Hadoop featuring Realtime Projects, 24/7 Lifetime Support & 100% Placement Assistance.
Email: sales@skillspeed.com
Website: https://www.skillspeed.com
Slides from a talk I gave at Scandinavian Developers Conference 2012 on the architecture of Spotify. The slides follows a story of playing a track and the steps to get there.
Big Data raises challenges about how to process such vast pool of raw data and how to aggregate value to our lives. For addressing these demands an ecosystem of tools named Hadoop was conceived.
Build your own CDN with Varnish - Confoo 2022Thijs Feryn
Slides for my Confoo 2022 presentation on how to create your own Content Delivery Network using Varnish.
See https://feryn.eu/speaking/build-cdn-varnish-confoo22/ for more information
The Proxy Wars - MySQL Router, ProxySQL, MariaDB MaxScaleColin Charles
As proxies (and database routers) go, the first one I ever used was the now deprecated MySQL Proxy. Since then, I've managed to use MariaDB MaxScale quite a bit (including its fork AirBnB MaxScale), played around with ProxySQL in recent time, and also started taking a look at MySQL Router. In this quick 20-minute overview, we'll discuss why these three exist, a feature comparison, and reasons when to use the right tool for the job.
Kripto para birimlerinin altyapısı olarak adını sıkça duyduğumuz BlockChain, sadece finans değil pek çok alandaki gerçek kullanım senaryoları ile hayatımızı değiştirmeye hazırlanıyor.
Bu etkinliğimizde giriş seviyesinde BlockChain Nedir, günlük hayatta kullanım senaryoları nelerdir ve dünya üzerindeki implementasyon örneklerinden bahsedeceğiz.
Aynı zamanda teknik olarak Microsoft Azure üzerinde BlockChain yapılarını konuşacağımız bu etkinlikte BlockChain konusunda uzman konuşmacılarımız olacak.
• Doğa Öztüzün - Software Architect
• Cavit Yantaç - Chief Evangelist
• Ibrahim Kıvanç – Software Development Engineer
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
Blockchain
- What is Blockchain?
- Blockchain trends
Emerging data protection techniques
- Secure multiparty computation
- Trusted execution environments
- Use cases for analytics
- Industry Standards
Tokenization
- Convert a digital value into a digital token
- Tokenization local or in a centralized model
- Tokenization and scalability
Cloud
- Analytics in Hybrid cloud
Technological Geeks Video 13 :-
Video Link :- https://youtu.be/mfLxxD4vjV0
FB page Link :- https://www.facebook.com/bitwsandeep/
Contents :-
Hive Architecture
Hive Components
Limitations of Hive
Hive data model
Difference with traditional RDBMS
Type system in Hive
In this session, I'll talk about phonetic matching with Apache Solr. We start off with an explanation of various Soundex algorithms and learn their shortcomings, then move on to the characteristics of the Beider-Morse algorithm for phonetic matching. I'll demonstrate how to integrate Beider-Morse into your Solr setup and discuss the benefits of it as part of an evaluation performed on real-world data.
This technical presentation shows you the best practices with EDB Postgres tools, that are designed to make database administration easier and more efficient:
● Tune a new database using Postgres Expert
● Set up streaming replication in EDB Postgres Enterprise Manager (PEM)
● Create a backup schedule in EDB Postgres Backup and Recovery
● Automatically failover with EDB Postgres Failover Manager
● Use SQL Profiler and Index Advisor to add indexes
The presentation also included a demonstration. To access the recording visit www.enterprisedb.com and access the webcast recordings section or email info@enterprisedb.com.
We talk a lot about Galera Cluster being great for High Availability, but what about Disaster Recovery (DR)? Database outages can occur when you lose a data centre due to data center power outages or natural disaster, so why not plan appropriately in advance?
In this webinar, we will discuss the business considerations including achieving the highest possible uptime, analysis business impact as well as risk, focus on disaster recovery itself, as well as discussing various scenarios, from having no offsite data to having synchronous replication to another data centre.
This webinar will cover MySQL with Galera Cluster, as well as branches MariaDB Galera Cluster as well as Percona XtraDB Cluster (PXC). We will focus on architecture solutions, DR scenarios and have you on your way to success at the end of it.
Deep Dive on Amazon Aurora with PostgreSQL Compatibility (DAT305-R1) - AWS re...Amazon Web Services
Amazon Aurora with PostgreSQL Compatibility is a relational database service that combines the speed and availability of high-end commercial databases with the simplicity and cost-effectiveness of open-source databases. We review the functionality in order to understand the architectural differences that contribute to improved scalability, availability, and durability. We also dive deep into the capabilities of the service and review the latest available features. Finally, we walk through the techniques that can be used to migrate to Amazon Aurora.
5 Scenarios: When To Use & When Not to Use HadoopEdureka!
Forrester predicts, CIOs who are late to the Hadoop game will finally make the platform a priority in 2015. Hadoop has evolved as a must-to-know technology and has been a reason for better career, salary and job opportunities for many professionals.
This Hadoop Hive Tutorial will unravel the complete Introduction to Hive, Hive Architecture, Hive Commands, Hive Fundamentals & HiveQL. In addition to this, even fundamental concepts of BIG Data & Hadoop are extensively covered.
At the end, you'll have a strong knowledge regarding Hadoop Hive Basics.
PPT Agenda
✓ Introduction to BIG Data & Hadoop
✓ What is Hive?
