SlideShare a Scribd company logo
Blockchain in the
Food Supply Chain
Peter.Kirchner@Microsoft.com
Social everything: about.me/peterkirchner
15.03.2018 @ Azure Meetup Munich
Topics
Covered
Motivation, why and what
Workflow
Architecture
Smart Contract
Implementation
Food Supply
Chain
Workflows
Workflow 2:
Receive the
proof
Receive the proof via mail
Validate the proof
Workflow 1:
Storing a Lab
Report
Receive it via mail
Store it via the Outlook Add-In
Forward the proof
Architecture
Smart Contract
• Events
• StoreProofCompleted
• TransferCompleted
• Functions
• storeProof()
• transfer()
• hasProof()
• getProofInternal()
• getProof()
• getEncryptedProof()
• getPublicProof()
• getOwner()
• getPreviousTrackingId()
contract ProofOfProduceQuality {
struct ProofEntry {
address owner;
string encryptedProof;
string publicProof;
string previousTrackingId;
}
…
}
Implementation
• 3 projects
• Umbrella:
https://github.com/Azure/blockchain-supply-
chain-solution
• https://github.com/Azure/supply-chain-
office-integration
• https://github.com/Azure/supply-chain-
services
• https://github.com/Azure/supply-chain-
smart-contracts
Deployment
Local via geth or
testrpc
Ethereum (public
or private)
References
• GitHub
• https://github.com/Azure/blockchain-
supply-chain-solution
• Code Story
• https://www.microsoft.com/developerblog/
2018/02/26/using-private-ethereum-
consortium-network-store-validate-
documents/
• This Presentation
• Share link in Meetup event page next week
Blockchain in the Food Supply Chain

More Related Content

What's hot

Full stack visibility with elastic, KubeCon 2017
Full stack visibility with elastic, KubeCon 2017Full stack visibility with elastic, KubeCon 2017
Full stack visibility with elastic, KubeCon 2017
Carlos Pérez-Aradros
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Tom Kerkhove
 
This Week in Neo4j- 1st December 2018
This Week in Neo4j- 1st December 2018This Week in Neo4j- 1st December 2018
This Week in Neo4j- 1st December 2018
Neo4j
 
Storage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use CasesStorage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use Cases
Hybrid Cloud
 
Open Legislative Data Conference 2014
Open Legislative Data Conference 2014Open Legislative Data Conference 2014
Open Legislative Data Conference 2014
Logilab
 
DRI Community Forum - Repository Updates
DRI Community Forum - Repository UpdatesDRI Community Forum - Repository Updates
DRI Community Forum - Repository Updates
dri_ireland
 
Azure IoT, Power BI and Sharepoint Online
Azure IoT, Power BI and Sharepoint OnlineAzure IoT, Power BI and Sharepoint Online
Azure IoT, Power BI and Sharepoint Online
Vitaly Zhukov
 
Azure DocumentDB
Azure DocumentDBAzure DocumentDB
Azure DocumentDB
Shiju Varghese
 
Artik cloud deview 2016
Artik cloud   deview 2016Artik cloud   deview 2016
Artik cloud deview 2016
NAVER D2
 
Introduction to Azure Event Grid
Introduction to Azure Event GridIntroduction to Azure Event Grid
Introduction to Azure Event Grid
Callon Campbell
 
Victoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint SearchVictoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint Search
Andy Hopkins
 
Compliance Testing of Open Source Software for Web Processing Services
Compliance Testing of Open Source Software for Web Processing ServicesCompliance Testing of Open Source Software for Web Processing Services
Compliance Testing of Open Source Software for Web Processing Services
Theodor Foerster
 
Reliable and Efficient Facebook data processing
Reliable and Efficient Facebook data processingReliable and Efficient Facebook data processing
Reliable and Efficient Facebook data processing
Andres Buritica
 
CodeMash 2013 Microsoft Data Stack
CodeMash 2013 Microsoft Data StackCodeMash 2013 Microsoft Data Stack
CodeMash 2013 Microsoft Data Stack
Mike Benkovich
 
