Adam Cecchetti, CEO of Deja vu Security, discusses building security into blockchain technologies. Early ledger technologies from 5000 years ago provide context for modern blockchains. Blockchains face challenges with privacy, forging records, and scalability similar to early computers. Enterprise blockchains like Quorum and Hyperledger aim to solve these issues by making transactions private and permissioned through consensus algorithms instead of mining. Building security into decentralized applications and smart contracts is important as blockchains are still new computing platforms facing classic security problems.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
Blockchain based Security Architectures - A ReviewGokul Alex
From my session on #Blockchain based #Cybersecurity Architectures presented in the Malabar Cybersecurity Summit organised by RedTeam Hacker Academy in Calicut. This presentation navigates through the fundamental concepts of Blockchain, Tamper Evidence properties of Blockchain Data Structure, Blockchain Architectures, Possibilities of Immutable Ledger, Importance of Blockchain for Digital Identities, IoT Security etc.
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Abstract.
A purely peer-to-peer version of electronic cash would allow online
payments to be sent directly from one party to another without going through a
financial institution. Digital signatures provide part of the solution, but the main
benefits are lost if a trusted third party is still required to prevent double-spending.
We propose a solution to the double-spending problem using a peer-to-peer network.
The network timestamps transactions by hashing them into an ongoing chain of
hash-based proof-of-work, forming a record that cannot be changed without redoing
the proof-of-work. The longest chain not only serves as proof of the sequence of
events witnessed, but proof that it came from the largest pool of CPU power. As
long as a majority of CPU power is controlled by nodes that are not cooperating to
attack the network, they'll generate the longest chain and outpace attackers. The
network itself requires minimal structure. Messages are broadcast on a best effort
basis, and nodes can leave and rejoin the network at will, accepting the longest
proof-of-work chain as proof of what happened while they were gone.
Blockchain is a leading technology that has brought in a wave of change. This distributed ledger technology forms the underlying technology for Bitcoin exchange, but over a period of time, Blockchain emerged as a mainstream technology, and now it finds a multitude of applications. Blockchain developers are in great demand across the different industrial segments; from food to finance, you can find a multitude of applications of Blockchain technology.
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
Blockchain based Security Architectures - A ReviewGokul Alex
From my session on #Blockchain based #Cybersecurity Architectures presented in the Malabar Cybersecurity Summit organised by RedTeam Hacker Academy in Calicut. This presentation navigates through the fundamental concepts of Blockchain, Tamper Evidence properties of Blockchain Data Structure, Blockchain Architectures, Possibilities of Immutable Ledger, Importance of Blockchain for Digital Identities, IoT Security etc.
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Abstract.
A purely peer-to-peer version of electronic cash would allow online
payments to be sent directly from one party to another without going through a
financial institution. Digital signatures provide part of the solution, but the main
benefits are lost if a trusted third party is still required to prevent double-spending.
We propose a solution to the double-spending problem using a peer-to-peer network.
The network timestamps transactions by hashing them into an ongoing chain of
hash-based proof-of-work, forming a record that cannot be changed without redoing
the proof-of-work. The longest chain not only serves as proof of the sequence of
events witnessed, but proof that it came from the largest pool of CPU power. As
long as a majority of CPU power is controlled by nodes that are not cooperating to
attack the network, they'll generate the longest chain and outpace attackers. The
network itself requires minimal structure. Messages are broadcast on a best effort
basis, and nodes can leave and rejoin the network at will, accepting the longest
proof-of-work chain as proof of what happened while they were gone.
Blockchain is a leading technology that has brought in a wave of change. This distributed ledger technology forms the underlying technology for Bitcoin exchange, but over a period of time, Blockchain emerged as a mainstream technology, and now it finds a multitude of applications. Blockchain developers are in great demand across the different industrial segments; from food to finance, you can find a multitude of applications of Blockchain technology.
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
Deja vu Security - Blockchain Security Summit - Akshay AggarwalScott Strang
Deja vu Security and Peach Tech founder Akshay Aggarwal's slides from Deja vu Security's December 2017 Security Summit.
Security Landscape of Blockchain Technologies
ICOs and Smart Contracts have become popular. This talk will look at the underlying economic, technology, and process fundamentals underpinning Smart Contracts and ICOs. Specifically, Akshay will share his experience with design decisions and implementation issues to avoid, and look into the future of Smart Contracts and ICO security.