✓ Hive Data Flows
✓ Hive Programming
----------
What is Apache Hive?
Apache Hive is a data warehousing infrastructure built over Hadoop which is targeted towards SQL programmers. Hive permits SQL programmers to directly enter the Hadoop ecosystem without any pre-requisites in Java or other programming languages. HiveQL is similar to SQL, it is utilized to process Hadoop & MapReduce operations by managing & querying data.
----------
Hive has the following 5 Components:
1. Driver
2. Compiler
3. Shell
4. Metastore
5. Execution Engine
----------
Applications of Hive
1. Data Mining
2. Document Indexing
3. Business Intelligence
4. Predictive Modelling
5. Hypothesis Testing
----------
Skillspeed is a live e-learning company focusing on high-technology courses. We provide live instructor led training in BIG Data & Hadoop featuring Realtime Projects, 24/7 Lifetime Support & 100% Placement Assistance.
Email: sales@skillspeed.com
Website: https://www.skillspeed.com
Slides from a talk I gave at Scandinavian Developers Conference 2012 on the architecture of Spotify. The slides follows a story of playing a track and the steps to get there.
Big Data raises challenges about how to process such vast pool of raw data and how to aggregate value to our lives. For addressing these demands an ecosystem of tools named Hadoop was conceived.
Build your own CDN with Varnish - Confoo 2022Thijs Feryn
Slides for my Confoo 2022 presentation on how to create your own Content Delivery Network using Varnish.
See https://feryn.eu/speaking/build-cdn-varnish-confoo22/ for more information
The Proxy Wars - MySQL Router, ProxySQL, MariaDB MaxScaleColin Charles
As proxies (and database routers) go, the first one I ever used was the now deprecated MySQL Proxy. Since then, I've managed to use MariaDB MaxScale quite a bit (including its fork AirBnB MaxScale), played around with ProxySQL in recent time, and also started taking a look at MySQL Router. In this quick 20-minute overview, we'll discuss why these three exist, a feature comparison, and reasons when to use the right tool for the job.
Kripto para birimlerinin altyapısı olarak adını sıkça duyduğumuz BlockChain, sadece finans değil pek çok alandaki gerçek kullanım senaryoları ile hayatımızı değiştirmeye hazırlanıyor.
Bu etkinliğimizde giriş seviyesinde BlockChain Nedir, günlük hayatta kullanım senaryoları nelerdir ve dünya üzerindeki implementasyon örneklerinden bahsedeceğiz.
Aynı zamanda teknik olarak Microsoft Azure üzerinde BlockChain yapılarını konuşacağımız bu etkinlikte BlockChain konusunda uzman konuşmacılarımız olacak.
• Doğa Öztüzün - Software Architect
• Cavit Yantaç - Chief Evangelist
• Ibrahim Kıvanç – Software Development Engineer
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
Blockchain
- What is Blockchain?
- Blockchain trends
Emerging data protection techniques
- Secure multiparty computation
- Trusted execution environments
- Use cases for analytics
- Industry Standards
Tokenization
- Convert a digital value into a digital token
- Tokenization local or in a centralized model
- Tokenization and scalability
Cloud
- Analytics in Hybrid cloud
Blockchain technology and internet of things: review, challenge and security...IJECEIAES
Blockchain (BC) has received high attention from many researchers recently because it has decentralization, trusted auditability, and transparency as its main properties. BC has contributed fundamentally to the development of applications like cryptocurrencies, health care, the internet of things (IoT), and so on. The IoT is envisioned to include billions of pervasive and mission-critical sensors and actuators connected to the internet. This network of smart devices is expected to generate and have access to vast amounts of information, creating unique opportunities for new applications, but significant security and privacy issues emerge concurrently because it does not contain robust security systems. BC provides many services like privacy, security, and provenance to the systems that depends on. This research includes analyzing and a comprehensive review of BC technologies. Moreover, the proposed solutions in academia with the methodologies that used to integrate blockchain with IoT are presented. Also, the types of attacks on blockchain are collected and classified. Furthermore, the main contributions and challenges that are included in the literature are explored, then the relevant recommendations for solving the explored challenges are proposed. In conclusion, the integration of BC with IoT could produce promising results in enhancing the security and privacy of IoT environment.
The Future of Cryptocurrency: From Brexit to Post Quantum CryptographySteve Downer
*Blockchain: The New Hero of International Trade?'
*Blockchain & Quantum Computing: Opportunities & Threats
*IOTA: The Future of Secure Distributed Transactions?
*Next Steps
*Recommended Resources
Introduction to Blockchain for BusinessFito Benitez
This presentation introduces the viewer to:
1. blockchain in the context of general purpose technologies (GPTs) as introduced by R. Lipsey on his book Economic Transformations,
2. how innovation leads us to the blockchain and what fundamental problem it solves in today's digital value transactions.
3. the basics of blockchain for business,
4. what is tokenisation, what kind of token categories exist, and how are these category tokens generated.
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Nik Roby
Karen Scarfone
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Computer Security Division
Information Technology Laboratory
Nik Roby
G2, Inc.
Annapolis Junction, MD
Karen Scarfone
Scarfone Cybersecurity
Clifton, VA
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
October 2018
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology
National Institute of Standards and Technology Internal Report 8202
66 pages (October 2018)
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
Email: [email protected]
All comments are subject to release under the Freedom of Information Act (FOIA).
https://csrc.nist.gov/publications
mailto:[email protected]
NISTIR 8202 BLOCKCHAIN TECHNOLOGY OVERVIEW
ii
This publication is available free of charge from
: https://doi.org/10.6028/N
IST.IR
.8202
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and st ...
