A 30-minute overview of Bitcoin, and the underlying technology that enables this digital payments system to work. Topics covered: cryptography, public/private keys, signatures.
The document provides an overview of blockchain and Hyperledger Composer. It defines blockchain as a growing list of records called blocks, linked using cryptography. A blockchain allows multiple parties to maintain a distributed ledger to track transactions. The document then demonstrates how blockchain can provide traceability for food supply chains to establish trust between participants. It introduces Hyperledger Fabric as a framework for building blockchain applications and Hyperledger Composer as a development tool that allows defining smart contracts using JavaScript. The document concludes with a demo of creating and deploying a sample application using Hyperledger Composer.
Using Blockchain to Increase Supply Chain TransparencyHorea Porutiu
Slides used for a live webinar: Efficiency and transparency in a coffee bean supply chain. Showing how Hyperledger is different than other blockchain platforms, and what makes it a great product for the enterprise.
This slide deck goes into detail about the main concepts in Hyperledger Fabric - peers, orderer, certificate authority, and channels. We talk about chaincode, and go into details about modeling a network which involves putting cars on an auction. I end with a demo of the IBM Blockchain Platform, and give you links to get a free 1-month trial of the Starter Plan Blockchain service on the IBM Blockchain Platform.
Hyperledger Fabric - Blockchain, sushi and supply chain Grant Steinfeld
Webinar presentation - Understand the basics of Hyperledger Fabric with an engaging presentation - `Blockchain, Sushi and Supply Chain - Building Enterprise Blockchains`
Technical demonstration of a relevant blockchain application, using Visual Studio Code Extension - IBM Blockchain Platform
Slide from the presentation for webinar
webinar feb 2019.v3
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeHorea Porutiu
This video will talk through the concepts needed to understand a Hyperledger Fabric solution - it will talk about smart contracts, the client application, the connection profile, the hyperledger fabric SDK, and how to use a UI to update the ledger.
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorBeau Bullock
How do you survive the treacherous landscapes of security conferences, work trips, and other types of travel? Do you suffer from over-packing syndrome? Overwhelmed by the zombie hordes trying make it through security to get to their flight on time? Is your Bluetooth on while reading this? Does your phone auto-join Attwifi when it is in range? If so, join us for tips and tricks by seasoned BHIS travelers and survive your next conference trip! We will cover epic backpack hacks, clothing choices, personal and digital security, and even how to enjoy your 5 hour layover at the airport.
A 30-minute overview of Bitcoin, and the underlying technology that enables this digital payments system to work. Topics covered: cryptography, public/private keys, signatures.
The document provides an overview of blockchain and Hyperledger Composer. It defines blockchain as a growing list of records called blocks, linked using cryptography. A blockchain allows multiple parties to maintain a distributed ledger to track transactions. The document then demonstrates how blockchain can provide traceability for food supply chains to establish trust between participants. It introduces Hyperledger Fabric as a framework for building blockchain applications and Hyperledger Composer as a development tool that allows defining smart contracts using JavaScript. The document concludes with a demo of creating and deploying a sample application using Hyperledger Composer.
Using Blockchain to Increase Supply Chain TransparencyHorea Porutiu
Slides used for a live webinar: Efficiency and transparency in a coffee bean supply chain. Showing how Hyperledger is different than other blockchain platforms, and what makes it a great product for the enterprise.
This slide deck goes into detail about the main concepts in Hyperledger Fabric - peers, orderer, certificate authority, and channels. We talk about chaincode, and go into details about modeling a network which involves putting cars on an auction. I end with a demo of the IBM Blockchain Platform, and give you links to get a free 1-month trial of the Starter Plan Blockchain service on the IBM Blockchain Platform.
Hyperledger Fabric - Blockchain, sushi and supply chain Grant Steinfeld
Webinar presentation - Understand the basics of Hyperledger Fabric with an engaging presentation - `Blockchain, Sushi and Supply Chain - Building Enterprise Blockchains`
Technical demonstration of a relevant blockchain application, using Visual Studio Code Extension - IBM Blockchain Platform
Slide from the presentation for webinar
webinar feb 2019.v3
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeHorea Porutiu
This video will talk through the concepts needed to understand a Hyperledger Fabric solution - it will talk about smart contracts, the client application, the connection profile, the hyperledger fabric SDK, and how to use a UI to update the ledger.