Deja vu Security - Blockchain Security Summit - Navneet SumanScott Strang
Solving Blockchain Scalability
The RChain platform, a scalable blockchain, enables innovators, entrepreneurs, and enterprises to confidently deliver scalable and trustworthy decentralized solutions. We are creating a scalable blockchain by leveraging proof-of-stake consensus smart contract infrastructure using correct-by-construction engineering, and a partitioning technique leveraging namespaces.
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftIntellectsoft
More Details:
Intellectsoft Software Development Company: intellectsoft.net
Blockchain Consulting & Development Lab: blockchain.intellectsoft.net
Watch the Webinar - https://youtu.be/2av_goSQVVo?list=PLMifjE1aUsLMMLnvZKwH1Y3WPjFb13p-f
The revolutionary invention of blockchain is still a controversial topic, and Intellectsoft software development company is about to bring clarity in it. Being the leader in blockchain developing and consulting, it explains in simpler words the elegance of using this brand-new technology as a business decision. Specifically, the company facilitates the understanding of blockchain by both offering the readers essential facts about the innovation and creating applicable recommendations for further practical implementation.
To start with, Intellectsoft provides an overview of blockchain essentials, investigating the nature of this technology along with its structural elements. As a result, a key concepts of blockchain, including digital fingerprinting and access keys, are no longer a mystery for readers. Furthermore, the opportunities of Smart Contracts and mining are explained. In these sections, Intellectsoft already illustrates previously presented theoretical assumptions with practical examples. And the overview achieves a higher clarity, which facilitates the task of developing a blockchain decision for anyone interested. Then, the presentation proceeds to the question of blockchain real-time applications. This includes providing the list of industries that can benefit the most from the innovation and the real advantages their representatives can gain. The special attention is paid to financial services, government, and healthcare, among others. Finally, after describing the major differences between private and public blockchain, Intellectsoft creates recommendations for those interested in the implementation of this decision into business. And after reading, you will get much closer to the decision whether blockchain really deserves its place in your business practice specifically.
Investment Interest in Blockchain
• Blockchain has the potential to reduce infrastructure
cost by up to $20 billion a year.
• P2P money Transfer across international borders -
segment worth $500 B.
• Anderseen Horowitz ( VC firm) has invested over USD
$100 million into Blockchain technology
• All time Public/VC investment into Blockchain startups -
$894 million.
• Over 4000 active fintech startups in the NY arena and
investment in the sector tripling last year to $12 billion.
My presentation prepared for the one-day national level workshop on "Blockchain Technologies" organised by the Department of Information Technology, Academy of Maritime Education and Training. The presentation covers the definition, classification, components, structure and working of ethereum and bitcoin blockchains.
Bitcoin is a well-known technological achievement in the digital age. More individuals recognise its benefits as it becomes more widely available and utilised.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
1. How the Royal Bank of Scotland is approaching research and innovation
2. What we have looked at in the distributed ledger space
3. Example: Building a digital wallet on the Hyperledger Fabric
4. What we've learnt about Hyperledger and other DLs
5. The challenges we face as a bank and as blockchain developers
6. Thoughts for the future
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
The Harvard Business Review (HBR) thinks that Blockchain Technology has to power to keep data safe for consumers and businesses alike; because Blockchain provides a secure and immutable ledger, HBR says it represents the key to taking back privacy of data.
“You can keep certified copies of identity documents, biometric test results, health data, or academic and training certificates online, available at all times, yet safe unless you give away your key. At a whole system level, the database is very secure.”
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
Ethereum devcon1 in London, 27th November By Tomoaki Sato I have been to the conference, so I wrote this summary and doing presentation in Japan. The meetup name is "Smart Contract Japan". Some of the presentations are missing, or added.
Please refer these official sources also
Devcon
http://devcon.ethereum.org/
Devcon1 youtube presentations
https://www.youtube.com/user/ethereumproject
Devcon1 slides on reddit
https://www.reddit.com/r/ethereum/comments/3soym7/devcon_1_slides/
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
Deja vu Security - Blockchain Security Summit - Akshay AggarwalScott Strang
Deja vu Security and Peach Tech founder Akshay Aggarwal's slides from Deja vu Security's December 2017 Security Summit.
