Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Quick Understanding of Bitcoin/Cryptocurrency.Satish Mudaliar
This slide briefs you about the BItcoin/Cryptocurrency knowledge and facts. This slide is made for diffrent purpose but sharing here to help someone getting a quick knowledge of Bitcoins.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Quick Understanding of Bitcoin/Cryptocurrency.Satish Mudaliar
This slide briefs you about the BItcoin/Cryptocurrency knowledge and facts. This slide is made for diffrent purpose but sharing here to help someone getting a quick knowledge of Bitcoins.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
Introduction to Blockchain. Presentation at Framework Bristol. Oct 2018. Slides for those that saw the talk, may be difficult to follow without the talk. Covers introduction to blockchain and crytocurrencies. Technologies of trust, tally sticks and ledgers.
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Blockchain: life of a blockchain transactionErwan Alliaume
First talk: My life as a blockchain transaction
Presentation Given our Sydney Tech Share meetup with Yann Rouillard.
You are interested in the blockchain but you are still a bit confused about how it works? Don’t wait anymore to dive into it!
In this first talk, we will shed the light on all the dark mechanisms of the blockchain by following the life of an innocent transaction from its birth to its eternal rest in the blockchain immutable history.
Cryptography, Network propagation, Proof of work, Transaction execution... nothing will be hidden from you. The only sad thing is that blockchain might not seem so magical to you after this talk. :)
https://www.meetup.com/en-AU/Tech-Share-Sydney-Meetup/events/249111190/
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
During our BlockchainHub Graz - Meetup #3 we heard a talk from Stefan Kliment about Rootstock and how it will enable smart contracts on the bitcoin blockchain.
An overview of the Bitcoin protocol, source code, data structures and algorithms. This presentation was delivered at Nova Southeastern University on June 20, 2014 by Chris DeRose of bitcoinfl.org
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
This presentation is about world's hot trending topic known as "Cryptocurrency". This presentation covers a general knowledge about cryptocurrency, crypto coins, bitcoin, coin mining. It specifically shows people about how to start mining and what are the basic requirements.
Presentation Titled " Bitcoin and Ransomware Analysis " we discuss ransomware and how bitcoin are being utlized in cyber crime. we also have look at Bitcoin mining, Bitcoin trading market and block chain concept.
Blockchain concept and technology. How this is becoming the next trend after the Bitcoin, expanding to a myriad of solutions. Smart contracts might be using a public distributed, and encrypted platform to support data persistence.
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
Introduction to Blockchain. Presentation at Framework Bristol. Oct 2018. Slides for those that saw the talk, may be difficult to follow without the talk. Covers introduction to blockchain and crytocurrencies. Technologies of trust, tally sticks and ledgers.
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Blockchain: life of a blockchain transactionErwan Alliaume
First talk: My life as a blockchain transaction
Presentation Given our Sydney Tech Share meetup with Yann Rouillard.
You are interested in the blockchain but you are still a bit confused about how it works? Don’t wait anymore to dive into it!
In this first talk, we will shed the light on all the dark mechanisms of the blockchain by following the life of an innocent transaction from its birth to its eternal rest in the blockchain immutable history.
Cryptography, Network propagation, Proof of work, Transaction execution... nothing will be hidden from you. The only sad thing is that blockchain might not seem so magical to you after this talk. :)
https://www.meetup.com/en-AU/Tech-Share-Sydney-Meetup/events/249111190/
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
During our BlockchainHub Graz - Meetup #3 we heard a talk from Stefan Kliment about Rootstock and how it will enable smart contracts on the bitcoin blockchain.
An overview of the Bitcoin protocol, source code, data structures and algorithms. This presentation was delivered at Nova Southeastern University on June 20, 2014 by Chris DeRose of bitcoinfl.org
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
This presentation is about world's hot trending topic known as "Cryptocurrency". This presentation covers a general knowledge about cryptocurrency, crypto coins, bitcoin, coin mining. It specifically shows people about how to start mining and what are the basic requirements.
Presentation Titled " Bitcoin and Ransomware Analysis " we discuss ransomware and how bitcoin are being utlized in cyber crime. we also have look at Bitcoin mining, Bitcoin trading market and block chain concept.
Blockchain concept and technology. How this is becoming the next trend after the Bitcoin, expanding to a myriad of solutions. Smart contracts might be using a public distributed, and encrypted platform to support data persistence.
