A primer on how the blockchain may be repurposed within higher education contexts. Based on research and praxis. Link to the webinar: https://www.youtube.com/watch?v=2ubwTmtlkWc&t=316s
Getting Started in Blockchain Security and Smart Contract AuditingBeau Bullock
Why is blockchain security important?
Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.
The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.
All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology new issues are being found daily.
In this Black Hills Information Security (BHIS) webcast, we'll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.
Decentralized finance is a distributed financial system where there is no centralized governing body. Decentralized finance or DeFi applications utilize peer-to-peer finance networks. These networks are powered by decentralized and distributed platforms. The DeFi application ecosystem is vast and it includes various types of apps such as wallets, lending platforms, infrastructure development suits etc.
As there are many DeFi applications on the market, finding the top applications can be a difficult process. Here, we will discuss the top 5 DeFi applications – AAVE, Compound, MakerDAO, Synthetix, and MetaMask.
These are some of the widely utilized applications on the market. If you want to learn more about decentralized finance applications, then we have you covered. 101 blockchains feature a blockchain course that focuses on decentralized finance and will help you understand the working mechanism of this new financial structure.
Learn more about the course from here ->
Introduction to DeFi Course
https://academy.101blockchains.com/courses/defi-course
Learn about additional courses and masterclasses for the finance sector ->
Blockchain in Finance Masterclass
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals. Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Read our full guide on this topic ->
https://101blockchains.com/decentralized-finance-applications/
https://101blockchains.com/top-defi-protocols/
https://101blockchains.com/top-defi-wallets/
https://101blockchains.com/best-defi-asset-management-tools/
https://101blockchains.com/decentralized-finance-tools/
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Getting Started in Blockchain Security and Smart Contract AuditingBeau Bullock
Why is blockchain security important?
Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.
The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.
All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology new issues are being found daily.
In this Black Hills Information Security (BHIS) webcast, we'll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.
Decentralized finance is a distributed financial system where there is no centralized governing body. Decentralized finance or DeFi applications utilize peer-to-peer finance networks. These networks are powered by decentralized and distributed platforms. The DeFi application ecosystem is vast and it includes various types of apps such as wallets, lending platforms, infrastructure development suits etc.
As there are many DeFi applications on the market, finding the top applications can be a difficult process. Here, we will discuss the top 5 DeFi applications – AAVE, Compound, MakerDAO, Synthetix, and MetaMask.
These are some of the widely utilized applications on the market. If you want to learn more about decentralized finance applications, then we have you covered. 101 blockchains feature a blockchain course that focuses on decentralized finance and will help you understand the working mechanism of this new financial structure.
Learn more about the course from here ->
Introduction to DeFi Course
https://academy.101blockchains.com/courses/defi-course
Learn about additional courses and masterclasses for the finance sector ->
Blockchain in Finance Masterclass
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals. Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Read our full guide on this topic ->
https://101blockchains.com/decentralized-finance-applications/
https://101blockchains.com/top-defi-protocols/
https://101blockchains.com/top-defi-wallets/
https://101blockchains.com/best-defi-asset-management-tools/
https://101blockchains.com/decentralized-finance-tools/
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
The Defiant YouTube's Robin Schmidt created a DeFi 101 presentation explaining what this new blockchain-based financial freedom is all about. You'll get the definitions you need to talk the talk, the protocols to get you started and the data sources to not get rekt.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
With the basics of Corda under your belt we will take you to the next level of your Corda distributed application (CorDapp). In this boot camp we’ll help you learn how to use tokens capabilities.
Tokens give developers the ability to represent fungible assets on the ledger. The token SDK does much of the heavy lifting for you on the logic needed for issuance and management of tokens. This capability gives developers a fast way to create tokenized assets on Corda with real-world business use cases supported.
Learn more about Corda: www.corda.net
Join our community: slack.corda.net
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019Fluidity
Presented by Brendan Forster, Co-founder of Dharma, at Fluidity 2019.