Travelocalypse: It's Dangerous Business, Hacker, Going Out Your Front DoorBeau Bullock
How do you survive the treacherous landscapes of security conferences, work trips, and other types of travel? Do you suffer from over-packing syndrome? Overwhelmed by the zombie hordes trying make it through security to get to their flight on time? Is your Bluetooth on while reading this? Does your phone auto-join Attwifi when it is in range? If so, join us for tips and tricks by seasoned BHIS travelers and survive your next conference trip! We will cover epic backpack hacks, clothing choices, personal and digital security, and even how to enjoy your 5 hour layover at the airport.
Weaponizing Corporate Intel: This Time, It's Personal!Beau Bullock
Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets.
In this presentation, we will begin by examining some commonly overlooked methods to discover external resources. Next, we will show how to discover employees of a target organization and quickly locate their social media accounts. Finally, we will strategically identify and weaponize personal information about the employees to target the organization directly using new attack techniques. Attendees will learn an external defense evasion method, a new process to gain credentialed access, and be the first to receive a newly released tool!
While the approach is designed to assist offensive security professionals, the presentation will be informative for technical and non-technical audiences; demonstrating the importance of security-awareness for everyone.
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
This presentation covers the basics of what cryptocurrencies are, some major hacks, and a walk through of vulnerabilities emerging from cryptocurrency ecosystems.
Developing applications with Hyperledger Fabric SDKHorea Porutiu
The document discusses Hyperledger Fabric and the Hyperledger Fabric SDK. It provides an overview of the Fabric SDK and demonstrates how to use it to interact with a Hyperledger Fabric network, including enrollment, invoking chaincode to read and write to the ledger, and submitting transactions. It also discusses an IBM Food Trust use case for tracking food supply chains using Hyperledger Fabric.
TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the latest Cyber-APT-Trapping-Blinky-Box™. You were just made aware that your entire customer database was found being sold on the dark web. Go. Putting too much trust in security products alone can be the downfall of an organization. In the 2015 BSides Tampa talk “Pentest Apocalypse” Beau discussed 10 different pentesting techniques that allow attackers to easily compromise an organization. These techniques still work for many organizations but occasionally more advanced tactics and techniques are required. This talk will continue where “Pentest Apocalypse” left off and demonstrate a number of red team techniques that organizations need to be aware of in order to prevent a “Red Team Apocalypse” as described in the tabletop scenario above.
As more corporations adopt Google for providing cloud services they are also inheriting the security risks associated with centralized computing, email and data storage outside the perimeter. In order for pentesters and red teamers to remain effective in analyzing security risks, they must adapt techniques in a way that brings value to the customer.
In this presentation we will begin by demonstrating adaptive techniques to crack the perimeter of Google Suite customers. Next, we will show how evasion can be accomplished by hiding in plain-sight due to failures in incident response plans. Finally, we will also show how a simple compromise could mean collateral damage for customers who are not carefully monitoring these cloud environments.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
Getting Started in Pentesting the Cloud: AzureBeau Bullock
Webcast Recording: https://www.youtube.com/watch?v=fCbVMWvncuw
Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast will attempt to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365.
In order to adequately determine the attack surface, the appropriate coverage areas will be highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques will be presented in this talk.
TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the latest Cyber-APT-Trapping-Blinky-Box™. You were just made aware that your entire customer database was found being sold on the dark web. Go.
Putting too much trust in security products alone can be the downfall of an organization. In the 2015 BSides Tampa talk “Pentest Apocalypse” Beau discussed 10 different pentesting techniques that allow attackers to easily compromise an organization. These techniques still work for many organizations but occasionally more advanced tactics and techniques are required. This talk will continue where “Pentest Apocalypse” left off and demonstrate a number of red team techniques that organizations need to be aware of in order to prevent a “Red Team Apocalypse” as described in the tabletop scenario above.