Security Landscape of Blockchain Technologies
ICOs and Smart Contracts have become popular. This talk will look at the underlying economic, technology, and process fundamentals underpinning Smart Contracts and ICOs. Specifically, Akshay will share his experience with design decisions and implementation issues to avoid, and look into the future of Smart Contracts and ICO security.
Deja vu Security - Blockchain Security Summit - Navneet SumanScott Strang
Solving Blockchain Scalability
The RChain platform, a scalable blockchain, enables innovators, entrepreneurs, and enterprises to confidently deliver scalable and trustworthy decentralized solutions. We are creating a scalable blockchain by leveraging proof-of-stake consensus smart contract infrastructure using correct-by-construction engineering, and a partitioning technique leveraging namespaces.
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftIntellectsoft
More Details:
Intellectsoft Software Development Company: intellectsoft.net
Blockchain Consulting & Development Lab: blockchain.intellectsoft.net
Watch the Webinar - https://youtu.be/2av_goSQVVo?list=PLMifjE1aUsLMMLnvZKwH1Y3WPjFb13p-f
The revolutionary invention of blockchain is still a controversial topic, and Intellectsoft software development company is about to bring clarity in it. Being the leader in blockchain developing and consulting, it explains in simpler words the elegance of using this brand-new technology as a business decision. Specifically, the company facilitates the understanding of blockchain by both offering the readers essential facts about the innovation and creating applicable recommendations for further practical implementation.
To start with, Intellectsoft provides an overview of blockchain essentials, investigating the nature of this technology along with its structural elements. As a result, a key concepts of blockchain, including digital fingerprinting and access keys, are no longer a mystery for readers. Furthermore, the opportunities of Smart Contracts and mining are explained. In these sections, Intellectsoft already illustrates previously presented theoretical assumptions with practical examples. And the overview achieves a higher clarity, which facilitates the task of developing a blockchain decision for anyone interested. Then, the presentation proceeds to the question of blockchain real-time applications. This includes providing the list of industries that can benefit the most from the innovation and the real advantages their representatives can gain. The special attention is paid to financial services, government, and healthcare, among others. Finally, after describing the major differences between private and public blockchain, Intellectsoft creates recommendations for those interested in the implementation of this decision into business. And after reading, you will get much closer to the decision whether blockchain really deserves its place in your business practice specifically.
Investment Interest in Blockchain
• Blockchain has the potential to reduce infrastructure
cost by up to $20 billion a year.
• P2P money Transfer across international borders -
segment worth $500 B.
• Anderseen Horowitz ( VC firm) has invested over USD
$100 million into Blockchain technology
• All time Public/VC investment into Blockchain startups -
$894 million.
• Over 4000 active fintech startups in the NY arena and
investment in the sector tripling last year to $12 billion.
My presentation prepared for the one-day national level workshop on "Blockchain Technologies" organised by the Department of Information Technology, Academy of Maritime Education and Training. The presentation covers the definition, classification, components, structure and working of ethereum and bitcoin blockchains.
Bitcoin is a well-known technological achievement in the digital age. More individuals recognise its benefits as it becomes more widely available and utilised.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
1. How the Royal Bank of Scotland is approaching research and innovation
2. What we have looked at in the distributed ledger space
3. Example: Building a digital wallet on the Hyperledger Fabric
4. What we've learnt about Hyperledger and other DLs
5. The challenges we face as a bank and as blockchain developers
6. Thoughts for the future
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
The Harvard Business Review (HBR) thinks that Blockchain Technology has to power to keep data safe for consumers and businesses alike; because Blockchain provides a secure and immutable ledger, HBR says it represents the key to taking back privacy of data.
“You can keep certified copies of identity documents, biometric test results, health data, or academic and training certificates online, available at all times, yet safe unless you give away your key. At a whole system level, the database is very secure.”
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
Ethereum devcon1 in London, 27th November By Tomoaki Sato I have been to the conference, so I wrote this summary and doing presentation in Japan. The meetup name is "Smart Contract Japan". Some of the presentations are missing, or added.
Please refer these official sources also
Devcon
http://devcon.ethereum.org/
Devcon1 youtube presentations
https://www.youtube.com/user/ethereumproject
Devcon1 slides on reddit
https://www.reddit.com/r/ethereum/comments/3soym7/devcon_1_slides/
Ethereum is the largest decentralized software platform that allows you to build smart contracts and decentralized applications without any downtime and without any third party interference.