IoT Discovery tutorial
IoT Discovery tutorialIoT Discovery tutorial
IoT Discovery tutorial
Tarek Elsaleh
 

What's hot (15)

Full stack visibility with elastic, KubeCon 2017
Full stack visibility with elastic, KubeCon 2017Full stack visibility with elastic, KubeCon 2017
Full stack visibility with elastic, KubeCon 2017
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
 
This Week in Neo4j- 1st December 2018
This Week in Neo4j- 1st December 2018This Week in Neo4j- 1st December 2018
This Week in Neo4j- 1st December 2018
 
Storage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use CasesStorage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use Cases
 
Open Legislative Data Conference 2014
Open Legislative Data Conference 2014Open Legislative Data Conference 2014
Open Legislative Data Conference 2014
 
DRI Community Forum - Repository Updates
DRI Community Forum - Repository UpdatesDRI Community Forum - Repository Updates
DRI Community Forum - Repository Updates
 
Azure IoT, Power BI and Sharepoint Online
Azure IoT, Power BI and Sharepoint OnlineAzure IoT, Power BI and Sharepoint Online
Azure IoT, Power BI and Sharepoint Online
 
Azure DocumentDB
Azure DocumentDBAzure DocumentDB
Azure DocumentDB
 
Artik cloud deview 2016
Artik cloud   deview 2016Artik cloud   deview 2016
Artik cloud deview 2016
 
Introduction to Azure Event Grid
Introduction to Azure Event GridIntroduction to Azure Event Grid
Introduction to Azure Event Grid
 
Victoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint SearchVictoria SPUG - Building Applications with SharePoint Search
Victoria SPUG - Building Applications with SharePoint Search
 
Compliance Testing of Open Source Software for Web Processing Services
Compliance Testing of Open Source Software for Web Processing ServicesCompliance Testing of Open Source Software for Web Processing Services
Compliance Testing of Open Source Software for Web Processing Services
 
Reliable and Efficient Facebook data processing
Reliable and Efficient Facebook data processingReliable and Efficient Facebook data processing
Reliable and Efficient Facebook data processing
 
CodeMash 2013 Microsoft Data Stack
CodeMash 2013 Microsoft Data StackCodeMash 2013 Microsoft Data Stack
CodeMash 2013 Microsoft Data Stack
 
IoT Discovery tutorial
IoT Discovery tutorialIoT Discovery tutorial
IoT Discovery tutorial
 

Similar to Blockchain in the Food Supply Chain

Getting notified by SharePoint with the webhook functionality
Getting notified by SharePoint with the webhook functionalityGetting notified by SharePoint with the webhook functionality
Getting notified by SharePoint with the webhook functionality
Elio Struyf
 
Testing Microservices
Testing MicroservicesTesting Microservices
Testing Microservices
Anil Allewar
 
Blockchainification of existing applications - a case study of a standard per...
Blockchainification of existing applications - a case study of a standard per...Blockchainification of existing applications - a case study of a standard per...
Blockchainification of existing applications - a case study of a standard per...
Imre Kocsis
 
API-Driven Relationships: Building The Trans-Internet Express of the Future
API-Driven Relationships: Building The Trans-Internet Express of the FutureAPI-Driven Relationships: Building The Trans-Internet Express of the Future
API-Driven Relationships: Building The Trans-Internet Express of the Future
Pat Patterson
 
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
Matt Raible
 
Building Event-Based Systems for the Real-Time Web
Building Event-Based Systems for the Real-Time WebBuilding Event-Based Systems for the Real-Time Web
Building Event-Based Systems for the Real-Time Web
pauldix
 
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
DIWUG
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
Matt Lucas
 
Microservices for the Masses with Spring Boot and JHipster - RWX 2018
Microservices for the Masses with Spring Boot and JHipster - RWX 2018Microservices for the Masses with Spring Boot and JHipster - RWX 2018
Microservices for the Masses with Spring Boot and JHipster - RWX 2018
Matt Raible
 
Developing applications with Hyperledger Fabric SDK
Developing applications with Hyperledger Fabric SDKDeveloping applications with Hyperledger Fabric SDK
Developing applications with Hyperledger Fabric SDK
Horea Porutiu
 
Introduction to the Globus Platform (APS Workshop)
Introduction to the Globus Platform (APS Workshop)Introduction to the Globus Platform (APS Workshop)
Introduction to the Globus Platform (APS Workshop)
Globus
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
Álvaro Alonso González
 
Leveraging APIs from SharePoint Framework solutions
Leveraging APIs from SharePoint Framework solutionsLeveraging APIs from SharePoint Framework solutions
Leveraging APIs from SharePoint Framework solutions
Dragan Panjkov
 
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE - ATT&CKcon
 
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX
 
O365Con19 - Automate All The Things - Chris Goosen
O365Con19 - Automate All The Things - Chris GoosenO365Con19 - Automate All The Things - Chris Goosen
O365Con19 - Automate All The Things - Chris Goosen
NCCOMMS
 
Google Cloud DevOps Engineer Professional Training Course - PPT.pdf
Google Cloud DevOps Engineer Professional Training Course - PPT.pdfGoogle Cloud DevOps Engineer Professional Training Course - PPT.pdf
Google Cloud DevOps Engineer Professional Training Course - PPT.pdf
Multisoft Virtual Acedamy
 
Google Cloud DevOps Engineer Professional Training Course.pdf
Google Cloud DevOps Engineer Professional Training Course.pdfGoogle Cloud DevOps Engineer Professional Training Course.pdf
Google Cloud DevOps Engineer Professional Training Course.pdf
Multisoft Virtual Acedamy
 
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
Ville Mattila
 
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & AuthorisationBiodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
Renzo Kottmann
 

Similar to Blockchain in the Food Supply Chain (20)

Getting notified by SharePoint with the webhook functionality
Getting notified by SharePoint with the webhook functionalityGetting notified by SharePoint with the webhook functionality
Getting notified by SharePoint with the webhook functionality
 
Testing Microservices
Testing MicroservicesTesting Microservices
Testing Microservices
 
Blockchainification of existing applications - a case study of a standard per...
Blockchainification of existing applications - a case study of a standard per...Blockchainification of existing applications - a case study of a standard per...
Blockchainification of existing applications - a case study of a standard per...
 
API-Driven Relationships: Building The Trans-Internet Express of the Future
API-Driven Relationships: Building The Trans-Internet Express of the FutureAPI-Driven Relationships: Building The Trans-Internet Express of the Future
API-Driven Relationships: Building The Trans-Internet Express of the Future
 
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
Microservices for the Masses with Spring Boot, JHipster and OAuth - GIDS 2019
 
Building Event-Based Systems for the Real-Time Web
Building Event-Based Systems for the Real-Time WebBuilding Event-Based Systems for the Real-Time Web
Building Event-Based Systems for the Real-Time Web
 
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
SPSNL17 - Getting notified by SharePoint with the webhook functionality - Eli...
 
IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
 
Microservices for the Masses with Spring Boot and JHipster - RWX 2018
Microservices for the Masses with Spring Boot and JHipster - RWX 2018Microservices for the Masses with Spring Boot and JHipster - RWX 2018
Microservices for the Masses with Spring Boot and JHipster - RWX 2018
 
Developing applications with Hyperledger Fabric SDK
Developing applications with Hyperledger Fabric SDKDeveloping applications with Hyperledger Fabric SDK
Developing applications with Hyperledger Fabric SDK
 
Introduction to the Globus Platform (APS Workshop)
Introduction to the Globus Platform (APS Workshop)Introduction to the Globus Platform (APS Workshop)
Introduction to the Globus Platform (APS Workshop)
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
 