Call for Papers - 3rd International Conference on Big Data and Blockchain (BD...IJNSA Journal
3rd International Conference on Big Data and Blockchain (BDAB 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.
3rd International Conference on Big Data and Blockchain (BDAB 2022)ijcisjournal
3rd International Conference on Big Data and Blockchain (BDAB 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.
International Conference on Big Data and Block chain (BDAB 2020)IJDKP
International Conference on Big Data and Block chain (BDAB 2020) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Block chain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Block chain.
BDM Meetup #1 - Blockchains for Developers - Part 01Mark Smalley
I shared a little about me and what Neuroware does whilst also providing a little context as to why we have blockchains and why it is we started the Blockchain Developers Malaysia group
Blockchain: The Game-changer To Radically Transform Your Business Emma Jhonson
Blockchain is the latest, most exciting technology to hit the world. But what does it do? Why should you care? And how can you use it in your business right now?
In this pdf, I'll break down blockchain and give you 5 ways to start using this game-changing technology in your company today.
Blockchain technology is a structure that stores transactional records, also known as the block, of the public in several databases, known as the “chain,” in a network connected through peer-to-peer nodes. Typically, this storage is referred to as a 'digital ledger.
Blockchain technology is a structure that stores transactional records, also known as the block, of the public in several databases, known as the “chain,” in a network connected through peer-to-peer nodes. Typically, this storage is referred to as a 'digital ledger.
Call for Papers - International Conference on Big Data and Block chain (BDAB ...ijdms
International Conference on Big Data and Block chain (BDAB 2020) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Block chain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Block chain.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1. Game Changing Technology
Philosophy, Concepts and Applications
For
BDNOG14 Conference (Bdnog.org) on Internet Operational
Technology
11:30am – 1:00 pm Mon 1 Jul 2022 in Cox’s Bazar, Bangladesh
6/30/2022 The Computers Limited (Estd 1983) 1
2. K Atique e Rabbani
B Tech (Hons), UK, FCA
Managing Director, The Computers Ltd
Chief, BARED (Blockchain Academy for Rresearch, Education and Development)
Blockchain Evangelist, Software Project manager, Designer, Software Developer in UK and Bangladesh
Director, Biman Bangladesh Airlines Ltd Board
Independent Director, ADN Telecom Ltd
Board Member and Past President, Institute of Internal Auditors Bangladesh
Former VP, Dhaka Chamber of Commerce and Industry
Founder Member, Past Treasurer and Secretary General, BCS and BASIS
Former Director, ICB Securities Trading Co. and Energypac Power Generation Ltd
Life Member, MECA and Cadet College Club Ltd
fb/atique.rabbani; www.linkedin.com/in/khondkar-atique-e-rabbani-4ab6846/:
https://www.youtube.com/channel/UCG43OKVAHzNwZ5SK_aN28yg
6/30/2022 2
The Computers Limited (Estd 1983)
3. Index
1. Blockchain Philosophy/ Concepts
a. What is a block? What is a blockchain?
b. Today’s predicaments in the digital world
c. Why Blockchain now?
d. Blockchain Philosophy
e. Distributed Ledger Technology
f. Cryptography
g. Hash Functions, NONCE, Merkle Tree, Consensus
Algorithm
h. Smart Contracts
2. Blockchain Applications
a. Bitcoin and other Cryptocurrencies
b. Other Blockchain Applications
c. Blockchain comes to rescue Networking Professionals
and Blockchain DNS
3. Epilogue
6/30/2022 The Computers Limited (Estd 1983) 3
7. Blockchain keeps data in
Blocks. Blocks form a
specially linked
impenetrable chain.
Hence Blockcahin
6/30/2022 7
The Computers Limited (Estd 1983)
8. Database v Blockchain
•Blockchain is a database
but not all databases are
Blockchain
•Databases keep data in
files or tables, Blockchain
keeps data in blocks which
are then chained linked by
cryptographic hashes
6/30/2022 8
The Computers Limited (Estd 1983)
9. What is a Block?
Identity of
Previous Block
Identity of
This Block
Transaction
Data
6/30/2022 9
The Computers Limited (Estd 1983)
10. What is the Chain?
Public or Private
First Block
(Genesis Block)
Previous Block Identity
X1Y1
Previous Block Identity
9845W
This Block Identity
X1Y1
This Block Identity
9845W
This Block Identity
GT6HYM
Transaction Data
A sends Tk 1000 to B
Transaction Data
B sends Tk 2000 to C
Transaction Data
B sends Tk 100 to A
Block 1 Block 2 Block 3
6/30/2022 10
The Computers Limited (Estd 1983)
11. What is Immutable?
First Block
(Genesis Block)
Previous Block Identity
X1Y1
Previous Block Identity
(Mismatch)
9845W
This Block Identity
X1Y1
This Block Identity
(Block ID changes)
RIC78
This Block Identity
GT6HYM
Transaction Data
A sends Tk 1000 to B
Transaction Data
(Say, Some one hacks and
changes Data)
B sends Tk 333 to C
Transaction Data
B sends Tk 100 to A
All transactions are recorded tamper proof in Blockchain- One Open Ledger
6/30/2022 11
The Computers Limited (Estd 1983)