VISIT:- http://www.oodlestechnologies.com/online-cryptocurrency-wallet
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
Short presentation on why a new paradigm is needed for applications & online services offered on the Internet. The Web3 vision relies on the Blockchain technology and the principle of decentralization as cornerstones, to enforce data privacy & require user consent.
By the end of this webinar you should be able to understand
The concepts, use cases and basics of smart contracts
How Blockchain and smart contracts work and developer success
How smart contracts work on both the Ethereum and Hyperledger platforms from a practical level
The constructs of smart contract, common coding requirements and demos
What are the most in demand Blockchain Certifications?
How do these certification meet the needs of todays Enterprises?
What about Blockchain Career Demand?
Resource slides for blockchain related questionLin Lin (Wendy)
Question regards Ethereum hard fork, public vs private blockchain, smart contract examples, what is crptocurrency and how to get it, why blockchain starts with fintech etc.
The disruptive Blockchain technology has found more than a thousand use cases and abundant potential in all major domains and industry verticals. This is where open-source blockchain platforms step in. They help to develop robust prototypes at reduced costs and enhanced speeds. Let us dig deeper into Top Open-Source Blockchain Platforms of 2018.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
When stars align: studies in data quality, knowledge graphs, and machine lear...
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
1. BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
Adam Cecchetti
CEO, Deja vu Security
The Realities of Enterprise Blockchain
dejavusecurity.com
4. Early Ledger Technology
Estimated to be ~5,000+ years old
Based on Clay Technology
A fork of the dirt project
Record transactions using Stick and Cuneiform
Bake at 500-600 C to mint a tablet
Add an entry into the codex then stack to chain
records
Downsides
Shatter to erase record
Very low transaction throughput and high latency
Difficult but not impossible to forge
Just need to be literate ~4000 years ago
5. Early Ledger Tech : Not Privacy
Preserving!
“A stockpile of 12,000 trade accounts left by Assyrian
merchants in the 19th century BCE has been used to find
half a dozen locations. The researchers used
mathematical models based on the prices of goods and
the frequency of trips between trade hubs to pinpoint
where the cities once stood.”[0]
6. Blockchain
Transactional ledger of time and events
Global stack of ordered clay tablets
Thee that holds this token pay two lambskins of wine to
One sheep and a bolt of textile for thy that can sign this stone
Everyone gets a copy of every tablet every time a new
tablet is baked and agreed upon as the latest snapshot of
reality
In reality : usually flat file Database that is represented
as a graph of transactions or program state
Databases representing this state have gotten fairly large
Every node has to verify every transaction or run every
program to validate each of the blocks
BTC : 155 GB Ethereum : 263 GB Dash : 4.6 GB
7. Blockchain
Verified by
Proof of Work : Cryptographic Hashing
Proof of Stake : Lock coins in special voting wallet
Voting : Membership, vote, centralized ordering
Stores properties for ordered transactions
Not private nor privacy enforcing
Difficult but not impossible to forge a block
Just need more
Petahash power to perform a 51% attack
Tokens that you can stake any transaction you want
Members to perform a cabal, sunset, or collusion attack
Access to the various Private Keys
About as trivial as being literate 4000 years ago
11. Early Computing : Mainframe
Turing complete multi-user
computer
Flat memory address space
Compute and storage
expensive
Little data or code protection
Large focus on data throughput
Accessible to anyone with a
direct terminal, X.25
connection, or this ARPANET
thing.