Leveraging APIs from SharePoint Framework solutions
Leveraging APIs from SharePoint Framework solutionsLeveraging APIs from SharePoint Framework solutions
Leveraging APIs from SharePoint Framework solutions
 
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
 
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
 
O365Con19 - Automate All The Things - Chris Goosen
O365Con19 - Automate All The Things - Chris GoosenO365Con19 - Automate All The Things - Chris Goosen
O365Con19 - Automate All The Things - Chris Goosen
 
Google Cloud DevOps Engineer Professional Training Course - PPT.pdf
Google Cloud DevOps Engineer Professional Training Course - PPT.pdfGoogle Cloud DevOps Engineer Professional Training Course - PPT.pdf
Google Cloud DevOps Engineer Professional Training Course - PPT.pdf
 
Google Cloud DevOps Engineer Professional Training Course.pdf
Google Cloud DevOps Engineer Professional Training Course.pdfGoogle Cloud DevOps Engineer Professional Training Course.pdf
Google Cloud DevOps Engineer Professional Training Course.pdf
 
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
Running a Scalable And Reliable Symfony2 Application in Cloud (Symfony Sweden...
 
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & AuthorisationBiodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
Biodiversity Virtual e-Laboratory (BioVeL): Athentication & Authorisation
 

More from Peter Kirchner

Risiko Datensicherheit - eine unterhaltsame Sightseeing Tour
Risiko Datensicherheit - eine unterhaltsame Sightseeing TourRisiko Datensicherheit - eine unterhaltsame Sightseeing Tour
Risiko Datensicherheit - eine unterhaltsame Sightseeing Tour
Peter Kirchner
 
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
Peter Kirchner
 
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
Peter Kirchner
 
Risiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
Risiko Datensicherheit - End-to-End-Verschlüsselung von AnwendungsdatenRisiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
Risiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
Peter Kirchner
 
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
Peter Kirchner
 
Cloud OS - Die Vision und Strategie von Microsoft
Cloud OS - Die Vision und Strategie von MicrosoftCloud OS - Die Vision und Strategie von Microsoft
Cloud OS - Die Vision und Strategie von Microsoft
Peter Kirchner
 
Innovation durch Cloud Computing
Innovation durch Cloud ComputingInnovation durch Cloud Computing
Innovation durch Cloud Computing
Peter Kirchner
 
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzen
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzenWindows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzen
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzenPeter Kirchner
 

More from Peter Kirchner (8)

Risiko Datensicherheit - eine unterhaltsame Sightseeing Tour
Risiko Datensicherheit - eine unterhaltsame Sightseeing TourRisiko Datensicherheit - eine unterhaltsame Sightseeing Tour
Risiko Datensicherheit - eine unterhaltsame Sightseeing Tour
 
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
Web APIs auf dem Prüfstand - Volle Kontrolle oder fertig mit den Azure Mobile...
 
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
Spontan testen! Das eigene Test Lab, für jeden in der Cloud!
 
Risiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
Risiko Datensicherheit - End-to-End-Verschlüsselung von AnwendungsdatenRisiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
Risiko Datensicherheit - End-to-End-Verschlüsselung von Anwendungsdaten
 
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
Das eigene Test Lab, für jeden! (CeBIT-Edition mit Demo-Videos)
 
Cloud OS - Die Vision und Strategie von Microsoft
Cloud OS - Die Vision und Strategie von MicrosoftCloud OS - Die Vision und Strategie von Microsoft
Cloud OS - Die Vision und Strategie von Microsoft
 
Innovation durch Cloud Computing
Innovation durch Cloud ComputingInnovation durch Cloud Computing
Innovation durch Cloud Computing
 
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzen
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzenWindows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzen
Windows Azure IaaS - Mit Cloud Computing Ideen schneller umsetzen
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Blockchain in the Food Supply Chain

Editor's Notes

  1. https://www.meetup.com/Azure-Munich/events/239476820/
  2. https://github.com/Azure/supply-chain-smart-contracts/blob/master/contracts/ProofOfProduceQuality.sol