Fluidity brings the worlds of finance and technology together to shape the future of blockchain and capital markets. On May 9, 2019, we welcomed companies and teams to help shape the narrative of rebuilding finance at the historic Williamsburgh Savings Bank in Brooklyn, New York.
Resources:
Website: https://fluiditysummit.com
Facebook: https://facebook.com/fluidityio/
Twitter: https://twitter.com/fluidityio
LinkedIn: https://linkedin.com/company/fluidityio/
YouTube: https://youtube.com/channel/UC0NBCYlgLIxjSljf7CV91nQ/
Blockchain can be used across the whole manufacturing industry to address all different types of projects and stakeholders. Its value to the manufacturing vertical is promising as Industry 4.0 continues to grow.
The Defiant YouTube's Robin Schmidt created a DeFi 101 presentation explaining what this new blockchain-based financial freedom is all about. You'll get the definitions you need to talk the talk, the protocols to get you started and the data sources to not get rekt.
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
Drummond Reed, Chief Trust Officer at Evernym, will explain in our second Webinar "Decentralized Identifiers (DIDs) - Building Block of Self-Sovereign Identity (SSI)" giving us the background on how DIDs work, where they come from and why they are important for Blockchain based Digital Identity.
With the basics of Corda under your belt we will take you to the next level of your Corda distributed application (CorDapp). In this boot camp we’ll help you learn how to use tokens capabilities.
Tokens give developers the ability to represent fungible assets on the ledger. The token SDK does much of the heavy lifting for you on the logic needed for issuance and management of tokens. This capability gives developers a fast way to create tokenized assets on Corda with real-world business use cases supported.
Learn more about Corda: www.corda.net
Join our community: slack.corda.net
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
"Decentralized Finance (DeFi)" by Brendan Forster, Dharma | Fluidity 2019Fluidity
Presented by Brendan Forster, Co-founder of Dharma, at Fluidity 2019.
Fluidity brings the worlds of finance and technology together to shape the future of blockchain and capital markets. On May 9, 2019, we welcomed companies and teams to help shape the narrative of rebuilding finance at the historic Williamsburgh Savings Bank in Brooklyn, New York.
Resources:
Website: https://fluiditysummit.com
Facebook: https://facebook.com/fluidityio/
Twitter: https://twitter.com/fluidityio
LinkedIn: https://linkedin.com/company/fluidityio/
YouTube: https://youtube.com/channel/UC0NBCYlgLIxjSljf7CV91nQ/
Blockchain can be used across the whole manufacturing industry to address all different types of projects and stakeholders. Its value to the manufacturing vertical is promising as Industry 4.0 continues to grow.
Blockchain - a platform for Digital Transformation in FinanceBlockchain Worx
Propelled by new business models and opportunities to upgrade the existing legacy infrastructure, institutional interest in Blockchain technology continues to rapidly grow. From digital identity and asset tokenization to using smart contracts to automate business processes, Blockchain technology is swiftly establishing itself as a key enabler of the emerging digital finance environment.
The presentation outlines a strategy, an approach, and select considerations to help financial institutions harness the potential of Blockchain technology for Digital Transformation.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfPixel Softwares
Reinvent Digital Dynamics: Embrace the power of blockchain technology to reimagine your digital strategy. With decentralized solutions and smart contracts, Pixel Softwares can revolutionize your business landscape.
This study explains all the advantages and disadvantages of Blockchain and the Distributed Ledger technologies, outlines the proven use cases and provides business insights on what can be achieved in future. You will also find an explanation of the core problems in Finance, Logistics, Insurance, Supply Chain and other industries that are being solved with Blockchain now.
A guest lecture delivered by Dr Farrukh Habib at INCEIF, Kuala Lumpur, on 22nd March, 2018.
Dr Farrukh Habib is an expert in sharia and Islamic finance. He is a adviser, researcher and trainer. He is keen interest in FinTech.
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance Kellton Tech Solutions Ltd
Join this webinar to learn how distributed ledger technologies - Blockchain & Cryptocurrencies innovating the traditional financial services industry with a transformative impact.
Blockchain - Primer for City CIOs v05 01 22.pdfssusera441c2
Blockchain primary for city government chief information officers. Originally prepared for the Cities Leadership Forum hosted by Cities Institute, Philadelphia March 2022.
There's a lot of buzz around Blockchain, Is Blockchain the next” Big Thing" in the IT industry? It certainly looks to have a huge impact in finance, but it could also have far reaching effect in many other industries as well
Developing a system for the accreditation of digital learning in MaltaStrategyWorks
Slides underpinning a presentation at EDEN 2016 in Budapest. Work in progress related to development of a robust, transparent accreditation system for digital education.
Deck of slides that underpinned a talk I gave on Open Government and Social Media to COMNET (Commonwealth Network of Information Technology for Development)
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
5. European Blockchain Services
Infrastructure (EBSI)
• Investment to date: Euros 400M
• +300 contributing
• 20 member states hosting 27
live nodes
• 3 use cases being added 2021
EBSI is one of Europe’ Connecting
Europe Facility (CEF) Digital Building
Blocks
A Building Block is an open and
reusable digital solution.
It can take the shape of a framework,
a standard, a software, or a software
as a service (SaaS), or any
combination thereof.
3 new use cases are in initiation phase / design phase
SME financing, European Social Security Identification Number, Asylum
process management
Source: European Commission, 2021
8. A blockchain is a record of chronological transactions, much like a traditional financial ledger.
Transactions are recorded with an immutable cryptographic signature called a “hash”, and then
“grouped in blocks”.
A blockchain is a type of distributed ledger technology (DLT). A distributed ledger is a
decentralised database, distributed across several computers or nodes, managed by multiple
participants, without the participation of a central authority. Each node has equal status in terms
of authority, without a central authority or server managing the database, so each node can
independently maintain and update the ledger and any of the nodes will verify its existence.
Each new set of transactions,“blocks,” are recorded and cryptographically linked to the
previous record, forming a “chain”.
Every new block includes a hash of the previous one, chaining them together - hence a
“blockchain”.
Blockchains are the foundation of high-profile technologies such as cryptocurrency (e.g.
Bitcoin), and promise to change how data is managed and shared in a variety of industries,
including education
Adapted from: https://medium.com/designing-the-future-of-education-and-workforce/education-have-a-problem-put-a-blockchain-on-it-bc2574826752
10. The Blockchain as a
Cryptographically-
Secure
Decentralised
Distributed Database
/ Ledger
A Digital Log or Digital database of transactions.
A Database that is shared across either a
public or a private network.
When data is read or written from the
database, the correct cryptographic keys are
needed to complete the transaction:
- A Public key, basically the address and the
database where information is stored,
- A Private key, which is your personal key -
the security which prevents other people
from updating the information unless they
have that correct key.
11. 11
Notarization of a
credential on the
blockchain means
storing its hash
on the distributed
ledger
Source: MITTechnology Review (2018)
PROCESS INTEGRITY
12. 12
StrategyWorks | Mastercard Foundation Workshops: Technology-Enabled Credentials for Young People in Africa
CRYPTOGRAHIC HASH FUNCTION
19. 19
Central
Database
STRUCTURE OF A MODERN DATABASE
Users store
their
information
Institution
manages &
controls
Parties consult database
20. BLOCKCHAIN ADDRESSS RISKS BY REMOVING
NEED FOR CENTRAL AUTHORITY
✓ Each user (node) stores a complete
copy of the database
✓ Each user (node) has to approve each
entry
✓ The version with the most copies is
the ‘true’ version
21. Records are cryptographically-linked, making them nearly
impossible to change.
Data in the block cannot be altered or removed.
Every transaction exists in perpetuity while blockchain exists.
The database can only be updated when the majority of
independent computers check and verify those credentials
that allow you to write to the database.
Security against single point of failure and somebody working
nefariously to try and corrupt the database.
The database can only be updated when two things happen.
1)The correct credentials are being applied - the private and
public key together.
2)Those credentials are being verified by a majority of
participants in the network.
IMMUTABILITY
PROCESS INTEGRITY
22. The distributed electronic ledger
functionality provides a mechanism for a
community to record & exchange
information.
Each member maintains his or her own
copy of the information and all members
must validate any updates collectively.
The information could represent
transactions, contracts, assets, identities,
or practically anything else that can be
described in digital form.
Every network user has their own copy of
the entire blockchain.
Entries and updates are permanent,
transparent, and searchable, which makes
it possible for community members to
view transaction histories in their entirety.
TRANSPARENCY &
PROVENANCE IN LOW-
TRUST ENVIRONMENTS
23. DECENTRALISED DEMOCRACY
TRUSTLESS ARCHITECTURE
A database shared across a number of participants
A trustless network of participants, where each has
a computer.
Information is potentially available to all participants
at a moment in time.
27. “The next step beyond user-centric identity [where] the
user must be central to the administration of identity”
Allen’sTen Principles of Self-Sovereign Identity
28. TRADITIONAL IDENTITY
MANAGEMENT
• User’s identity defined from perspective of the
provider for a specific purpose and is
therefore only valid within the domain of that
specific provider within that purview.
• People have all sorts of identities conferred on
them in various forms (passports, proof of
employment, diplomas) and by various third
parties operating as sources of authority (e.g.,
credentialing bodies).
SELF-SOVEREIGN IDENTITY
• Individuals are the ultimate source of data
about themselves: a citizen's identity pre-exists
before the conferral of an identity by any third
party.
• In building and governing a network of globally
acceptable self-sovereign identity, in any such
network the three core tenets of individual
control, security and full portability must be
met.
29. In their digital interactions, users are
enabled to choose which specific
pieces of their own information, claims
or credentials they can disclose to
third parties.
Verifiable Claims are credentials such
as educational degrees, business
licenses, citizenship, etc., which are
issued by an authority or verifiable
through a signature of an attestation
issuer, who can attest its validity.
30. People have the right to create, own and manage
their identity records in a manner that is private
and with no dependency on a centralised authority
to transmit or verify records.
This requires both recipient ownership & vendor
independence.
When the blockchain is properly used as a
decentralized verification network, it offers
the ability to unlock the power of digital
records by making them trustworthy and
instantly verifiable anywhere in the world.
SELF-
SOVEREIGN
IDENTITY
Improperly used, the blockchain becomes
an unnecessarily cumbersome technical
layer.
37. FUNCTIONAL BUILDING BLOCKS FOR
DIGITALLY-SIGNED CREDENTIALS
IDENTIFY
The individual who is going to
be awarded a certificate
documenting her/his skills,
competences or qualifications
1
ISSUE
A digitally-signed credential or
a revocation certificate to an
individual. Both certificates
should be issued by an
awarding body
2
STORE
The digital certificate after
having been issued by an
awarding body. Individuals
should have the possibility to
save their certificate on online
platforms and wallets;
3
SHARE
The digital certificate with an
employer or other
organisations. Individuals
should be able to decide with
whom they wish to share their
certificate with
4
VERIFY
The authenticity of the digital
certificate that has been
willingly shared by an
individual with an employer or
other organisations. The
accreditation of the awarding
body could also be verified
(i.e. if an awarding body is
authorised to issue a certain
certification about a specific
qualification).
5
38. Data can be
CHANGED
(hacked)
•Institutional Staff can change
grades after the fact
•Database can be
compromised (fake degrees)
1
Data can be
DELETED
•Data loss through disasters
(fire, war, etc)
•Data loss through accidents
2
Institution can
PREVENT ACCESS
•Students not given access to
metrics held on them
•Disputes over ownership of
intellectual property
3
Institution can put
CONDITIONS on
access
•Institutions can charge for
verifying data (certificates)
•Digital data only available
through proprietary systems
4
Institution can use
data in an
UNAUTHORISED
manner
•Sharing data with third
parties
•Profiling of students
5
RISKS WITH CREDENTIALING PROCESS
Limited Access to
Underlying
Information
Credentials are still
not digital
Lack of (Technical)
Standards for
Credential
Information
Closed Standards for
Security &
Verification
No Aggregation of
Credential Data
39.
40. Verifiable Credentials
DIDs serve as unique identifiers for individual credentials that are registered with a public network.
Notably, DIDs are built on open standards, so individuals can register any DID to any public network
without being locked into a particular vendor or system. Decentralised identifiers provide a means for
both institutions and learners to establish identity without relying on a centralised party. The same DID
a user uses to access a state system could be utilized as a consistent, platform independent identifier
across systems to access school records, university credits, professional development courses, and
vocational school.
Private keys constitute the digital signature of the trusted issuer. Private keys are typically issued by
trusted third party certification authorities. In the case of a user,. one of the trusted issuers might be the
trade school she attended years ago.When the private key of the trade school is associated with the
digital credential that she sends to the community college, it serves as proof that the credential is
genuine and was issued by the school. Private keys can be loosely compared to the physical key to a
house.
Public keys are paired with private keys and written to the public network in association with DIDs to
give verifiers a way to associate issuers’ DIDs with digital signatures. If a private key can be compared to
the physical key to a house, the corresponding public key is the house’s address. Both the private and
public keys are needed to access credentials.
Adapted from: https://medium.com/designing-the-future-of-education-and-workforce/education-have-a-problem-put-a-blockchain-on-it-bc2574826752
41. EBSI identity and diploma management: It is about creating an
entire ecosystem.
Request and issue identity credential
A
Citizen
(Present identity credential)
Request and issue diploma credential
Present diploma credential
Check identity credential
Check diploma credential
Company
University B
University A
Government
B
Government
A
Wallet / Personal
datastore
EBSI Ledger
B
A
B
E
A
B
C
D
E
F
G
H
F
G
G Anchor decentralized ID
i
i
Authenticate and store credentials
j
j
D H
D H
C
C
Identity
Diploma
Wallet
Store evidences* of issuance (of identity
credential)
Store evidences* of issuance (of diploma
credential)
Source: European Commission, 2021
42. Does your system
use an Open
Standard?
• This is a way of ensuring the
system survives even as
vendors come and go.
Does your system
allow us to anchor
records to any
blockchain?
• If not, the system is likely
using a proprietary, non-
standard approach, and/or
network, that violates the
principle of independence.
Public blockchains have
proven they can scale and
survive security threats. And
their openness (open-source,
open-access, borderless,
neutral) goes a long way to
preventing censorship down
the line. Anchoring
important records to brand
new networks is simply an
unnecessary risk.
Does the issuing
system allow
records to verify
even if we (the
issuing institution)
cease to exist?
• If not, then the blockchain is
not being used properly. One
of the main benefits of
blockchain technology is
increased durability and
convenience. If a solution
remains centralized, no new
benefits are actually gained.
If the vendor goes
down or goes out
of business
completely, will the
records still verify?
• If not, these records don’t
provide the longevity
required of important
identity records. Vendors go
down, get acquired, or go
out of business all of the
time. Records intended to
last a lifetime, like birth
certificates, need to last
beyond the lifetime of any
specific vendor.
How do recipient
keys or
Decentralized
Identifiers (DIDs) get
generated, retrieved,
and built into the
credential about to
be issued?
• If this isn’t happening at all,
the system is not providing
recipient ownership. For
instance, an academic
transcript issued to “John
Smith” could be used by any
John Smith. That isn’t good
enough. The real John must
be able to demonstrate that
the transcript was originally
issued to him.
FIVE QUESTIONSTO DETERMINE SELF-SOVEREIGNTY IN CREDENTIAL ISSUING SYSTEMS
Adapted from: https://medium.com/designing-the-future-of-education-and-workforce/education-have-a-problem-put-a-blockchain-on-it-bc2574826752
50. WORLD’S LARGEST DEVELOPER COMMUNITY
WORLD’S LARGEST FORM OF
INFORMAL ONLINE LEARNING
REPUTATIONS COMPLEMENT FORMER CREDENTIALS
ONLINE COURSES FROM REPUTABLE
BRICKS & MORTAR INSTITUTIONS
NETWORK OF EDUCATORS, EXPERTS &YOUTH-SERVING
NGOs MOBILISING NEWTECHNOLOGY IN SERVICE OF
EQUITY,ACCESS & OPPORTUNITY FOR ALLYOUNG PEOPLE
51. • 60% had not used distance and online
learning before the crisis
• 95% believe COVID-19 crisis marks a
point of no return for how tech is used
in education & training
• Online learning resources and content
need to be more relevant, interactive &
easy to use
• Over 60% improved their digital skills
during the crisis
• More than 50% of respondents want to
do more with tech
Source: European Commission, 2020
58. AS A TRUSTLESSTECHNOLOGY,
BLOCKCHAIN ADDRESSS RISKS BY REMOVING
NEED FOR A CENTRAL AUTHORITY
✓ Each user (node) stores a complete
copy of the database
✓ Each user (node) has to approve each
entry
✓ The version with the most copies is
the ‘true’ version
59. THREE TYPES OF DECENTRALISATION?
Political Logical Architectural
60. RESISTANCE COMES IN MANY FORMS
• Little trust in trustless technology
• Levels of security, privacy and scalability
required for public digital services higher than
other industry
• Cybersecurity sensitivity - insufficient levels for
data & processes involved
• Relative immaturity of technology
• Trust minimizing architectures should not
replace interpersonal trust or prevent its
emergence.
• Open standards yet to be adopted by most
nation states
• Nothing open or decentralised about Estonian
blockchain model!
62. INTEROPERABILITY HAS BOTH A PHILOSOPHICAL &
TECHNOLOGICAL DIMENSION (SMIT, 2020)
TECHNICAL
DIMENSION
• Verifiable Credentials
• Information packaged, issued or shared in a standardised format
LEGAL DIMENSION
• Identity and Data
• eIDas trust framework may facilitate identity & cross-border validity
• GDPR regulation, educational jurisdiction rules and national legislation
have to be navigated.
SEMANTIC
DIMENSION
• Standardisation extends beyond technological interaction and the
transmission of data.
• Seamless receipt of the data package, its opening, and a common
understanding of how the fields that make up the data can be read.
GOVERNANCE
DIMENSION
• Overall governance (responsibilities, decision-flows, ownership..)
• Technical governance
• Education governance
• Type of blockchain deployed (public, private, permissioned, permissionless,
hybrid)
• Accreditation taxonomies
63. Source: McKinsey Digital (2021) Seven lessons on how technology transformations can deliver value
68. DEL4ALL upscaled due to
COVID-19 to fast-track a
community of practice working
with emerging technologies
(blockchain, AI, AR and IoT) as a
means of redefining the needs of
digital education.
Main challenges
● Incompatible teaching materials
● Non-existent infrastructure
● Lack of skills
● Missing inspiration of educators and students
● Increased number of unemployment
Main opportunities
● Digital enhanced and personalised learning
● Open Educational Resources
● VR platforms (learning analytics, games, and AI)
● Upskilling programs (distance learning courses)
Main priorities
● Budgetary support, regulation and legal frameworks
● Develop concepts for Internet of Things in education
● Lead open debate about the future of education
● Focus on Capacity building and skills development
● Investments in digital learning
● Technology based interactive learning process
● Rethink teaching business model
● Capitalise on the upskilling and development
● Position technologies on the value chain
69. WWW.DEL4ALL.EU
EdTech for the near future..
Online video conferencing
• Pedagogically questionable
Anywhere Labs (IoT, AR)
Augmented Reality for mimetic learning
• ‘Reality as a medium’
AI learning assistants
Distributed ledgers for trusted student data
70.
71. Source: Scholar Coin White Paper (2018)
An innovative, decentralized network
leveraging blockchain technology to
securely create, manage and distribute
resources for the education ecosystem.
“White paper that will help your upcoming
discussion. My team & I have already built
the blockchain platforms you’re going to be
discussing. I’ll send our white paper & other
information if you’re interested...”
72. Blockchain was conceived as machines
working together to reach consensus.
It is an appropriate metaphor for
collaborative networks.
By building upon the scaffolding of
existing trust and relationships,
blockchains can spur thinking about
data use, data ownership, and data
control.
DECENTRALISED
RESILIENT MODEL
FOR THE EDUCATION
SYSTEMWE NEED
75. This is about creating an ecosystem. By joining it, each actor will be able
to contribute to the future of Digital Europe.
75
A
Citizen
Company
EBSI Ledger
B
A
B
E
F
G
G
i
j
D H
D H
C
C
You?
You?
Request and issue identity credential
(Present identity credential)
Request and issue diploma credential
Present diploma credential
Check identity credential
Check diploma credential
A
B
C
D
E
F
G
H
Anchor decentralized ID
i
Authenticate and store credentials
j
Identity
Diploma
Wallet
Store evidences* of issuance (of identity
credential)
Store evidences* of issuance (of diploma
credential)
You?
76. USE A CARROT & STICK APPROACH FOR DLT ADOPTION
Regulatory Frameworks &Technical Standardisation essential
Establish clear common legal base for the deployment of smart
contract & digital signatures, with appropriate coordination and
convergence
Strengthen cooperation & exchange with international partners
Consider Digital Education Hubs that identify, share & scale up
good practice supporting the education and training sector with
tools, frameworks, guidance, technical expertise & research
Link national and regional digital education initiatives and actors
Support cross-sector collaboration & new models for exchange
of digital learning content, addressing issues such as common
standards, interoperability, accessibility and quality-assurance.
80. NEWTYPE OF LEARNING
• Lifelong Acquisition of skills
• Delivered by a variety of
stakeholders (NGOs, private
sector,TVET…)
• Combined with more Formal
Education pathways
NEW REQUIREMENTS ON
CREDENTIAL SOLUTIONS
• SameValidity as formal education
credentials
• Stackable Credentials
• Sharing ofWork-based experiences
• Mobility
• Transparency
• Fraud reduction
ONGOING
LABOUR MARKET
CHALLENGES
81. TVET, Lifelong Learning
entities and the Labour market
more receptive to embracing
SSI and Blockchain Credentials
than Universities
83. TECHNOLOGY
IS CHANGING!
SOCIALWORLD
IS CHANGING!
NEW INFRA-
STRUCTURE
NEW DEVICES
NETWORK
SOCIETY
PARTICIPATORY
CULTURE
ATTENTION
ECONOMY
NEW
SERVICES
E-COMMERCE
NEW
PLATFORMS
GOVERNANCE &
REGULATION
IDENTITY &
SOCIALITY
POWER &
MEANING
BLOCKCHAIN,
AI, VR,AR
BIG DATA +
ALGORITHMS
POST-TRUTHS
SOCIAL
NETWORKS
SOCIAL
MEDIA
PRIVACY &
SURVEILLANCE
MOBILE +
WEARABLES
CONTENT
MARKETING
CITIZEN
MEDIA
ONLINE
INFLUENCE
DIGITAL
POLITICS
NEW MEDIA
INDUSTRY
PLATFORM
CAPITALISM
DIGITAL
PLENITUDE
Reflexive relationship between digital media & social world: from theory to praxis
86. “Never underestimate the resilience of
the credential as long as humans are in
the business of demonstrating their
worth to others. It remains the lingua
franca of social capital.
It will probably become even more
important as young people get used to
re-inventing themselves every five years,
as informal and professional learning
starts to secure parity with traditional
higher education.
Yet we need to reimagine the credential,
in view of the affordances of blockchain
technologies”.
https://medium.com/digital-citizenship/blockchain-education-credentials-862070bb3f83
89. The important question is not
whether ‘the system’ is
decentralised or centralised.
It’s whether the blockchain can
truly contribute to an immediate
future where monopoly is
impossible.
90. THE ALTERNATIVE IS NOT INFERIOR
THE ALTERNATIVE IS INCREASINGLY LIKELYTO BECOME
MAINSTREAM ONCE COVID-19 IS A MEMORY