What are the key points you need to know about becoming a hyperledger expert Blockchain Council
, Blockchain certifications have become very common, but if you want to kick start your career in the field of Blockchain, then focusing on a niche like Corda, Quorum, and Hyperledger are important.
Blockchain is a leading technology that has brought in a wave of change. This distributed ledger technology forms the underlying technology for Bitcoin exchange, but over a period of time, Blockchain emerged as a mainstream technology, and now it finds a multitude of applications. Blockchain developers are in great demand across the different industrial segments; from food to finance, you can find a multitude of applications of Blockchain technology.
Hyperledger, hosted by the Linux Foundation is one of the world’s first open-source collaborative projects for blockchain development. It was created with the aim to create more secure, reliable and transparent transactional applications through cross-industry blockchain development.
Blockchain technologies allow for the creation of shared digital ledgers that can record transactions and track assets in a verifiable and permanent way. The Linux Foundation is launching the Hyperledger project to support the development of blockchain technology in a way that is open source and collaborative. The project aims to enable organizations across industries to adopt blockchain at a faster pace than any individual company could achieve alone.
Hyperledger is an open source collaborative effort started by The Linux Foundation to develop cross-industry blockchain technologies. It brings together leaders in various industries to build blockchain frameworks and platforms through independent software development communities. The goal is to advance open protocols and standards by providing a modular backbone for different blockchain components and services around identity, access control, and smart contracts. Companies fund the Hyperledger project through membership fees to The Linux Foundation.
Blockchain development has become very much evident. The growing number of use cases and its application indicates that there is going to be a huge demand for Blockchain developers in the times to come.
This document provides an overview and update on the Hyperledger community and projects in February 2018. It discusses the growth of the community with over 91 meetup groups and 25k members. It provides details on the various Hyperledger frameworks like Fabric, Sawtooth, Iroha, Burrow and Indy. It also summarizes the tools like Composer, Cello and Explorer. The document outlines the governance structure and roadmap for 2018 with a focus on developer experience and network acceleration. It encourages participation through various channels like GitHub, mailing lists and working groups.
Building blockchain applications using JavaSimon Stone
My presentation from Java2Days, with an introduction to blockchain, the IBM Blockchain Platform, Hyperledger Fabric, and a demo of how Java developers can use their existing Java skills to build smart contracts and applications.
An introduction session in the "Blockchain: Cryptocurrencies and other Business Applications" course that I've just finished delivering to the School of Business of Hong Kong Baptist University.
Every business needs digitization to modify their traditional working approach along with enhanced cost reduction and efficiency possibilities to gain extensive benefits and profit. Hyperledger collaborates with different languages to build world-class Blockchain applications as per specific needs and wants.
Webinar presented live on May 17, 2017
Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing and technology.
In this webinar, Dan O'Prey, CMO at Digital Asset and Chair of the Hyperledger Marketing Committee, and IBM’s Chris Ferris, chair of the Hyperledger Technical Steering Committee, will provide an overview of Hyperledger. They will discuss the basics of distributed ledger technologies, business use cases for blockchain, and how to get involved with Hyperledger projects.
To view a video recording, visit: http://www.cloud-council.org/webinars/the-hyperledger-project-advancing-blockchain-technology-for-business.htm
This document discusses several open source blockchain platforms, including Eris, HydraChain, MultiChain, OpenChain, and others. Eris allows anyone to create and run applications from anywhere using blockchain or smart contract technology. HydraChain is highly compatible with Ethereum and has instant finality. MultiChain enables permissioned chains and instant deployment. OpenChain is suited for managing digital assets flexibly in a robust manner. The document provides brief descriptions of the key features of these various open source blockchain platforms.
