SlideShare a Scribd company logo
iExec V3: A Decentralized Approach
to Dataset Monetization
Eth. Dev. Conf.
Seoul, Korea, 28 Mai, 2019
Gilles Fedak, Eric Rodriguez,
Victor Bonhomme
gf@iex.ec
Agenda
Why data monetization matters.
Blockchain-based decentralized marketplace
iExec architecture
Use-cases
Conclusion
Data is the new Gold !
Data Deluge
https://medium.com/@melodyucros/ladyboss-heres-why-you-should-study-big-data-721b04b8a0ca
https://www.researchandmarkets
.com/research/bvgxvl/global_sen
sors_in
100 billion
connected
devices
in 2025
Preserving Data Ownership and Sovereignty
● Data privacy, ownership, sovereignty
is becoming a main concern
● Web3.0 gives more control over user
data.
● Today we talk about Data Renting
https://101blockchains.com/web-3-0-examples
iExec - Timeline
ICO - 04/17
Off-chain computing
SDK, Dapp Store,
Dapp Challenge
87M RLC issued
10k BTC raised
V1 - 11/17Background
15 years
in cloud
computing
& HPC
V2 - 05/18 V5V3- 05/19
Data Store
Data Renting
-
Lightweight
workers
-
Mainnet
Marketplace
fog/edge
computing
for IoT
GPU
Bags
of Task
Side chain
V4 -end 19
Decentralized cloud computing
Blockchain-based Decentralized
Cloud Computing
● Decentralized marketplace for computing resources (servers, applications,
datasets)
● Use Ethereum to advertise/provision computing resources
● Providers can interact in a P2P way, without central authority
DATA PROVIDERS
SERVER PROVIDERS
APPLICATION PROVIDERS
Why Does it Matter ?
● Decentralized applications need
an infrastructure
● Cheaper, greener, more efficient
than traditional centralized Cloud
The iExec Token: RLC
Token usage
● The RLC Token is the only way to access the iExec decentralized cloud
● Providers are paid with RLC
● Allows to build incentives in the network.
● Issued on main net on April 2017
Trust
Trust level
parameter
Decentralized by design
Proof Of Contribution
https://medium.com/iex-ec/poco-series
Providers
Proof-of-Contribution
staking + reputation + result certification:
• A confidence threshold is associated with each requested execution
• Workers have a reputation
• Before executing a task, workers commit a security deposit (stake)
• The execution confidence threshold is computed by comparing results and computing a
function of the credibility and stake
• Task is duplicated as long as the confidence threshold is not met
• Workers who computed an erroneous results loose their stake
• Workers who correctly compute gains the payments + the losers’ stake
• Reputation is adjusted
iExec End-to-End Trusted Execution with Intel SGX
Enclaves: Confines execution and data within a encrypted environment: no
one can access/tamper the execution
● SDK that provides full end-to-end privacy preserving computation
○ for application/input/results
○ guarantee execution integrity
○ provide on-chain enclave execution attestation
Ensuring Data Privacy
Trusted Execution
Environment
1. Encrypted INPUT
2. Encrypted processing
3. Encrypted OUTPUT
Use Case 1
E2E Data Privacy for Healthcare
Application
Nilearn: a framework from Neuro imaging
Demo RSAConference 2019:
brain scans with diagnostics.
Privacy preservation for data and requester.
Use Case 2
Monetize IA trained model
in computer vision
The data renting concept
INPUT OUTPUTPROCESSING
Data
● trained model
● pretrained model?
● dataset
Application
● ML framework
● load model
● call prediction function
Value +++ Value +
Monetize AI model in computer vision
a generic framework?
in a web application
https://nsfw.app.iex.ec
make a prediction
run an application
trained model = dataset
get the result
● classification
● score
● object
detection
...
Input data
Use Case 3
Decentralized Oracle: monetize Web2.0
information on the blockchain
Doracle
● Allows to fetch off-chain
information.
● Bridge Web2.0 and Web3.0
● Decentralized: censorship
resistant
Build your own Doracle !
Doracle Example: Pricefeed
https://price-feed-doracle.iex.ec
Conclusion
Share your computing resources: dApps or
datasets
Easy build... for awesome features
AUTOMATIC
PAYMENTS
PRIVATE RUN
SERVERLESS
ACCESS CONTROL
FINE TUNE PRICING / PAY PER TASK
Few line of codes
Blockchain
complexity is
hidden
IEXEC
DOCUMENTATION https://docs.iex.ec/
TUTORIALS https://github.com/iExecBlockchainComputing/apps
ANY QUESTION? https://iex.ec/
Thank you
Gilles Fedak
https://iex.ec
gf@iex.ec
26

