A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
A brief description of how Blockchain Technology works. It is the technology behind the cryptocurrency. The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
An overview of the Bitcoin protocol, source code, data structures and algorithms. This presentation was delivered at Nova Southeastern University on June 20, 2014 by Chris DeRose of bitcoinfl.org
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
Best practices to build secure smart contractsGautam Anand
- Quick update in blockchain tech space
- Comparision between tech
- Security in Blockchain (Focusing on ETH Solidity attack vectors)
- Design patterns
- 2 Popular hacks (Case study)
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Teach your students blockchain basics with this hands-on exercise that you can play in class. Video walkthrough and complete materials can be found at https://www.instructables.com/id/The-Blockchain-Game/
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
A brief description of how Blockchain Technology works. It is the technology behind the cryptocurrency. The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
An overview of the Bitcoin protocol, source code, data structures and algorithms. This presentation was delivered at Nova Southeastern University on June 20, 2014 by Chris DeRose of bitcoinfl.org
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
Best practices to build secure smart contractsGautam Anand
- Quick update in blockchain tech space
- Comparision between tech
- Security in Blockchain (Focusing on ETH Solidity attack vectors)
- Design patterns
- 2 Popular hacks (Case study)
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Teach your students blockchain basics with this hands-on exercise that you can play in class. Video walkthrough and complete materials can be found at https://www.instructables.com/id/The-Blockchain-Game/
Bitcoin has brought about a true revolution in how we think about money. In one fell stroke it solved the main problems that afflicted previous attempts at a truly digital currency: distributed consensus, double spending, and external attacks. Perhaps more importantly, it provided the first working version of a blockchain or distributed ledger. However, despite their relative simplicity, the underlying concepts on which these technologies are built are not well known and often obscured by hype and technical jargon.
Since the days of Bitcoin’s founding, many other crypto-currencies have been proposed and released. This tutorial will introduce these technologies in an intuitive way for data scientists, explaining their driving algorithms, motivations, and data structures.
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...Dace Barone
He will give an introduction talk about Blockchain technology technical aspects like cryptography, protocols, APIs and scripting with focus on explaining how Bitcoin and other blockchain works and what they consist of.
Yurijs is a Chief Technical Officer at Paybis, blogger at coinside.ru , blockchain enthusiast since 2011.
Abusing Microsoft Kerberos - Sorry you guys don't get itBenjamin Delpy
Talk of Skip Duckwall and I at BlackHat 2014 USA / Defcon Wall of Sheep.
Kerberos, and new pass-the-* feature, like overpass-the-hash and the Golden Ticket
Prof Willy Susilo presented a seminar titled "Blockchain and its Applications" as part of the SMART Seminar Series on 20th September 2018.
More information: https://news.eis.uow.edu.au/event/blockchain-and-its-applications/
Keep updated with future events: http://www.uoweis.co/events/category/smart-infrastructure-facility/
O'Reilly Velocity New York 2016 presentation on modern Linux tracing tools and technology. Highlights the available tracing data sources on Linux (ftrace, perf_events, BPF) and demonstrates some tools that can be used to obtain traces, including DebugFS, the perf front-end, and most importantly, the BCC/BPF tool collection.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. Myth-Busters
● Blockchain doesn’t mean crypto-currency
● Crypto-currency doesn’t mean BitCoin or Ethereum
--------------------------------
● Blockchain is just a technology. ex: database | cache | etc
● Crypto-currency uses an implementation of blockchains
● BitCoin, Ethereum these are all different kinds of
crypto-currencies which use different ways of
implementing the Blockchain
5. What is a hash?
A scrambled representation of a value which is hard to
reverse to determine the original value that it represents.
h = f(x)
Popular hashing functions:
sha1 | sha256 | md5 | AES | bcrypt | many more
10. It always starts with
a block
-
the GENESIS block
● index = 0
● no previous hash
11. The Data
The data can be any
data representing
any event or any
information that
happened in the
world
12. the hash is
produced by
hashing the data
and the nonce
hash = f(data+nonce)
The Hash
Disclaimer: The hash is actually computed from a
combination of several fields like:
(data + nonce + index + previous hash + timestamp).
But for the simplicity of these slides, we will only consider
(data + nonce).
13. The nonce is
determined by
the miner ,
incrementally until
the hash meets a
pre-defined.
difficulty level .
The Nonce
15. ● the data contains any new
information / event
● increments the index by 1
● determines a new nonce
to validate a new hash for
the new data
● previous hash refers to
the hash of the previous
block - which 1 index less
Enter next block
16.
17. ● There is one genesis block
● Every other block follows the genesis block sequentially
● Every block knows the hash of its previous block
● Modify the data in one block:
○ it changes its own hash
○ which invalidates the value of ‘previous hash’ in the
next block
○ which invalidates the next block’s own hash
○ the whole chain collapses following that one block
One chain of many blocks
20. Some pointers
An immutable record of the past
Historical events cannot be changed easily
Democratically determine problematic peers
Can use public-private keypair-signing to further
reinforce integrity of the blockchain