This document summarizes a meetup on blockchain technology. It includes an agenda for presentations on blockchain 101, non-cryptocurrency use cases, and a deep dive on Hyperledger blockchain applications. The blockchain 101 section defines key concepts like distributed ledgers, smart contracts, consensus mechanisms, and public vs private blockchains. It also provides examples of non-financial use cases like supply chain management, IoT, voting, and solar energy trading. The Hyperledger presentation introduces the open source framework, compares it to other blockchains, and highlights capabilities like identity management, privacy, and modular design. It demonstrates Hyperledger Fabric through an example network architecture.
Weaponizing Corporate Intel: This Time, It's Personal!Beau Bullock
Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets.
In this presentation, we will begin by examining some commonly overlooked methods to discover external resources. Next, we will show how to discover employees of a target organization and quickly locate their social media accounts. Finally, we will strategically identify and weaponize personal information about the employees to target the organization directly using new attack techniques. Attendees will learn an external defense evasion method, a new process to gain credentialed access, and be the first to receive a newly released tool!
While the approach is designed to assist offensive security professionals, the presentation will be informative for technical and non-technical audiences; demonstrating the importance of security-awareness for everyone.
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
This presentation covers the basics of what cryptocurrencies are, some major hacks, and a walk through of vulnerabilities emerging from cryptocurrency ecosystems.
Developing applications with Hyperledger Fabric SDKHorea Porutiu
The document discusses Hyperledger Fabric and the Hyperledger Fabric SDK. It provides an overview of the Fabric SDK and demonstrates how to use it to interact with a Hyperledger Fabric network, including enrollment, invoking chaincode to read and write to the ledger, and submitting transactions. It also discusses an IBM Food Trust use case for tracking food supply chains using Hyperledger Fabric.
TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the latest Cyber-APT-Trapping-Blinky-Box™. You were just made aware that your entire customer database was found being sold on the dark web. Go. Putting too much trust in security products alone can be the downfall of an organization. In the 2015 BSides Tampa talk “Pentest Apocalypse” Beau discussed 10 different pentesting techniques that allow attackers to easily compromise an organization. These techniques still work for many organizations but occasionally more advanced tactics and techniques are required. This talk will continue where “Pentest Apocalypse” left off and demonstrate a number of red team techniques that organizations need to be aware of in order to prevent a “Red Team Apocalypse” as described in the tabletop scenario above.
As more corporations adopt Google for providing cloud services they are also inheriting the security risks associated with centralized computing, email and data storage outside the perimeter. In order for pentesters and red teamers to remain effective in analyzing security risks, they must adapt techniques in a way that brings value to the customer.
In this presentation we will begin by demonstrating adaptive techniques to crack the perimeter of Google Suite customers. Next, we will show how evasion can be accomplished by hiding in plain-sight due to failures in incident response plans. Finally, we will also show how a simple compromise could mean collateral damage for customers who are not carefully monitoring these cloud environments.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
Getting Started in Pentesting the Cloud: AzureBeau Bullock
Webcast Recording: https://www.youtube.com/watch?v=fCbVMWvncuw
Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast will attempt to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365.
In order to adequately determine the attack surface, the appropriate coverage areas will be highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques will be presented in this talk.
TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the latest Cyber-APT-Trapping-Blinky-Box™. You were just made aware that your entire customer database was found being sold on the dark web. Go.
Putting too much trust in security products alone can be the downfall of an organization. In the 2015 BSides Tampa talk “Pentest Apocalypse” Beau discussed 10 different pentesting techniques that allow attackers to easily compromise an organization. These techniques still work for many organizations but occasionally more advanced tactics and techniques are required. This talk will continue where “Pentest Apocalypse” left off and demonstrate a number of red team techniques that organizations need to be aware of in order to prevent a “Red Team Apocalypse” as described in the tabletop scenario above.
What are the key points you need to know about becoming a hyperledger expert Blockchain Council
, Blockchain certifications have become very common, but if you want to kick start your career in the field of Blockchain, then focusing on a niche like Corda, Quorum, and Hyperledger are important.
Blockchain is a leading technology that has brought in a wave of change. This distributed ledger technology forms the underlying technology for Bitcoin exchange, but over a period of time, Blockchain emerged as a mainstream technology, and now it finds a multitude of applications. Blockchain developers are in great demand across the different industrial segments; from food to finance, you can find a multitude of applications of Blockchain technology.