12. Ethereum : a “new” computer
Turing complete computer with a virtual machine
(EVM)
Flat memory address space
Distributed system accessible via the P2P network
Tracks program and data state on the blockchain
Storage and compute currently expensive
Smart Contract are programs that gate changes to
the Blockchain via the EVM
By default users can see all data and call contract
functions
Byzantium changes beginning to address data privacy
challenges (Elliptic curve add/mul zkSNARKS, big int
mod)
13. Early Program Storage Tech:
ROM
Collection of data or code
Diode Matrix or later EEPROM
Store data or code
Diode Matrix “Immutable”
Blow diodes to write a program or
bits
Write once read multiple (WORM)
Data or code readable by anyone
that knows where the chip is or
what bus it is on
Destroy by blanking with
Commands, UV, or physically
destroying the chip
14. Smart Contracts
Collection of various data and code
Functions to perform logic, read, writes stored
on block chain
Immutable code written to Ethereum contract
account address
Compiled EVM bytes
Cannot be updated or patched
Destroy by calling special code Suicide
15. Smart Contract Bug Classes
Newness of the EVM computer
Lack of clean well coded audited examples
Solidity code very difficult to get right
Difficulty in understanding side-effects in the programming environment
Contract data or code public readable/callable/alterable
Exceptions can take different logical flows depending on the version of Solidity
Fallback function of the contract calling your contract can execute by default
depending on the state, function called, or out of gas
Memory layout in the EVM can have side effects for mappings and other complex
structures
Multi inheritance ordering
Solidity compiler can optimize out conditionals
Solidity compiler auto-gen functions
Modifiers wrap entire functions changing expected behavior
Classic security issues of int overflows, flow control, etc
The list goes on and on and on…
16. Sharding The Ethereum
Network
Sharding will split the network into multiple
parts requiring a hybrid Proof of Stake / Work
Casper upgrades required for sharding
Hybrid Proof of Work/Proof of Stake
“Goal to have same transaction scale as VISA
network”
Ethereum : ~7.5-20 TX/sec
VISA : ~1667 TX/sec
There’s some ground to go
17. Ethereum
Globally accessible computer of carefully
managed applications stored in a ROM like
fashion
These programs gate logical access to writing
changes to the blockchain that stores the
applications state and data
State of data and code are put into blocks are
mined and put onto the blockchain by a Proof
of Work
18. Ethereum
Significant effort currently focused on scale
and data throughput
Just like early mainframe days
TX throughput, Bus Latency, etc
Just like early days of any new computers
seeing the same issues
Patching, Data Privacy, User Privileges, Process
separation
Code isolation, Latency, Throughput, Availability,
etc
20. Computers: Great At Looping
Humans
Every time we build a new computer we build the same 10 problems
Determinism, Reliable, Available, Communication, Security, Distributed, Fault
Tolerant, Scalable, Isolation, Identity
New computer new side effects new security issues
Comp Dete
r
Relia
b
Avali Com Sec Dist FT Scal Isol ID
Main X X X X X
PC X X X
Web X X X X X X
Mobile X X X X X X X X
Cloud X * * X X * * X X
IoT X X X X
DAPP X X X X X X
21. How Cross Org Syncing Is Still
Done
SFTP TX, Engineering, or Media Files
BATCH HTTPS pushes which send flat files
Shipping hard drives and tapes of records
Manual conflict resolution is still common
Call up the person and hand edit data merged
Resolution can take weeks
22. Where can Enterprises use
Blockchain?
Cross team or cross organization transactions,
auditing, and dispute resolution
Auditable – Chain keeps audit record of data
and state
Instant auditability if transactions are properly
synced
Maintenance records, accounting, etc
Permissioned – gated by member system
Privacy – If properly utilized
23. Quorum
Ethereum based
Enterprise version of a distributed ledger system
Sponsored by JPMC Led by Amber Baldet
Built to provide permissioned system access and TX privacy
Replaces Proof of Work with Raft nodes based consensus
system with a leader minting new blocks
Instead of miners doing proof of work
P2P Network permissioned nodes to participate
Enables cross organizations
To access a blockchain and run smart contracts in a
Permissioned
Private manner
Minus all the mining work
24. Quorum
Permissioned Network
Whitelist of valid network nodes
Private Transactions
Transaction data is replaced with a hash of the
encrypted data
Encrypted data is encrypted and decrypted via
key management system called Constellation
25. Hyper Ledger Fabric
IBM Sponsored Project
Functionally similar to Quorum
Membership Service gates enrollment
Ordinal Service organizes the blocks
Uses voting with Node and Endorsing Peers
Public and Private chains
Smart Contracts are called Chain Code
26. Quorum and Hyperledger
Focused on solving the scalability, privacy, and
isolation issues with current block chain
system
New blocks ever 50 millisecond vs 7 second to
10 minutes
Private transaction data
Private blockchains
28. BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
Adam Cecchetti
CEO, Deja vu Security
The Realities of Enterprise Blockchain
dejavusecurity.com
29. BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
dejavusecurity.com
IN PARTNERSHIP WITH: