Open Entrepreneurship_Teigland, Di Gangi, YetisRobin Teigland
Our presentation at the Innovation and Market Creation in and around Virtual Worlds in May 2012 at Copenhagen Business School. More information here: http://nordicworlds.net/2012/04/13/innovation-and-market-creation-in-and-around-virtual-worlds-2/.
CobiT, ITIL, ISO and other frameworks help build security from the top down and bottom up. While they provide benefits, there are also costs to consider. Implementing them over 18-48 months can reduce costs compared to rushing implementation. These frameworks don't need to be implemented exclusively top-down, and allowing bottom-up input can improve communication and wisdom. Visible Ops approaches provide methods to phase in frameworks over time in a controlled manner that balances compliance and agility.
Blockchain law and governance: General Conclusion -- Milan, October 2019Tony Lai
Slides for a presentation given by Tony Lai to conclude the conference on Blockchain Law and Governance – Good for All: Towards a Paradigm Shift, at the Università degli Studi di Milano, on October 26th, 2019. https://apps.unimi.it/web/eventi/resources/external/uploaded/3853_555.pdf
Facilitating Collaborative Life Science Research in Commercial & Enterprise E...Chris Dagdigian
This is a talk I put together for a http://www.neren.org/ seminar called "Bridging the Gap: Research Facilitation". Tried to give a biotech/pharma view for a mostly academic audience.
Blockchain Beyond the Hype. A Practical Framework for Business Leaders. This common sense and practical framework is designed
to assist executives in understanding whether blockchain
is an appropriate and helpful tool for their business needs.
It starts from the premise that blockchain is merely a
technology – much like many others that are already used
in society – and like other technologies it is as much about
change management and careful attention to the economics
and business models of industries and companies involved
as it is about technology evangelism. For any organization,
blockchain technology should not be a goal in itself but a
tool deployed to achieve specific purposes.
Scrum and Compliance for Scrum Gathering Vegas (2013)Laszlo Szalvay
This document discusses making Scrum work in regulated industries. It addresses challenges with compliance requirements and how they can be a hurdle to Agile practices. The document presents quotes from government officials about their experiences using Scrum. It then outlines an agenda to discuss market trends, how teams want to work versus requirements, and potential organizational patterns to address compliance in an Agile way. Case studies are presented and an exercise is described for attendees to build their own organizational pattern.
Melanie Swan gave a presentation on blockchain enlightenment and smart city cryptopolis. She discussed the need to rethink authority and rebuild societal trust through algorithmic trust and reinventing institutions. Blockchain solutions could include governments as service providers and governance blockchains. Her vision is of a smart city where cryptocitizens can economically self-define through participation in multiple political-economic systems and contribute to community sustainability. The goal would be enabling flourishing relationships between humans, algorithms, and machines.
Open Entrepreneurship_Teigland, Di Gangi, YetisRobin Teigland
Our presentation at the Innovation and Market Creation in and around Virtual Worlds in May 2012 at Copenhagen Business School. More information here: http://nordicworlds.net/2012/04/13/innovation-and-market-creation-in-and-around-virtual-worlds-2/.
CobiT, ITIL, ISO and other frameworks help build security from the top down and bottom up. While they provide benefits, there are also costs to consider. Implementing them over 18-48 months can reduce costs compared to rushing implementation. These frameworks don't need to be implemented exclusively top-down, and allowing bottom-up input can improve communication and wisdom. Visible Ops approaches provide methods to phase in frameworks over time in a controlled manner that balances compliance and agility.
Blockchain law and governance: General Conclusion -- Milan, October 2019Tony Lai
Slides for a presentation given by Tony Lai to conclude the conference on Blockchain Law and Governance – Good for All: Towards a Paradigm Shift, at the Università degli Studi di Milano, on October 26th, 2019. https://apps.unimi.it/web/eventi/resources/external/uploaded/3853_555.pdf
Facilitating Collaborative Life Science Research in Commercial & Enterprise E...Chris Dagdigian
This is a talk I put together for a http://www.neren.org/ seminar called "Bridging the Gap: Research Facilitation". Tried to give a biotech/pharma view for a mostly academic audience.
Blockchain Beyond the Hype. A Practical Framework for Business Leaders. This common sense and practical framework is designed
to assist executives in understanding whether blockchain
is an appropriate and helpful tool for their business needs.
It starts from the premise that blockchain is merely a
technology – much like many others that are already used
in society – and like other technologies it is as much about
change management and careful attention to the economics
and business models of industries and companies involved
as it is about technology evangelism. For any organization,
blockchain technology should not be a goal in itself but a
tool deployed to achieve specific purposes.
Scrum and Compliance for Scrum Gathering Vegas (2013)Laszlo Szalvay
This document discusses making Scrum work in regulated industries. It addresses challenges with compliance requirements and how they can be a hurdle to Agile practices. The document presents quotes from government officials about their experiences using Scrum. It then outlines an agenda to discuss market trends, how teams want to work versus requirements, and potential organizational patterns to address compliance in an Agile way. Case studies are presented and an exercise is described for attendees to build their own organizational pattern.
Melanie Swan gave a presentation on blockchain enlightenment and smart city cryptopolis. She discussed the need to rethink authority and rebuild societal trust through algorithmic trust and reinventing institutions. Blockchain solutions could include governments as service providers and governance blockchains. Her vision is of a smart city where cryptocitizens can economically self-define through participation in multiple political-economic systems and contribute to community sustainability. The goal would be enabling flourishing relationships between humans, algorithms, and machines.
This document provides a high-level technical overview of blockchain technology. It describes how blockchains are digital ledgers that record transactions in a distributed manner without a central authority. The first blockchain-based cryptocurrency was Bitcoin, which uses cryptographic functions to securely transfer electronic cash between users recorded on the public blockchain. The document aims to explain the underlying technology behind blockchain in a conceptual manner, as there is significant hype but lack of understanding about how it works. It covers key topics like consensus models, mining, and the challenges of modifying data on an immutable blockchain.
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Nik Roby
Karen Scarfone
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Computer Security Division
Information Technology Laboratory
Nik Roby
G2, Inc.
Annapolis Junction, MD
Karen Scarfone
Scarfone Cybersecurity
Clifton, VA
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
October 2018
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology
National Institute of Standards and Technology Internal Report 8202
66 pages (October 2018)
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
Email: [email protected]
All comments are subject to release under the Freedom of Information Act (FOIA).
https://csrc.nist.gov/publications
mailto:[email protected]
NISTIR 8202 BLOCKCHAIN TECHNOLOGY OVERVIEW
ii
This publication is available free of charge from
: https://doi.org/10.6028/N
IST.IR
.8202
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and st ...
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
This document provides a high-level technical overview of blockchain technology. It describes how blockchains use cryptographic hash functions, transactions, asymmetric cryptography, and addresses to securely record transactions in a distributed digital ledger called blocks that are chained together. It discusses different consensus models like proof-of-work and proof-of-stake used to validate transactions and discusses issues like forking. The goal is to help readers understand the basic concepts and components of blockchain technology without getting into technical details.
The document summarizes the blockchain ecosystem in Asia and Malaysia. It finds that blockchain technology embodies trust without centralized control. It also notes that IT infrastructure readiness and collaboration across industries will be important to support blockchain innovation. The document outlines several government and corporate blockchain initiatives in Asia, including projects in banking, supply chain management, and digital identity. It also discusses challenges related to scalability, privacy and regulation. Finally, it proposes that education, harmonized frameworks and proving public benefits will be needed for further blockchain adoption.
The document discusses blockchain technology and its ideals versus reality. It begins with an abstract noting the surge and fall of cryptocurrencies in 2018. While blockchains were initially seen as a way to create decentralized societies and reduce inequality, in reality blockchain networks have become re-centralized with mining dominated by a few sites. The document then provides background on blockchain technology and how it works in theory versus practice. It discusses some of the challenges blockchains face regarding scalability and decentralization. The speaker proposes two novel approaches to address issues of re-centralization and the scalability trilemma. The talk aims to provide a realistic assessment of blockchains and discuss ongoing research directions.
Feasibilities Study of Blockchain Ecosystem in Asia RegionEffendy Zulkifly
The document summarizes the blockchain ecosystem in Asia, with a focus on Malaysia. It finds that blockchain technology embodies trust and that infrastructure readiness will impact adoption. Collaboration is key to innovation, and a flexible strategy can help overcome challenges like security and scalability. The document outlines government and corporate initiatives in countries like Singapore and Japan and discusses use cases for blockchain in banking, supply chains, and the public sector. It also examines the Malaysia blockchain ecosystem and provides an overview of challenges and the future path forward for blockchain.
The document discusses ABCD (Artificial Intelligence, Blockchain, Cyber Security, Data) and how it is changing the world. It discusses the blockchain ecosystem in Asia, including opportunities and challenges. Key points include:
- Blockchain enables trust in business transactions through decentralization.
- Countries' IT infrastructure readiness will determine their success with blockchain.
- Collaboration is needed for blockchain innovation to thrive.
- Adoption will be gradual, requiring awareness, adoption, and acceptance over time.
- Security, privacy, scalability and interoperability challenges must be addressed through flexible strategies.
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...Resourceful Nonprofit
What is blockchain?
What are examples of how blockchain is being used for business?
Will blockchain impact my business?
What can I learn and do right now for my business?
Presented by Amy Neumann at Power Hour CLE August 22, 2019. #Cleveland #blockchain
Keynote for the "Connecting Erasmus+ Mobility Participants in Open Language Learning Environments that Promote Linguistic and Cultural Awareness"
https://www.openlangnet.eu/events/connecting-erasmus-mobility-participants-in-open-language-learning-environments-that-promote-linguistic-and-cultural-awareness/
Blockchain, IoT and the GxP lab technology helping compliance?
This webinar discusses how distributed ledger technology like blockchain and IOTA could help enhance compliance in GxP laboratories. It explores how DLT could be used to track devices, materials, and data in a more transparent, trusted and auditable way. Specifically, it presents a vision of an internet-connected "laboratory of the future" where all devices share data using DLT. This could improve integrity, security and access to data while reducing costs. While DLT cannot directly increase compliance, it may help build trust in GxP systems and processes by making components more transparent to regulators.
Plenary Talk at ICEIC 2019
Pullman Auckland Hotel, Auckland, New Zealand
Jan. 23th (Wed) 2019, 11:00 ~ 12:30
http://iceic.org/2019/
Abstract
In the year 2018, we have witnessed the surge and the fall of crypto-currencies. With the surge, blockchain the new technology behind cryptocurrencies, and its idealistic footprint of advanced thoughts, blockchainism it can be perhaps called, came to enthrall our minds. Thousands of new ambitious projects have been conceived and fast activated with the worldwide frenzy of new funding through initial coin offerings a novel funding mechanism in the blockchain world. Decentralized societies, equal accesses to valuable resources, reducing the cost of middleman, freed individuals from hierarchical organizations, and reducing the spread in inequalities are some of those advanced thoughts. But the fall came; the market value for Bitcoin has collapsed more than 7 times from its peak-value; that of Ethereum has plummeted more than 12 times. These two power houses which have supported those progressive projects are now torn apart. Recent New York Times report reads, “Blockchain: What’s it good for? Absolutely nothing, report finds.” Another one reads, The Blockchain Is a Reminder of the Internet’s Failure. The same utopian promises that bloomed during the Internet’s early days are back. Be afraid.“ Should this be the end of our pursue to change and make a better world with blockchains? Obviously not. In this presentation, I would like to talk about the reality of blockchain technology and how distant it is from the ideals. With this accessment, I would like to present some of novel research progresses we made in year 2018 and talk about further research ideas to pursue in year 2019.
This document discusses Effendy Zulklifly's background working in blockchain and his involvement with various blockchain organizations. It describes Blockchain Academy Asia, a global blockchain research and education institution founded by Effendy, which offers both online and offline courses on blockchain fundamentals, applications, and development. The document also outlines Blockchain Academy Asia's consulting services, research and development activities, board of advisors, and areas of collaboration.
MIS301 Team Paper #8 Read the articles The Bitcoin B.docxraju957290
MIS301
Team Paper #8
Read the articles The Bitcoin Blockchain: The Magic and the Myths on Isidore.
First, briefly summarize the concept of blockchain in general and then
describe Bitcoin and its relationship to Blockchain. What are the key characteristics
of blockchain that distinguish it from traditional ledgers? What challenges has
Bitcoin faced and what do you believe the future holds for Bitcoin?
Next, research an additional current or potential future use of blockchain
technology (i.e., other than those examples presented in the article). Describe the
scenario, the opportunities that could be exploited from successful implementation,
and the potential challenges that could arise as the example you choose continues to
evolve.
Ensure that your paper is a maximum of three single spaced pages. As
appropriate, you may need to rely on additional research from the web or other
sources.
This research note is restricted to the personal use of [email protected]
This research note is restricted to the personal use of [email protected]
The Bitcoin Blockchain: The Magic and the
Myths
Published: 8 April 2016 ID: G00295779
Analyst(s): Ray Valdes, David Furlonger, Fabio Chesini
Blockchain technology derived from the Bitcoin stack promises much in the
era of digital business. Senior executives and CIOs must understand its
scope of choices, limitations and lack of maturity before making strategic
investments.
Key Findings
■ The Bitcoin blockchain is currently the primary mechanism for implementing a decentralized,
distributed ledger of cryptocurrency transactions — although alternatives are underway.
■ Blockchain technology could reduce transactional friction but, in its current form, suffers from
significant limitations in scalability, governance and flexibility that must first be addressed.
■ A contagion of "blockchain fever" has struck the financial services sector, and Gartner clients in
other sectors are asking whether it is "too late" to join. The answer is — it is, if anything, too
early.
■ There is a contradiction between the requirements of a private blockchain and the capabilities
of public blockchain, which result from its original purpose of creating a value-exchange system
that is resistant to control by a single central authority. This will be an ongoing tension, similar to
the dynamic between public and private cloud.
Recommendations
■ Develop investment plans that accommodate a 90% failure rate for blockchain initiatives over
the next two years, and focus as much on lessons learned as on business value delivered.
■ Consider only tactical narrow-scope deployments of blockchain technology in the short term,
accompanied by understanding that these will have a useful life of at most 24 months (at which
time they will be replaced by more evolved alternatives).
■ Create a strategic evaluation framework of alternative blockchain platforms that weighs aspects
and capabilities, including archi ...
Realizing the potential of blockchain, 2017Roman Bahnaru
This document discusses the need for a multistakeholder approach to governing blockchain technology and cryptocurrencies. It identifies various stakeholders in the blockchain ecosystem like innovators, investors, developers and regulators. It proposes that like the Internet, blockchain requires cooperation across stakeholders and sectors. The document outlines challenges around stewardship of blockchain platforms, applications and the overall ecosystem. It advocates forming networked institutions, standards bodies, advocacy groups, and knowledge networks to help blockchain reach its full potential.
NuCypher ICO Review, Ratings And Complete AnalysisCoinGape
A decentralized Key management system (KMS), NuCypher KMS offers a privacy layer to the distributed systems and decentralized applications. Through its proxy re-encryption and access control services, NuCypher KMS allows DAPP developers to store, share, manage, and secure their data on the blockchain.
This document provides an overview of blockchain technology and its applications in international trade. It analyzes several global case studies of blockchain projects in supply chain transparency, traceability, trade finance, and trade portals. The case studies examine the benefits of blockchain as well as challenges faced during implementation. Lessons from the case studies are then discussed to evaluate blockchain platforms compared to traditional paper-based and centralized systems. The final section highlights key considerations for USAID in implementing blockchain technologies.
Blockchain development has gained immense popularity over the past decade, transcending its initial association with cryptocurrencies. Recognizing the transformative potential of blockchain, Nadcab Labs has dedicated its efforts to harnessing its power and exploring its applications across various industries. Their research is unlocking new possibilities in areas such as finance, supply chain management, healthcare, cybersecurity.
Crypto Coinference 2018 - Make Blockchain mainstream, but without the hype: ...Crypto Coinference
Relatori:
Leonardo Maria De Rossi, Information System Researcher at SDA Bocconi School of Management | Blockchain & Bitcoin teacher at Università Commerciale Luigi Bocconi | Research Leader at DEVO
Nico Abbatemarco, Researcher at SDA Bocconi School of Management | Team Member at DEVO | Blockchain Author & Researcher
Quando si parla di temi come innovazione e digital transformation si fa spesso l’errore, più o meno volontario, di dare all’apparenza un peso molto maggiore rispetto alla sostanza. Questo è particolarmente vero per quanto riguarda blockchain, dove quasi sempre l’hype prevale sulla realtà. In questo contesto, l’università svolge un ruolo fondamentale nel contribuire a determinare quale è il reale valore aggiunto apportato da una tecnologia del genere. Leonardo De Rossi e Nico Abbatemarco, ricercatori di Information System presso SDA Bocconi, proveranno a fare luce su questo mondo raccontando l’esperienza su Blockchain del DEVO (Digital Enterprise Value Organization) Lab, il laboratorio di ricerca di SDA Bocconi impegnato nell’analisi della trasformazione digitale delle imprese, con particolare enfasi sugli impatti organizzativi ed economici dell’adozione di nuove tecnologie.
Blockchain technology can revolutionise the provision of decentralised Applications Dapps, as well as help IoT systems to boot to reduce the cost of this development, the stakeholders to determine how to distribute benefits and take into account five basic principles:
• Potential effects of technology on IoT systems
• Organisational changes
• Secure the correct data
• Financing electronic IoT systems
• Security and privacy of user data
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
More Related Content
Similar to Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
This document provides a high-level technical overview of blockchain technology. It describes how blockchains are digital ledgers that record transactions in a distributed manner without a central authority. The first blockchain-based cryptocurrency was Bitcoin, which uses cryptographic functions to securely transfer electronic cash between users recorded on the public blockchain. The document aims to explain the underlying technology behind blockchain in a conceptual manner, as there is significant hype but lack of understanding about how it works. It covers key topics like consensus models, mining, and the challenges of modifying data on an immutable blockchain.
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Nik Roby
Karen Scarfone
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
NISTIR 8202
Blockchain Technology Overview
Dylan Yaga
Peter Mell
Computer Security Division
Information Technology Laboratory
Nik Roby
G2, Inc.
Annapolis Junction, MD
Karen Scarfone
Scarfone Cybersecurity
Clifton, VA
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
October 2018
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology
National Institute of Standards and Technology Internal Report 8202
66 pages (October 2018)
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8202
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
Email: [email protected]
All comments are subject to release under the Freedom of Information Act (FOIA).
https://csrc.nist.gov/publications
mailto:[email protected]
NISTIR 8202 BLOCKCHAIN TECHNOLOGY OVERVIEW
ii
This publication is available free of charge from
: https://doi.org/10.6028/N
IST.IR
.8202
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and st ...
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
This document provides a high-level technical overview of blockchain technology. It describes how blockchains use cryptographic hash functions, transactions, asymmetric cryptography, and addresses to securely record transactions in a distributed digital ledger called blocks that are chained together. It discusses different consensus models like proof-of-work and proof-of-stake used to validate transactions and discusses issues like forking. The goal is to help readers understand the basic concepts and components of blockchain technology without getting into technical details.
The document summarizes the blockchain ecosystem in Asia and Malaysia. It finds that blockchain technology embodies trust without centralized control. It also notes that IT infrastructure readiness and collaboration across industries will be important to support blockchain innovation. The document outlines several government and corporate blockchain initiatives in Asia, including projects in banking, supply chain management, and digital identity. It also discusses challenges related to scalability, privacy and regulation. Finally, it proposes that education, harmonized frameworks and proving public benefits will be needed for further blockchain adoption.
The document discusses blockchain technology and its ideals versus reality. It begins with an abstract noting the surge and fall of cryptocurrencies in 2018. While blockchains were initially seen as a way to create decentralized societies and reduce inequality, in reality blockchain networks have become re-centralized with mining dominated by a few sites. The document then provides background on blockchain technology and how it works in theory versus practice. It discusses some of the challenges blockchains face regarding scalability and decentralization. The speaker proposes two novel approaches to address issues of re-centralization and the scalability trilemma. The talk aims to provide a realistic assessment of blockchains and discuss ongoing research directions.
Feasibilities Study of Blockchain Ecosystem in Asia RegionEffendy Zulkifly
The document summarizes the blockchain ecosystem in Asia, with a focus on Malaysia. It finds that blockchain technology embodies trust and that infrastructure readiness will impact adoption. Collaboration is key to innovation, and a flexible strategy can help overcome challenges like security and scalability. The document outlines government and corporate initiatives in countries like Singapore and Japan and discusses use cases for blockchain in banking, supply chains, and the public sector. It also examines the Malaysia blockchain ecosystem and provides an overview of challenges and the future path forward for blockchain.
The document discusses ABCD (Artificial Intelligence, Blockchain, Cyber Security, Data) and how it is changing the world. It discusses the blockchain ecosystem in Asia, including opportunities and challenges. Key points include:
- Blockchain enables trust in business transactions through decentralization.
- Countries' IT infrastructure readiness will determine their success with blockchain.
- Collaboration is needed for blockchain innovation to thrive.
- Adoption will be gradual, requiring awareness, adoption, and acceptance over time.
- Security, privacy, scalability and interoperability challenges must be addressed through flexible strategies.
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...Resourceful Nonprofit
What is blockchain?
What are examples of how blockchain is being used for business?
Will blockchain impact my business?
What can I learn and do right now for my business?
Presented by Amy Neumann at Power Hour CLE August 22, 2019. #Cleveland #blockchain
Keynote for the "Connecting Erasmus+ Mobility Participants in Open Language Learning Environments that Promote Linguistic and Cultural Awareness"
https://www.openlangnet.eu/events/connecting-erasmus-mobility-participants-in-open-language-learning-environments-that-promote-linguistic-and-cultural-awareness/
Blockchain, IoT and the GxP lab technology helping compliance?
This webinar discusses how distributed ledger technology like blockchain and IOTA could help enhance compliance in GxP laboratories. It explores how DLT could be used to track devices, materials, and data in a more transparent, trusted and auditable way. Specifically, it presents a vision of an internet-connected "laboratory of the future" where all devices share data using DLT. This could improve integrity, security and access to data while reducing costs. While DLT cannot directly increase compliance, it may help build trust in GxP systems and processes by making components more transparent to regulators.
Plenary Talk at ICEIC 2019
Pullman Auckland Hotel, Auckland, New Zealand
Jan. 23th (Wed) 2019, 11:00 ~ 12:30
http://iceic.org/2019/
Abstract
In the year 2018, we have witnessed the surge and the fall of crypto-currencies. With the surge, blockchain the new technology behind cryptocurrencies, and its idealistic footprint of advanced thoughts, blockchainism it can be perhaps called, came to enthrall our minds. Thousands of new ambitious projects have been conceived and fast activated with the worldwide frenzy of new funding through initial coin offerings a novel funding mechanism in the blockchain world. Decentralized societies, equal accesses to valuable resources, reducing the cost of middleman, freed individuals from hierarchical organizations, and reducing the spread in inequalities are some of those advanced thoughts. But the fall came; the market value for Bitcoin has collapsed more than 7 times from its peak-value; that of Ethereum has plummeted more than 12 times. These two power houses which have supported those progressive projects are now torn apart. Recent New York Times report reads, “Blockchain: What’s it good for? Absolutely nothing, report finds.” Another one reads, The Blockchain Is a Reminder of the Internet’s Failure. The same utopian promises that bloomed during the Internet’s early days are back. Be afraid.“ Should this be the end of our pursue to change and make a better world with blockchains? Obviously not. In this presentation, I would like to talk about the reality of blockchain technology and how distant it is from the ideals. With this accessment, I would like to present some of novel research progresses we made in year 2018 and talk about further research ideas to pursue in year 2019.
This document discusses Effendy Zulklifly's background working in blockchain and his involvement with various blockchain organizations. It describes Blockchain Academy Asia, a global blockchain research and education institution founded by Effendy, which offers both online and offline courses on blockchain fundamentals, applications, and development. The document also outlines Blockchain Academy Asia's consulting services, research and development activities, board of advisors, and areas of collaboration.
MIS301 Team Paper #8 Read the articles The Bitcoin B.docxraju957290
MIS301
Team Paper #8
Read the articles The Bitcoin Blockchain: The Magic and the Myths on Isidore.
First, briefly summarize the concept of blockchain in general and then
describe Bitcoin and its relationship to Blockchain. What are the key characteristics
of blockchain that distinguish it from traditional ledgers? What challenges has
Bitcoin faced and what do you believe the future holds for Bitcoin?
Next, research an additional current or potential future use of blockchain
technology (i.e., other than those examples presented in the article). Describe the
scenario, the opportunities that could be exploited from successful implementation,
and the potential challenges that could arise as the example you choose continues to
evolve.
Ensure that your paper is a maximum of three single spaced pages. As
appropriate, you may need to rely on additional research from the web or other
sources.
This research note is restricted to the personal use of [email protected]
This research note is restricted to the personal use of [email protected]
The Bitcoin Blockchain: The Magic and the
Myths
Published: 8 April 2016 ID: G00295779
Analyst(s): Ray Valdes, David Furlonger, Fabio Chesini
Blockchain technology derived from the Bitcoin stack promises much in the
era of digital business. Senior executives and CIOs must understand its
scope of choices, limitations and lack of maturity before making strategic
investments.
Key Findings
■ The Bitcoin blockchain is currently the primary mechanism for implementing a decentralized,
distributed ledger of cryptocurrency transactions — although alternatives are underway.
■ Blockchain technology could reduce transactional friction but, in its current form, suffers from
significant limitations in scalability, governance and flexibility that must first be addressed.
■ A contagion of "blockchain fever" has struck the financial services sector, and Gartner clients in
other sectors are asking whether it is "too late" to join. The answer is — it is, if anything, too
early.
■ There is a contradiction between the requirements of a private blockchain and the capabilities
of public blockchain, which result from its original purpose of creating a value-exchange system
that is resistant to control by a single central authority. This will be an ongoing tension, similar to
the dynamic between public and private cloud.
Recommendations
■ Develop investment plans that accommodate a 90% failure rate for blockchain initiatives over
the next two years, and focus as much on lessons learned as on business value delivered.
■ Consider only tactical narrow-scope deployments of blockchain technology in the short term,
accompanied by understanding that these will have a useful life of at most 24 months (at which
time they will be replaced by more evolved alternatives).
■ Create a strategic evaluation framework of alternative blockchain platforms that weighs aspects
and capabilities, including archi ...
Realizing the potential of blockchain, 2017Roman Bahnaru
This document discusses the need for a multistakeholder approach to governing blockchain technology and cryptocurrencies. It identifies various stakeholders in the blockchain ecosystem like innovators, investors, developers and regulators. It proposes that like the Internet, blockchain requires cooperation across stakeholders and sectors. The document outlines challenges around stewardship of blockchain platforms, applications and the overall ecosystem. It advocates forming networked institutions, standards bodies, advocacy groups, and knowledge networks to help blockchain reach its full potential.
NuCypher ICO Review, Ratings And Complete AnalysisCoinGape
A decentralized Key management system (KMS), NuCypher KMS offers a privacy layer to the distributed systems and decentralized applications. Through its proxy re-encryption and access control services, NuCypher KMS allows DAPP developers to store, share, manage, and secure their data on the blockchain.
This document provides an overview of blockchain technology and its applications in international trade. It analyzes several global case studies of blockchain projects in supply chain transparency, traceability, trade finance, and trade portals. The case studies examine the benefits of blockchain as well as challenges faced during implementation. Lessons from the case studies are then discussed to evaluate blockchain platforms compared to traditional paper-based and centralized systems. The final section highlights key considerations for USAID in implementing blockchain technologies.
Blockchain development has gained immense popularity over the past decade, transcending its initial association with cryptocurrencies. Recognizing the transformative potential of blockchain, Nadcab Labs has dedicated its efforts to harnessing its power and exploring its applications across various industries. Their research is unlocking new possibilities in areas such as finance, supply chain management, healthcare, cybersecurity.
Crypto Coinference 2018 - Make Blockchain mainstream, but without the hype: ...Crypto Coinference
Relatori:
Leonardo Maria De Rossi, Information System Researcher at SDA Bocconi School of Management | Blockchain & Bitcoin teacher at Università Commerciale Luigi Bocconi | Research Leader at DEVO
Nico Abbatemarco, Researcher at SDA Bocconi School of Management | Team Member at DEVO | Blockchain Author & Researcher
Quando si parla di temi come innovazione e digital transformation si fa spesso l’errore, più o meno volontario, di dare all’apparenza un peso molto maggiore rispetto alla sostanza. Questo è particolarmente vero per quanto riguarda blockchain, dove quasi sempre l’hype prevale sulla realtà. In questo contesto, l’università svolge un ruolo fondamentale nel contribuire a determinare quale è il reale valore aggiunto apportato da una tecnologia del genere. Leonardo De Rossi e Nico Abbatemarco, ricercatori di Information System presso SDA Bocconi, proveranno a fare luce su questo mondo raccontando l’esperienza su Blockchain del DEVO (Digital Enterprise Value Organization) Lab, il laboratorio di ricerca di SDA Bocconi impegnato nell’analisi della trasformazione digitale delle imprese, con particolare enfasi sugli impatti organizzativi ed economici dell’adozione di nuove tecnologie.
Blockchain technology can revolutionise the provision of decentralised Applications Dapps, as well as help IoT systems to boot to reduce the cost of this development, the stakeholders to determine how to distribute benefits and take into account five basic principles:
• Potential effects of technology on IoT systems
• Organisational changes
• Secure the correct data
• Financing electronic IoT systems
• Security and privacy of user data
Similar to Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018) (20)
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
34. Reference (1/2)
Joe Jones, Taiwan Blockchain Ecosystem https://medium.com/@blockcamp/6bd34eaf5ae4
資誠公布《2018全球區塊鏈調查報告》:84%全球企業 正運用區塊鏈技術
https://www.pwc.tw/zh/news/press‐release/press‐20180828.html
SavjeeCoin: A very simple blockchain implementation to demonstrate the basics of blockchains.
https://github.com/SavjeeTutorials/SavjeeCoin
Linux Foudation, Blockchain: Understanding Its Uses and Implications
https://www.edx.org/course/understanding‐blockchain‐and‐its‐implications
Linux Foudation, Blockchain for Business ‐ An Introduction to Hyperledger Technologies
https://www.edx.org/course/blockchain‐business‐introduction‐linuxfoundationx‐lfs171x‐0
Taipei Ethereum Meetup (Medium) https://medium.com/taipei‐ethereum‐meetup
Alison’s Sharing (Medium) https://medium.com/@alisonyslin
區塊勢 – 說人話的區塊鏈電子報 https://blocktrend.today/
38. Agenda
• Background
• Why did I want to join COBINHOOD/DEXON?
• How did I join COBINHOOD/DEXON as a designer?
• What do I do in COBINHOOD/DEXON as a designer?
• hat’s next in blockchain industry? From a designer’s perspective
• 5 insights of working as a designer
• 5 takeaways for those who wanna jump in the pool
• How do I feel as a designer at COBINHOOD/DEXON?
• Q&A
39. What is COBINHOOD?
Professional end-to-end ICO service provider
Total 120,000 ETH Raised
ICO
COBINHOOD Exchange
Global Top 19 Exchange
EXCHANGE
COBINHOOD
DEXON native chain
Revolutionary Blocklattice Native Chain
DEXON
40. COBINHOOD Exchange
Features
• Zero Transaction Fees
• Fiat Compatible
• Available in Web, Android, iOS
• Margin Trading Compatible
• High Frequency Trading
Metrics
• Global Top 19 Exchange
• 5-star Security-Proven Cryptocurrency Exchange by Dashlane
• Record High 5600 BTC / Day; around 500K users
• Nearly 1M Users
• 40K Daily Active User on Average
41. ICO market overview
More money is coming into ICOs year over year, average ICO funds raised also rising
Number of ICOs Total funds raised Average funds raised
2016 43 NT$95,181,391 NT$2,213,521
2017 209 NT$3,695,018,203 NT$17,679,513
2018 JAN - JUN 638 NT$16,854,398,111 NT$26,417,552
$0
$4,500,000,000
$9,000,000,000
$13,500,000,000
$18,000,000,000
2016 - 43 ICOs 2017 - 209 ICOs 2018 1st Half - 638 ICOs
$0
$7,500,000
$15,000,000
$22,500,000
$30,000,000
2016 - 43 ICOs 2017 - 209 ICOs 2018 1st Half - 638 ICOs
Source: https://www.coinschedule.com/stats.html
42. Who Invests in ICOs - Demographic
Source: COBINHOOD Exchange
Male 85%
Male
Age 18-34 70%
18-34
Relationship: 72% Not Married
Not Married
Education: College and Above 85%
Education
Software 26%, IT 16%,
Computation & Mathematics 16%,
finance 25%
Industry
Background
Technology, Value Shoppers,
Investing, Media & Entertainment
Top Affinity
Categories
43. COBINHOOD Success Stories
• COBINHOOD - Raised 45000+ ETH
• Completed during 1st bear market at the time when the Chinese government banned ICOs
• Built up a strong community of over 10,000 participants in ICO public sale
• Implemented solid PR strategy accentuating unique brand image with influential KOLs
44. COBINHOOD Success Stories
• CyberMiles - raised 84000+ ETH within 48 hours
• Built up a highly-engaged community that produced a slew of hard-core supporters
• Formulated a mature marketing strategy and doubled marketing ROI performance through laser-focused TA coverage
• Implemented creative Bounty and PoC program to spread impressive unique point
45. Gender diversity at COBINHOOD
• Business Development
• CEO Office
• Engineering
• Marcom
• Operation
• Product
1 : 1.2
1 : 1
1 : 19
3.5 : 1
1 : 1
1 : 1.5
F MDepartments
46. Background - Tiffany Chen
• UX designer at COBINHOOD
• Design writer at prototyp.io
• Brand strategist at Vetica Group AG
• Experience designer at a Singapore based tech startup
• 1st Prize of The Store WPP Retail Futures Competition 2015
• Production design assistant at River Film London
• MA Narrative Environments at Central Saint Martins
47. Why did I want to join COBINHOOD/DEXON?
Bottom-up
Approach
1 2 3DApp Application Unlimited
Possibilities
48. How did I join COBINHOOD/DEXON as a designer?
1UX Designer
2Blockchain
Branding
Project
3Design + Tech
Online
Community
• UX research + design
• Regional market experience
• Cross-department communication skills
• Swiss design consultancy
• Zug based blockchain company
• Branding in Asia
• Continue to learn the latest industry practice
• Adaptability
• Medium, Telegram, Twitter, LinkedIn..
49. What do I do in COBINHOOD/DEXON as a designer?
COBINHOOD
DEXON
Tech
Companies
• Market & competitive research
• Online user survey
• Qualitative user interview
• A/B test
• Usability testing
• Cross-department squad
• New product development
VS.
• Market & competitive research
• Online survey
• Qualitative interview
• A/B testing
• Usability testing
• Cross-department squad
• New product development
50. USP
1 2 3Target
Audience
Market
What do I do in COBINHOOD/DEXON as a designer?
Target the specific group to
grow the user database
Unique selling point as the
most important aspect for
product design
Find the most suitable
market for COBINHOOD
Exchange & DEXON
51. USP
1
What do I do in COBINHOOD/DEXON as a designer?
Unique selling point as
the most important
aspect for product design Coinbase Pro Binance
Kucoin COBINHOOD
52. USP
1
What do I do in COBINHOOD/DEXON as a designer?
Unique selling point as
the most important
aspect for product design Coinbase Pro Binance
Kucoin COBINHOOD
Top trading volume crypto to crypto
New ICOs Gaming campaigns + ?
53. TA
2
What do I do in COBINHOOD/DEXON as a designer?
Target the specific group to
grow the user database
Frequency
Amount
Heavy users
• Trade 6 + times per day
• Trade for campaigns & high returns
• Considered as both holder & trader
Progressive users
• Haven’t traded for 3+ months
• Trade less due to workload
• Considered as a holder
Progressive users
• Trade 1-6 times per day
• Trade for campaigns & high returns
• Considered as both holder & trader
Conservative users
• Haven’t traded for 2+ months
• Trade less due to bear market
• Considered as a holder
54. Market
3
What do I do in COBINHOOD/DEXON as a designer?
Find the most suitable
market for COBINHOOD
Exchange & DEXON
Cryptocurrencies by country 2017
https://blogs.thomsonreuters.com/answerson/world-cryptocurrencies-country/
Cryptocurrency regulation. Cross-country analysis 2017
Source: itsynergis.ru research
55. 1
What’s next in blockchain industry?
Finance and technology professionals
- 0.05% ppl use cryptos
- Current investment products or more
- Localization for reducing the learning curve
22. Digital nomads whose work have
nothing to do with finance or
investment - make it fun for them then
3"What the hell cryptocurrency is" type of persons
- more customer-oriented commercial world,
such as FMCG or traveling industry, which
general public is more familiar with FIRST
56. 5 insights of working as a designer
• Market/Legal/Policy/Constraints + Users
• Connected but Discreet
• China and the rest of the world
• New territories
• Freedom
57. 5 takeaways for those who wanna jump in the pool
• Continuing to learn and practice
• Adaptability
• Design + ______
• Build online communities
• Focus on your area
58. How do I feel as a designer at COBINHOOD/DEXON
Male dominated
workplace
Surprising affairs
UX Designer
Company goal
59. Social Profiles
Please find us via Facebook, LinkedIn, Medium, Reddit, Telegram, Twitter:
@Cobinhood @Dexon
For more designer at blockchain industry sharing:
@szuchiachen