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
Blockchain is one of the most innovative discoveries of the past century.
The first cryptocurrency, Bitcoin, was proposed in 2008 by Satoshi Nakamoto with a white paper.
Blockchain and ICO from a Developer’s Standpoint - Zymo.ioMarissa Ryan
Learn about Blockchain, ICO, and other Cryptocurrency terms, how they relate to development, and how developers can use it in today's Crypto-world. by Zymo.io
In this issue of Math in the News we explore Bitcoin. We look at how it's used for making purchases and how it differs from other currencies. This provides an opoortunity to apply the concept of currency exchange.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
8. Issues payment system w/o bank
How to guarantee
messages arrive at
destination
How to do prevent
manipulation
How to make sure
a coin is only spend
once!
8
9. Basic idea: don’t use messenger
◦ Image generals consult a nearby village
◦ 5% chance peasant from village gives wrong info
◦ Asks any 6 peasants, chance 4 giving incorrect information is
0,05 * 0.05 * 0.05 * 0.05 = 0,00000625%
◦ A malicious peasant will not be able to manipulate transaction
9
10. 4 key
innovations
◦ Peer 2 Peer network
◦ Distributed Ledger
◦ Consensus mechanism
◦ Incentive to process
transactions through ‘proof
of work’
10
11. Blockchain structure
◦ Every node records all transactions / holds
copy
◦ Transactions are collected in a block
◦ Every block links to the previous block
◦ New block should be accepted by the majority
of the nodes
11
13. Blockchain deep
dive: Hash
◦ Input “Hashing is niet ingewikkeld”
◦ Take position in alphabet for each letter,
add it all together. :
8+1+19+8+9+14+7+0+9+19+0+14+9+5
+20+0+9+14+7+5+23+9+11+11+5+4 =
240
◦ Multiply by 1 million
◦ Divide it by Julian date 28 june 2017 =
2457932.922454)
◦ Uitkomst = 97,64302 = Hash
13
Original Hash
15. Buying a cup of coffee
with BTC
◦ Julian buys a cop of coffee from Bob the barista and pays
with BTC
◦ Bob has to publish his bitcoin address, Julian then signs a
transaction wit his private key and sends it over the
network and only Bob can redeem the bitcoins send.
15
20. Public/Private key encryption
◦ Encryption: Hello -> position + 1 -> Ifmmp
◦ Asymmetric encryption
◦ Key to read information not the same as one used to decrypt
◦ Elliptic Curve Multiplication used to derive Public key
◦ Lot safer than RSA, which is pretty safe
◦ y2 = x3 + ax + b
◦ Bitcoin address is SHA-256 hash from public key
◦ Base 58 encoded to make it (a bit) more readable
◦ Relatively safe for quantum computing
20
21. Simplified
Bitcoin
Transaction
◦ Sender should acquire public key hash (bitcoin
address) from recipient
◦ Sender signs the transaction with his private key and
sends it to nodes in the bitcoin network
◦ Network checks if sender is allowed to spent the
bitcoins involved
◦ Recipients wallet detects transaction, runs
unlockingscript with that proofs he has private key
related to public key hash
◦ Transaction is put in a block
◦ Once block is adopted by blockchain, transaction is
settled
21
23. Mining & Consensus
◦ Nodes in network are incentivized to process next blocks = mining
◦ Miner solves crypto puzzle to process block = Proof of Work
◦ Other miners check if puzzle is solved correctly
◦ Blockchain is eventually consistent
23
0
1 2 3
24. Concept of Proof of work
◦ “Hashing is niet ingewikkeld”
◦ For each letter, take position in alphabet and add:
8+1+19+8+9+14+7+0+9+19+0+14+9+5+20+0+9+14+7+5+23+9+11+11+5+4 = 240
◦ Multiply with one million
◦ Divide outcome by a missing number causing the result to start with 97 and end with 02:
◦ 240 * 1.000.000 / ? = 97,…02
◦ Now find ?
◦ If ? = Julian date 28 juni 2017 = 2457932.922454 a correct result is found: 97,64302
◦ Checking the outcome is easy, finding the missing parameter is hard
24
25. Proof of work for bitcoin
◦ Nodes are all trying to process the next block by solving crypto puzzle
= Finding correct proof of work hash = mining
◦ The solution must be set in Block Header Field Nonce
◦ This nonce is a SHA-256 hash
◦ Bitcoin protocol dictates required number of leading zero’s for this hash => sets difficulty
◦ Correct hash is based on transactions in the block and other info in the block
◦ Every node checks if proposed block has correct nonce
25
29. Vitalik Buterin
◦ Son of Russian computer scientists
◦ In 2011 as a 15 yrs old started publishing about bitcoin
◦ Founder of Bitcoin magazine
◦ In 2013 financially secured for life
◦ 7 transaction per second doesn’t cut it
◦ Blockchain has more potential
29
30. Blockchain as platform
◦ Blockchain as distributed computer
◦ Founded in 2014, 30 juli 2015 operational
◦ Ether (ETH) instead of Bitcoin
◦ Then: 2000 ETH per BTC. Or $0,30 per ETH.
◦ Now: +/- 10 ETH per BTC. Or +/- $250 per ETH
◦ 12 seconds per block instead of 10 minutes
It’s all about smart contracts
30
31. Smart contracts
◦ Loop constructs
◦ Turing complete, Gas for transactions
◦ Every node in can execute a contract with the EVM
◦ Code your own (solidity)
◦ Still maturing
31
39. Distributed Anonymous Organization
◦ 100% autonomous organization on the Ethereum blockchain
◦ Goal: Funding commercial & non profit organizations
How it works:
1. Anybody can exchange Ether for DAO token and become an investor
2. Everybody can do a business proposal
3. Investors vote for ideas with DAO token
4. Winning proposals get funding
5. Investors become shareholders and recieves share of profit
39
40. DAO (2)
◦ Written down in Smart Contracts
◦ In May 2016 $150 million was collected
◦ Unintended use of code in contract…$50 M was stolen
◦ Hard fork applied by Vitalik and core ethereum team
◦ 85% nodes joined.
◦ 15% did not. Went on and became Ethereum classic. Currently +/-
10% of Ether marketcap
40
41. Some Ethereum blockchain tokens
◦ TenX, Tokencard & Monacocard: Wallet with
cryptocurrency linked with VISA card
◦ Steem. Get paid for publishing content
◦ Trutheum. Marketplace for ‘truth requests’
◦ EthLance. Freelance opdrachten bemiddelen
◦ Augur. Factoring through blockchain
41
42. Altcoins
◦ LiteCoin. Based on BTC code, improved
performance
◦ Dash. BTC like. Instant payments, levels of
anonimity. Wallet accepted by Apple
◦ IOTA. No blockchain. No fees. Ideally
suited for IOT applications such as Drone
delivery
◦ RIPPLE. Centrally managed. Optimized for
financial institutions. No mining. Verify
transaction before its settled
42
44. Private blockchain
◦ As part of Public blockchain as a Sidechain (aka Off chain)
◦ Ethereum popular choice, but does this make sense?
◦ Ether, Gas & mining ‘hardcoded’ in system
◦ Maybe all you need is a distributed ledger
◦ Lots of other options for a private blockchain:
◦ OpenChain
◦ Hyperledger (IBM)
◦ Multichain
◦ Stratis
◦ NEO
◦ Azure BAAS / Coco
44
45. Example use cases
◦ Unilever, Nestle, Walmart, Tracking & tracing of food in logistic chain
◦ Bitnation. Record laws, regulations & jurisdictions and provide dispute resolution
◦ Swarm City. Peer2Peer sharing platform
◦ Guts tickets. Prevent theater tickets from being sold in black market.
◦ Land registry. Georgia records land ownership in blockchain.
◦ Rent out your house. In Singapore renting a house is possible though P2P blockchain
◦ Digital ownership. Who owns what music rights
◦ And digital currency. Senegal is considdering a national blockchain currency
◦ ….
45
46. “If there’s no central authority to go to, after
someone denies data recorded in the
blockchain is correct. What are you going to
do?”
46
47. When to use blockchain
◦ Cut out the middle man or regulator
◦ If central authority is missing, eg. free market trading
◦ Transactions that require audit trails: eg. supply chains
◦ Triggering of events without anyone being responsible.
◦ Guarantee anonimity (e.g. auction)
47
48. When not to use
◦If a regular database suffices
◦ Organization wants to have full control over their services and
data
◦ Performance is very important
◦ Continuous updating of software is needed
◦ Regulations require specific means of storage
48