Hyperledger, hosted by the Linux Foundation is one of the world’s first open-source collaborative projects for blockchain development. It was created with the aim to create more secure, reliable and transparent transactional applications through cross-industry blockchain development.
Blockchain technologies allow for the creation of shared digital ledgers that can record transactions and track assets in a verifiable and permanent way. The Linux Foundation is launching the Hyperledger project to support the development of blockchain technology in a way that is open source and collaborative. The project aims to enable organizations across industries to adopt blockchain at a faster pace than any individual company could achieve alone.
Hyperledger is an open source collaborative effort started by The Linux Foundation to develop cross-industry blockchain technologies. It brings together leaders in various industries to build blockchain frameworks and platforms through independent software development communities. The goal is to advance open protocols and standards by providing a modular backbone for different blockchain components and services around identity, access control, and smart contracts. Companies fund the Hyperledger project through membership fees to The Linux Foundation.
Blockchain development has become very much evident. The growing number of use cases and its application indicates that there is going to be a huge demand for Blockchain developers in the times to come.
This document provides an overview and update on the Hyperledger community and projects in February 2018. It discusses the growth of the community with over 91 meetup groups and 25k members. It provides details on the various Hyperledger frameworks like Fabric, Sawtooth, Iroha, Burrow and Indy. It also summarizes the tools like Composer, Cello and Explorer. The document outlines the governance structure and roadmap for 2018 with a focus on developer experience and network acceleration. It encourages participation through various channels like GitHub, mailing lists and working groups.
Building blockchain applications using JavaSimon Stone
My presentation from Java2Days, with an introduction to blockchain, the IBM Blockchain Platform, Hyperledger Fabric, and a demo of how Java developers can use their existing Java skills to build smart contracts and applications.
An introduction session in the "Blockchain: Cryptocurrencies and other Business Applications" course that I've just finished delivering to the School of Business of Hong Kong Baptist University.
Every business needs digitization to modify their traditional working approach along with enhanced cost reduction and efficiency possibilities to gain extensive benefits and profit. Hyperledger collaborates with different languages to build world-class Blockchain applications as per specific needs and wants.
Webinar presented live on May 17, 2017
Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing and technology.
In this webinar, Dan O'Prey, CMO at Digital Asset and Chair of the Hyperledger Marketing Committee, and IBM’s Chris Ferris, chair of the Hyperledger Technical Steering Committee, will provide an overview of Hyperledger. They will discuss the basics of distributed ledger technologies, business use cases for blockchain, and how to get involved with Hyperledger projects.
To view a video recording, visit: http://www.cloud-council.org/webinars/the-hyperledger-project-advancing-blockchain-technology-for-business.htm
This document discusses several open source blockchain platforms, including Eris, HydraChain, MultiChain, OpenChain, and others. Eris allows anyone to create and run applications from anywhere using blockchain or smart contract technology. HydraChain is highly compatible with Ethereum and has instant finality. MultiChain enables permissioned chains and instant deployment. OpenChain is suited for managing digital assets flexibly in a robust manner. The document provides brief descriptions of the key features of these various open source blockchain platforms.
This document summarizes a meetup on blockchain technology. It includes an agenda for presentations on blockchain 101, non-cryptocurrency use cases, and a deep dive on Hyperledger blockchain applications. The blockchain 101 section defines key concepts like distributed ledgers, smart contracts, consensus mechanisms, and public vs private blockchains. It also provides examples of non-financial use cases like supply chain management, IoT, voting, and solar energy trading. The Hyperledger presentation introduces the open source framework, compares it to other blockchains, and highlights capabilities like identity management, privacy, and modular design. It demonstrates Hyperledger Fabric through an example network architecture.
The document discusses how to become a Hyperledger expert. It states that Hyperledger offers frameworks and tools for building open-source blockchains that can be used globally across industries. It notes several benefits of becoming a Hyperledger expert such as career opportunities, exposure in the IT industry, and ability to work on privacy and security features. It outlines prerequisites like knowledge of blockchain architecture, data structures, cryptography, and smart contract development. Overall, the document provides an overview of what Hyperledger is and reasons for pursuing expertise in it.