12. What is Distributed?
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous
Block
Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transactio
n Data
A sends Tk
1000 to B
Transactio
n Data
B sends Tk
2000 to C
Transactio
n Data
B sends Tk
100 to A
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous
Block
Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transactio
n Data
A sends Tk
1000 to B
Transactio
n Data
B sends Tk
2000 to C
Transactio
n Data
B sends Tk
100 to A
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous
Block
Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transactio
n Data
A sends Tk
1000 to B
Transactio
n Data
B sends Tk
2000 to C
Transactio
n Data
B sends Tk
100 to A
A B C
6/30/2022 12
The Computers Limited (Estd 1983)
13. What is Decentralised?
Central Authority | Peer to Peer
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous
Block Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transaction
Data
A sends Tk
1000 to B
Transaction
Data
B sends Tk
2000 to C
Transaction
Data
B sends Tk
100 to A
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous Block
Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transaction
Data
A sends Tk
1000 to B
Transaction
Data
B sends Tk
2000 to C
Transaction
Data
B sends Tk 100
to A
First Block
(Genesis
Block)
Previous
Block
Identity
X1Y1
Previous
Block
Identity
9845W
This Block
Identity
X1Y1
This Block
Identity
9845W
This Block
Identity
GT6HYM
Transaction
Data
A sends Tk
1000 to B
Transaction
Data
B sends Tk
2000 to C
Transaction
Data
B sends Tk
100 to A
A B C
6/30/2022 13
The Computers Limited (Estd 1983)
14. Four legs of Blockchain
•Consensus driven
•Immutable
•Decentralised
•Distributed/
Replicated
6/30/2022 14
The Computers Limited (Estd 1983)
15. Information is added when
everyone agrees.
Consensus
6/30/2022 15
The Computers Limited (Estd 1983)
16. Information is safe when no one
can change it.
Immutable
6/30/2022 16
The Computers Limited (Estd 1983)
17. Information is secure
when everyone knows.
Distributed
Decentralised
6/30/2022 17
The Computers Limited (Estd 1983)
19. What is the big deal in
Blockchain?
Certainty
In Digital World
Blockchain, Distributed Ledger Technology, Cryptography, Smart Contract, Block ID, Previous Block ID,
Hash function, Mathematical Algorithm, Proof of Work, Time Stamp, Nonce, Double Spend Problem, Peer
to Peer (P2P) Network, Internet of Value, One way function, protocol, secure by design, Byzantine Fault
tolerance, Decentralised, Documenting Provenance, Cryptocurrency, Identity Management, Merkle Trees,
Satoshi Nakamoto (Bitcoin) , Vitalik Buterin (Ethereum)
6/30/2022 19
The Computers Limited (Estd 1983)
20. What is then Blockchain?
Blockchain is
a. a Concept
b. a Ledger
c. an Asset administration tool
d. a technology (based on
Cryptography and Distributed
Ledger Technology)
6/30/2022 The Computers Limited (Estd 1983) 20
21. Blockchain – Internet of Value
1. Printing press 1439
German Gutenberg –
democratization of
knowledge to masses –
filled knowledge gap
2. Steam Engine 1781 Scottish
Engineer James Watt –
Industrial Revolution –
filled power gap
3. Internet of Information –
filled information gap
4. Internet of Value – Fourth
Industrial Revolution –
filling
trust/faith/authenticity gap
6/30/2022 21
The Computers Limited (Estd 1983)
22. Blockchain gives us a
World Wide Ledger
It turns Internet of
Information to
Internet of Value
6/30/2022 The Computers Limited (Estd 1983) 22
23. Blockchain – Internet of Value
Just like information one can send
value over internet instantly
without double spend
6/30/2022 23
The Computers Limited (Estd 1983)
24. Blockchain is error free, super audit
friendly Ledger and more
Traceability, Provenance,
Credentialling are its hallmarks
We must know about it from a well informed user level
6/30/2022 24
The Computers Limited (Estd 1983)
25. Blockchain Trilemma
• Centralisation – Decentralisation
continuum
• Secure – insecure continuum
• Fast – slow continuum
• More decentralization, more security,
less speed of execution
• Less decentralization, less secure,
higher speed of execution
• Innovations addressing these
6/30/2022 The Computers Limited (Estd 1983) 25
26. Types of Blockchain
• Public
• Bitcoin, Ethereum
• Permissionless
• Any one can join
• Decentralised, disintermediated, secure, slow
• Public and Open - Currencies
• Public and Closed – Voting
• Private
• Hyperledger
• R3 CORDA
• Quorum
• Permissioned
• Consortium – industry players controlled
• Only permitted can join
• Centralised – Decentralised, Less Secure, faster
• Private and Open – Government records
• Private and Closed – Tax returns, Military
6/30/2022 The Computers Limited (Estd 1983) 26
38. Rising Trends in ICT -1
Rise in Computing power
6/30/2022 38
The Computers Limited (Estd 1983)
• Gordon Moore ( born Jan 3, 1929 ) is the co-founder and Chairman Emeritus of
Intel Corporation and the author of Moore's Law.
• Under Gordon Moore, Intel introduced the world's first single-chip
microprocessor, the Intel 4004 invented by Intel engineers
39. Rising Trends in ICT-2
Rise in Computing power
6/30/2022 39
The Computers Limited (Estd 1983)
• Moore's Law - observation made in 1965 by Gordon Moore,
co-founder of Intel
• Number of transistors per square inch on integrated circuits
would double every year since the integrated circuit was
invented.
• Moore predicted that this trend would continue for the
foreseeable future.
40. Rising Trends in ICT-3
Rise in Information Storage from Analog to Digital format
6/30/2022 40
The Computers Limited (Estd 1983)
• 5 billion (63% of world population) internet users upto April 2022.
• Compare this to the 3.42 billion users at the end of 2016.
• Over 1.94 billion websites
• info.cern.ch was the first-ever website on the Internet, published on August 6, 1991.
• Over 7 billion search queries a day processed by Google (though some say it could be
as high as 10 billion per day).
• 15% of those queries are new - have never been searched for on Google before.
41. Rising Trends in ICT-4
Rise in Computing power
Rise in Information Storage from Analog to Digital format
Rising interest in Blockchain
6/30/2022 41
The Computers Limited (Estd 1983)
43. Blockchain is the difference between
Vanity Digitisation
and
Sanity Digitisation
6/30/2022 The Computers Limited (Estd 1983) 43
44. সৎসঙ্গে স্বর্গবাস,
অসৎ সঙ্গে সবগনাশ
You are known by the
company you keep.
6/30/2022 The Computers Limited (Estd 1983) 44
45. Ours is a digital world. No going away from that.
1. Be careful of the company you keep. Be careful
of the technology we adopt.
2. What good is technology if it steals my identity,
my privacy, hacks my data, my mind.
3. So far we had sort of vanity digitization.
4. Blockchain has ushered in sanity Digitisation.
6/30/2022 The Computers Limited (Estd 1983) 45
53. Blockchain is
an age old village
community idea
extrapolated in this internet
connected digital world
6/30/2022 The Computers Limited (Estd 1983) 53
54. Blockchain – One truth
Everyone knows the same
1. In a village called Abhaypara in Bangladesh
there are about 200 people
2. Assume there is no “Matabbor” in
Abhaypara
3. Everyone knows which house, piece of
land, cow, goat, duck, chicken belong to
whom
4. If some one sells something to someone
everyone knows it
5. They all depend on synchronous common
knowledge – one truth
6. Basis of Blockchain idea
6/30/2022 54
The Computers Limited (Estd 1983)
55. Essence
•Blockchain is
essentially a cash
system for all value
exchange done
electronically
•No intermediaries
•Instant settlement
6/30/2022 55
The Computers Limited (Estd 1983)
56. Team sport/ Community Game
Both Blockchain and
most present day
systems are team
sport/ community
game – Hence
coordinated
governance is crucial
6/30/2022 The Computers Limited (Estd 1983) 56
58. Take Blockchain’s calling
Beyond all the technicalities
Blockchain gives us reliable
record keeping
-the core need of our times
6/30/2022 58
The Computers Limited (Estd 1983)
59. Blockchain – Magic Dust
Technologies like AI, ML, DL can intimidate.
1. AI mimics human intelligence
2. ML learns by itself and can improve for eternity.
3. This can challenge humans whose learning diminishes with time.
4. DL shaped around neural network gets better at recognition with each iteration
5. IOT senses, captures and communicates information.
6. More technologies like VR, AR, Robotics abound.
7. We see explosion of data.
8. Blockchain will provide the confidence that all data are correct.
9. Blockchain provides the inherently secure, authenticity lending, peer to peer
deccentralised community governed, privacy preserving platform
10. It is the magic dust
6/30/2022 The Computers Limited (Estd 1983) 59
60. DLT – Distributed Ledger Technology
Tamper proof system of record
Authenticity
Data Security
Decentralisaton
No middle men
Disintermediation
Privacy protection
Self sovereign ID
User Owning Data
User empowerment
Rules without rulers
Blockchain Foundational Technology
6/30/2022 The Computers Limited (Estd 1983) 60
64. Double Entry Ledger – Over 600 years old
6/30/2022 The Computers Limited (Estd 1983) 64
1. Luca Pacioli (1447-1517)
2. Franciscan Friar (Mendicant, live
on alms)
3. Taught Mathematics to Leonardo
da Vinci
4. In 1494 in Venice published
Summa de arithmetica,
geometria. Synthesis of
mathematical knowledge, algebra
and double entry accounting
system.
65. FACT or FICTION
Good Information – Reliable Data
1. Toshiba declared false profit of $1.2 billion in
(2015)
2. Satyam (2009) falsely boosted revenue by $1.5
billion
3. Lehman Bros (2008) a 158 year old company
collapsed, $50 billion worthless assets hidden
4. AIG (2005) booked loans as revenue
5. Worldcom (2002) underreported line costs by
capitalizing rather than expensing and inflated
revenues with fake accounting entries
6. Tyco (2002) siphoned money out through
unapproved loans
7. Enron (2001) kept debts off Balance Sheet
6/30/2022 65
The Computers Limited (Estd 1983)
66. Ledger (System of Record) through times
1. Manual: Centralised, Middlemen, Very
limiting, Untenable
2. Digital: Still Centralised, Middlemen,
One point of vulnerability, privacy
compromising, insecure data
3. Blockchain based Digital:
Decentralised, No middlemen, Peer to
peer, Consensus based information
entry, Unerasable data, tamper proof
record keeping, One state of
information accessible by all users
6/30/2022 The Computers Limited (Estd 1983) 66
67. Legacy - Individual Double Entry Ledgers
6/30/2022 67
The Computers Limited (Estd 1983)
A B
C
D
Ledger for Ledger for
Need Reconciliation, Debtors verification, Audit
Ledger for Ledger for
68. Blockchain - Open Ledger
No need for reconciliation or debtor circularization
A sends Taka 100 to B
B sends Taka 50 To C
C sends Taka 40 To D
D sends Taka 10 To A
6/30/2022 68
The Computers Limited (Estd 1983)
A B
C
D
69. Blockchain - Distributed Ledger
No need for reconciliation or debtors circularization
A sends Taka 100 to B
B sends Taka 50 To C
C sends Taka 40 To D
D sends Taka 10 To A
6/30/2022 69
The Computers Limited (Estd 1983)
A B
C
D
A sends Taka 100 to B
B sends Taka 50 To C
C sends Taka 40 To D
D sends Taka 10 To A
A sends Taka 100 to B
B sends Taka 50 To C
C sends Taka 40 To D
D sends Taka 10 To A
A sends Taka 100 to B
B sends Taka 50 To C
C sends Taka 40 To D
D sends Taka 10 To A
70. Distributed Ledger Technology
DLT / Shared Ledger
6/30/2022 70
The Computers Limited (Estd 1983)
• DLT – Same Ledger on every node across institutions, sites or
countries
• DLT – Consensus Ledger – Consensus algorithm (PoW, PoS, Voting
System)
• All nodes connected peer to peer
• No central administrator
• No centralized Data Storage
• Blockchain is based on DLT
• DL can be permissionless or permissioned
• This determines if anyone or only approved people can run a node
to validate transactions
71. Blockchain is an open
(notarized realtime)
ledger replicated over
nodes.
6/30/2022 71
The Computers Limited (Estd 1983)
72. Blockchain is error free, super audit
friendly Ledger and more
Traceability, Provenance,
Credentialling are its hallmarks
We must know about it from a well informed user level
6/30/2022 72
The Computers Limited (Estd 1983)
73. Satoshi Nakamoto is Luca Pacioli of our times
Luca Pacioli (1447-1515) v Nakamoto (31 Oct 2008)
6/30/2022 The Computers Limited (Estd 1983) 73
75. A word about Cryptography
1. If we wish to communicate without
third party knowing we use
Cryptography.
2. It is the study and practice of secure
communication in the presence of
third parties called adversaries.
3. It comes from Greek words meaning
hidden, secret, to write and study.
4. Cipher text is unintelligble text as
opposed to understandable plain
text
6/30/2022 75
The Computers Limited (Estd 1983)
76. A word about Cryptography -3
Symmetric v Asymmetric Cryptography
6/30/2022 76
The Computers Limited (Estd 1983)
78. Cryptographic Hash Function
1. Mathematical Algorithm turns data
(called message) of any size to a fixed size
string called a hash or digest.
2. It is a one way function ie one cannot
retrieve message from digest. It is
infeasible to do so.
3. It is deterministic in that message will
always produce same digest
4. It is quickly done
5. Any small change in message will
produce a totally different digest
6. It is infeasible to have same digest from
two different messages
6/30/2022 78
The Computers Limited (Estd 1983)
79. Hashing
SHA 256 (Secure Hashing Algorithm)
Text SHA 256 Hash of your string (https://passwordsgenerator.net/sha256-hash-generator/)
Hi 3639EFCD08ABB273B1619E82E78C29A7DF02C1051B1820E99FC395DCAA3326B8
Welcome 0E2226B5235F0FF94A276EB4D07A3BFEA74B7E3B8B85E9EFCA6C18430F041BF8
Taka 3000 1445603B96C797AD81A6964BDE7414D46B595BDD709E35D23BADB3550D7E2A5C
1. In the case of SHA-256, no matter how big or small your input is, the
output will always have a fixed 256-bits length (64 characters)
2. This becomes critical when you are dealing with a huge amount of data
and transactions.
3. So basically, instead of remembering the input data which could be huge,
you can just remember the hash and keep track.
4. https://emn178.github.io/online-tools/sha256.html
5. https://passwordsgenerator.net/sha256-hash-generator/
6. https://andersbrownworth.com/blockchain/
6/30/2022 79
The Computers Limited (Estd 1983)
81. NONCE and PROOF OF WORK -1
NONCE – Number used ONCE
• It is an arbitrary number used once
• Used in cryptographic communication
• Nonce are used to avoid replay attacks.
• For example an attacker could order products over and over again under the
same name and purchase information by getting hold of the encrypted order
information and—without needing to decrypt—continue to repeatedly send that
particular order to the supplier.
• The nonce is used to give 'originality' to a given message so that if the company
receives any other order from the same person with the same nonce, it will
discard those as invalid orders.
• In Bitcoin mining miners who find a nonce to obtain the desirable hash wins
bitcoins.
6/30/2022 81
The Computers Limited (Estd 1983)
82. NONCE and PROOF OF WORK-2
Proof of Work
• Proof-of-Work, or PoW, is the original consensus algorithm in a
Blockchain network.
• In Blockchain, this algorithm is used to confirm transactions and
produce new blocks to the chain.
• With PoW, miners compete against each other to complete
transactions on the network and get rewarded
• Nonce are used in Proof of Work
• Nonces are used in proof of work systems to vary the input to
a cryptographic hash function so as to obtain a hash for a certain
input that fulfills certain arbitrary conditions.
6/30/2022 82
The Computers Limited (Estd 1983)
85. Smart Contracts
• Smart contracts are Blockchain-based contracts enforced in
real-time by computer code and no human intervention.
• They are created as an agreement between two or more
parties without the involvement of any intermediary.
• The contract exists across a distributed and decentralized
Blockchain network.
• Smart contracts are now a staple in healthcare, real estate,
and even for government agencies.
6/30/2022 The Computers Limited (Estd 1983) 85
92. Satoshi Nakamoto – Bitcoin creator
1. Lehman Bros collapsed on Sep
15 2008.
2. Satoshi Nakamoto is a
pseudonym for a person or
group of persons who released
a white paper on Oct 31, 2008
called “Bitcoin: A Peer-to-Peer
Electronic Cash System”
3. It created the world’s first peer
to peer decentralized monetary
system. First manifestation of
Blockchain.
4. Internet based money enabled
online payments without a
third party
5. It (Bitcoin) was not issued by
any Government or third party
6/30/2022 92
The Computers Limited (Estd 1983)
94. What is Ethereum?
1. Ethereum is an open software platform based on
blockchain technology that enables developers
to build and deploy decentralized applications.
2. Thirty big banks, tech giants, and other
organizations—including J.P. Morgan
Chase, Microsoft, and Intel—are uniting to build
business-ready versions of the software behind
Ethereum, a decentralized computing network
based on digital currency.
3. Until relatively recently, building blockchain
applications has required a complex background
in coding, cryptography, mathematics as well as
significant resources.
4. But times have changed. Previously unimagined
applications, from electronic voting & digitally
recorded property assets to regulatory
compliance & trading are now actively being
developed and deployed faster than ever before.
Vitalik Buterin, Russian Canadian,
born 1994, Co founder of Ethereum
6/30/2022 94
The Computers Limited (Estd 1983)
95. FIAT CURRENCY V CRYPTOCURRENCY
•FIAT CURRENCY HAS
PHYSICAL FORM
•FIAT CAN ALSO
HAVE ELECTRONIC
FORM
•CRYPTOCURRENCY
IS VIRTUAL/ DIGITAL
WHICH CAN TAKE
THE FORM OF
TOKENS OR COIN
6/30/2022 The Computers Limited (Estd 1983) 95
99. Global Blockchain Market -1
• From $3 billion
in 2020 to $40
billion in 2025
• CAGR
(Compound
Annual Growth
Rate) of 67.3%
from 2020 to
2025
6/30/2022 The Computers Limited (Estd 1983) 99
100. 6/30/2022 100
The Computers Limited (Estd 1983)
Which countries or regions have most blockchain innovations?
Which markets are the hottest?
103. Blockchain Use Cases
1. Government – in most of its operations
2. Accounting
3. Audit
4. Financial Services Industry
5. Insurance (including micro insurance)
6. Supply Chain, Logistics, Procurement in all
industry
7. Food Safety
8. Counterfeit protection
9. Manufacturing and Retail
10. Healthcare
11. Education
12. Defence
13. Airlines/ Aviation Industry
14. Real Estate
15. Transport and Tourism
16. Media
17. Marketing
18. Charity
19. Refugees
20. Cybersecurity
21. Digital Identity
22. Voting
23. Fundraising
24. Notary
25. Intellectual Property
26. Cryptocurrency
27. Any transaction/ process oriented task
6/30/2022 The Computers Limited (Estd 1983) 103
105. Blockchain Applications in Bangladesh -1
1. In Bangladesh BCC has a pilot certificate credentialling
application
2. IPDC has ‘Orjon’, blockchain based supply chain finance built
on Hyperledger Fabric in 2019.
3. SCB and Contour facilitated using private blockchain to settle
paperless local LC between Viyellatex Spinning and Viyellatex
Garments. SCB, using ANT Group Blockchain technology
launched remittance from Malaysia using bKash.
4. HSBC Bangladesh uses Blockchain to import 20,000 tons of
fuel oil from United Group’s Singapore subsidiary United
Mymensingh Power on the Contour DLT platform. Time was
reduced from 5-10 days to less than 24 hours.
6/30/2022 105
The Computers Limited (Estd 1983)
106. Blockchain Applications in Bangladesh -2
1. Bank Asia incorporating Ripple X Current system
with its CBS to connect to Ripplenet for smoother
remittance transactions.
2. Robi has “Phone Loan” smartphone financing
campaign, a solution using Alternative Credit
Scoring powered by Blockchain and Big Data
analytics.
3. We, in TCL (The Computers Ltd) are planning to
produce “Sanad” for certifying any document
anchored on a public blockchain.
6/30/2022 106
The Computers Limited (Estd 1983)
107. 2b
Blockchain comes to rescue
Networking Professionals,
Blockchain DNS
6/30/2022 The Computers Limited (Estd 1983) 107
108. Blockchain comes to rescue
Networking Professionals
1. Networking professionals design, configure, monitor and secures network.
2. It is difficult to ensure whether data provided by networking analysis tools
have been compromised or not.
3. Shifting network and packet management data to a smart contract based,
decentralized Blockchain will certainly give networking professionals
confidence that data is verifiable, auditable, tamper proof.
4. Multiple observers/ nodes can participate to create consensus for network
data/ traffic.