The document provides an overview of the Hyperledger community update and blockchain frameworks. It summarizes that Hyperledger is an open source collaborative effort hosted by The Linux Foundation to advance blockchain technologies across multiple industries. It then provides details on the various Hyperledger frameworks such as Fabric, Sawtooth, Iroha, Indy, and Burrow. It also summarizes the business blockchain tools under Hyperledger like Composer, Cello, Explorer, and Caliper. The document outlines the leadership and global community engagement efforts around Hyperledger.
- Hyperledger is an open source collaborative effort created in 2016 to advance cross-industry blockchain technologies. It is hosted by The Linux Foundation.
- Hyperledger aims to develop enterprise-grade, open source distributed ledger technologies and applications. It has over 200 members including major technology companies.
- The presentation provides an overview of several Hyperledger projects including Fabric, Sawtooth, Iroha, Indy, Burrow, Composer and Cello. It summarizes the goals and technical aspects of these projects.
- The presenter discusses the growth and momentum of Hyperledger, outlines the roadmap for 2018, and notes IBM's founding role and ongoing leadership in Hyperledger.
The document discusses Hyperledger, an open source collaborative effort hosted by The Linux Foundation that is focused on advancing cross-industry blockchain technologies. It provides an overview of Hyperledger's goals of creating enterprise-grade open source distributed ledger frameworks and codebases to support business transactions. The document also describes Hyperledger's community structure, tools, frameworks, and resources for getting involved in the open source project.
The most relevant platforms overview for blockchain developers in 2020Blockchain Council
In addition to its versatile capabilities, blockchain technology still has the potential for growth. Blockchain platforms enable blockchain developers to develop apps to enhance and expand the uses and tools of the technology. Despite their cutting edge technology, blockchain platforms’ pros and cons still need to be considered when you intend to be involved in the blockchain industry.
What simply started as the technology behind Bitcoin, has taken over the world today. Blockchain technology has seeped into every sphere of our lives from banking to healthcare and beyond. Cybersecurity is an industry which has been significantly impacted by this technology with a scope for more in the future
Similar to Blockchain workshop IBM CODE Day - Montevideo (20)
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
6. Problem
@horeaporutiu
Fisherman Processor Distributor Plate
• There are so many parties involved
• Different parties have different incentives
• Hard to trust that your fish is actually
organic
Traceability of fish from ocean to plate
8. What is blockchain?
• Blockchain - a continuously growing list of
records, called blocks, which are linked and
secured using cryptography.
• A digital ledger that is replicated across all
network participants
@horeaporutiu
• Network participants collaborate to maintain the
ledger
9. Types of blockchain
Public Private
@horeaporutiu
• Open to anyone
• Large computational
requirement
• Participants
incentivized with
cryptocurrency
• Bitcoin
• Need permission to
join the network
• Walmart solution
• Less computational
power required
• Cryptocurrency is
typically not involved
• Transactions can be
kept private
10. Identify blockchain use-cases
• If data is used only by one organization, then it’s
most likely not a good use of blockchain
@horeaporutiu
Distributed Ledger
Distributed
Smart ContractsImmutable
Share data across
multiple companies
Permanent record of
transactions
No central point of
ownership
Business rules visible
to all members
11. Hyperledger
• A collaborative effort created to
advance cross-industry
blockchain tech for business
• Hyperledger is an umbrella – 5 frameworks, 4
tools under Hyperledger
@horeaporutiu
• Announced in 2015, now over
180 members
12. Hyperledger Fabric
• An implementation of blockchain technology used
as a foundation for developing blockchain
applications
@horeaporutiu
• V1.0 released July 2017
• 27 organizations, 159 developers
13. Hyperledger: Writing Smart Contracts
• Either as native chain code – using Go, Java, or
Node.js
@horeaporutiu
• Hyperledger Composer – Easy way to write smart
contracts w/ JavaScript
https://medium.com/@olivier.mathurin/build-a-blockchain-prototype-in-minutes-with-hyperledger-
composer-e132e17c98c7
15. Generate network archive - .bna file
@horeaporutiu
Model File .cto
Access Control
Script File .js
Assets, participants,
and transactions
Transaction functions
Access Control Rules
Business Network
Packaged business
network definition
Archive .bna
.acl
networkadmin.card
Credentials for admin
of the network
16. Writing your first model file (.cto)
@horeaporutiu
1. namespace
2. Participants
3. Assets
4. Transactions
5. Events
Need to define the following:
🙋🏽♀️🙋🏽♂️
🏽
💰
‼️
🔡
Need more help? Check this tutorial:
https://www.skcript.com/svr/writing-your-first-business-model-in-
hyperledger-composer/
before we get started, by a show of hands, how many of you know about blockchain?
How many have taken a course or been to class on blockchain?
How many have developed applications using blockchain technoloies?
Well no matter your skill level, and familiarity with blockchain, I think you will be able to learn something useful from this session.
Today, I want to take you through a journey with blockchain. I’ll go over the main concepts of blockchain, and more importantly, when blockchain is a suitable solution for your problem. I’ll talk about Hyperledger, a popular open source technology for building blockchain applications and then I’ll go into a demo of how to start building blockchain apps with Hyperledger, and then go into Q/A.
before we get started, by a show of hands, how many of you know about blockchain?
How many have taken a course or been to class on blockchain?
How many have developed applications using blockchain technoloies?
Well no matter your skill level, and familiarity with blockchain, I think you will be able to learn something useful from this session.
Today, I want to take you through a journey with blockchain. I’ll go over the main concepts of blockchain, and more importantly, when blockchain is a suitable solution for your problem. I’ll talk about Hyperledger, a popular open source technology for building blockchain applications and then I’ll go into a demo of how to start building blockchain apps with Hyperledger, and then go into Q/A.
So earlier I talked about the food industry and how they could benefit from a blockchain solution for their supply chain.
But to be fair, blockchain doesn’t have to be limited to the supply chain
Any industry where goods and services change hands has this problem
Existing business network: when their ledger disagree, need to go to the court…no agreement there
Everyone has to maintain their own private ledger, and is vulnerable for this problem too
The problem here becomes, how do I trust that this fish is organic? I mean, the fish changes hands from fisherman, to processor, to distributer, to the market. What if someone along the way made a mistake?
Then I’m paying more for the same quality
How do I trust that this fish is actually wild, and not just marketed as so?
So here we see that in a typical solution, there are multiple parties that are working together in a businessss network. We have The bank, the auditor, the the farmer, the processor, the distributor, and the retailer
Blockchain is a trusted distributed ledger
Way for business to share data when they don’t necessarily trust each other
Solve this problem by providing a single source of truth by the use of a shared and replicated ledger
Blockchain tech ensures that everyone has the same copy of the ledger
4 key aspects
Consensus: when anyone wants to add a change to the blockchain, a set of participants need to agree that that transaction has occurred. So if participant A does a trade with participant B, then maybe the bank and the auditor might get involved and sign off on that. Blockchain tech will provide WHO has to endorse the transactions before they get added to the ledger
Provenance: can show history of where you caught your fish
Immutable: can’t go back and change the ledger. If you try and change your copy of the ledger, since the ledger is replicated, none of the other ledgers will agree, easy to see that you tampered with ledger
Finality: ledger is the simple source of truth. can’t disagree with blockchain since everyone agrees with the updates…it is the single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
Explain private vs public, and what each means
What is a public blockchian, is private hyperledger a blockchain implementation?
Usually, the first sign that blockchain is not right for your solution is if you are not dealing with multiple organizations. On the other hand, if you need permanent record of transactions and lack trust between the different organizations, then blockchain might be a possible solution for your problem.
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth
So here is the mandatory definition slide
The main points here is that blockchain is a list of records, which enables participants to transact with each over a network with TRUST.
also, the ledger is replicated across all participants, so everyone in the network has a single source of truth