5. Marconi protocol is a new blockchain protocol that uses programmable
packets to enhance security, privacy and neutrality.
6. Marconi protocol provides for a new networking management
infrastructure that retains the connectivity of Ethernet but supplements it
with security, privacy, and decentralized networking.
6/30/2022 108
The Computers Limited (Estd 1983)
109. Blockchain DNS -1
Traditional DNS
• Companies and
Governments have full
control
• They control what can be
said online. They can control
who says it. Technology
enables above
Blockchain DNS
• Domains are stored by the
user in their
cryptocurrency wallet.
Completely different
architecture.
• Puts the user in control of
what goes up or down
6/30/2022 The Computers Limited (Estd 1983) 109
110. Blockchain DNS -2
Traditional DNS
Registries
• Registry .com owned by Verisign.
• Domains are seizable by registries, say
Verisign under orders from US Govt., say.
• In 1990s one person owned French.com.
France wanted that domain, entered into
legal battle and eventually French.com was
reassigned to French authorities.
• A registry .cat for Catalonia was used for
their independence movement. It was
hunted down and shut down by Spanish
authorities.
Decentralised DNS
Blockchain Registries
• Blockchain registries (as against traditional
domain registry) are launched on public
blockchain.
• Domain names not revocable by the
registry.
• Vulnerability is therefore is access to your
private key.
• If you control your private key you control
your domain name and content within it.
6/30/2022 The Computers Limited (Estd 1983) 110
111. Blockchain DNS -3
Traditional DNS
Registrars
• Registrars like GoDaddy are
mandatory custodians of Domain
names.
• Domains can get hacked and made
inaccessible.
• Registrars can also act on behalf of
some political motive and can take
down domains.
• In Lybia vb.ly taken down by Nic.ly,
the registry for .ly.
Decentralised DNS
Blockchain Registrars
• They are frontend apps.
• They wont take custody of your
domains.
• They are just applications which
will help you to update your
website.
6/30/2022 The Computers Limited (Estd 1983) 111
112. Blockchain DNS -4
Traditional DNS
Hosting Services
• These companies lke Amazon Web Services
or other hosting services can not only
remove your content from their platform
but can make your content disappear
completely from Internet.
• Hosting services used for censorship.
• A pretty damning power to prevent one
from publishing one’s content.
• Turkey banned some words like gay and
naked (138 words) from appearing in any
content in websites in Turkey.
Decentralised DNS
Decentralised hosting services
• For decentralised hosting website
content is stored on p2p storage
networks like IPFS
6/30/2022 The Computers Limited (Estd 1983) 112
115. Blockchain Acceptability
Some countries provide
favourable backdrop
yet others have created
massive roadblocks
6/30/2022 115
The Computers Limited (Estd 1983)
117. Incentive to do better
6/30/2022 The Computers Limited (Estd 1983) 117
118. Blockchain concept will
certainly mutate for the better.
Soon no one will know that
they are using Blockchain
technology.
6/30/2022 118
The Computers Limited (Estd 1983)
120. Why should Bangladesh embrace
Blockchain technology in all earnest
1. We are rightly on the pathway
to become a Digital
Bangladesh – Blockchain
enabled Bangladesh
2. We need to achieve SDG by
2030
3. Blockchain technology
(Blockchain 1.0 → Blockchain
2.0 → ..) brings the confidence
in digital space that no data
manipulations are possible
even if we do not know how it
is being done.
6/30/2022 120
The Computers Limited (Estd 1983)
121. A fair digital Bangladesh
1. $ 3.6 trillion dollars is paid in bribes each year
around the world.
2. Corruption is like cancer. It must be eliminated.
3. Blockchain based data infrastructure including
all public and private data is a must for
Bangladesh.
4. Bangladesh will be run a like well oiled IT
company.
5. Individuals will have all services, government
and others, online at their fingertips.
6. We will have emancipated Blockchain powered
Digital Bangladesh
6/30/2022 121
The Computers Limited (Estd 1983)
123. ব্লকচেইন
এই চেইন চেই চেইন নয়
চেই চেইন চেয় োেত্ব
আর
এই চেইন চেয় মুক্তি
6/30/2022 123
The Computers Limited (Estd 1983)
124. Blockchain
This chain is not that chain
That chain enslaves
This chain liberates
6/30/2022 124
The Computers Limited (Estd 1983)
125. Imagine
by John Lennon and Yoko Ono
A Blockchain song
At the age of 30 in 1971 he dreamed of one world one country
one people united in purpose to repair and change itself.
He believed global harmony is within our reach if we reject social
control that inhibit human potential and create economic class.
6/30/2022 125
The Computers Limited (Estd 1983)
126. Imagine
by John Lennon and Yoko Ono
Imagine there is no heaven it is easy if you try
No hell below us above us only sky
Imagine all the people living for today Ah ha ha
Imagine there’s no countries it isn’t hard to do
Nothing to kill or die for and no religion too
Imagine all the people living life in peace Oohoo ooh
You may say I am a dreamer but I am not the only one
I hope some day you will join us and the world will be as one
Imagine there’s no possessions I wonder if you can
No need for greed or hunger A brotherhood of man
Imagine all the people sharing all the world Oohoo ooh
You may say I am a dreamer but I am not the only one
I hope some day you will join us and the world will live as one
6/30/2022 126
The Computers Limited (Estd 1983)