More Related Content

What's hot

Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
IJECEIAES
 
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Black Sea Summit — IT-conference in Odessa
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
Kenneth Moore
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
Ryu Yamashita
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
Cybozucommunity
 
Business Transformation through Data with an Open IoT Architecture
Business Transformation through Data with an Open IoT ArchitectureBusiness Transformation through Data with an Open IoT Architecture
Business Transformation through Data with an Open IoT Architecture
Roberto Siagri
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
Bob Marcus
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Tyrone Systems
 
Artificial Intelligence & IOT
Artificial Intelligence & IOTArtificial Intelligence & IOT
Artificial Intelligence & IOT
Akber Khan
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
Vish Nandlall
 
Software training courses
Software training coursesSoftware training courses
Software training courses
mingglelabs
 
What the IoT should learn from the life sciences
What the IoT should learn from the life sciencesWhat the IoT should learn from the life sciences
What the IoT should learn from the life sciences
Boris Adryan
 
IoT dan Revolusi Industri
IoT dan Revolusi IndustriIoT dan Revolusi Industri
IoT dan Revolusi Industri
Widy Widyawan
 
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real WorldIoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
MIT Enterprise Forum Cambridge
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructure
ieeechennai
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An Overview
Knoldus Inc.
 
Ai dan big data
Ai dan big dataAi dan big data
Ai dan big data
Widy Widyawan
 
Data Science London - Meetup, 28/05/15
Data Science London - Meetup, 28/05/15Data Science London - Meetup, 28/05/15
Data Science London - Meetup, 28/05/15
Boris Adryan
 

What's hot (20)

Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
 
Business Transformation through Data with an Open IoT Architecture
Business Transformation through Data with an Open IoT ArchitectureBusiness Transformation through Data with an Open IoT Architecture
Business Transformation through Data with an Open IoT Architecture
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
 
Artificial Intelligence & IOT
Artificial Intelligence & IOTArtificial Intelligence & IOT
Artificial Intelligence & IOT
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Software training courses
Software training coursesSoftware training courses
Software training courses
 
What the IoT should learn from the life sciences
What the IoT should learn from the life sciencesWhat the IoT should learn from the life sciences
What the IoT should learn from the life sciences
 
IoT dan Revolusi Industri
IoT dan Revolusi IndustriIoT dan Revolusi Industri
IoT dan Revolusi Industri
 
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real WorldIoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
IoT Analytics: Using Analytics to Generate High Value from IoT in the Real World
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructure
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An Overview
 
Ai dan big data
Ai dan big dataAi dan big data
Ai dan big data
 
Data Science London - Meetup, 28/05/15
Data Science London - Meetup, 28/05/15Data Science London - Meetup, 28/05/15
Data Science London - Meetup, 28/05/15
 

Similar to EthCon Korea 28 May 2019

Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
Mphasis
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Henrique Centieiro
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Which Computing Infrastructure for the Decentralized World ?
Which Computing Infrastructure for the Decentralized World ?Which Computing Infrastructure for the Decentralized World ?
Which Computing Infrastructure for the Decentralized World ?
Gilles Fedak
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
Cognizant
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
Marcus Maneja
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
SuradhaIyer
 

Similar to EthCon Korea 28 May 2019 (20)

Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Which Computing Infrastructure for the Decentralized World ?
Which Computing Infrastructure for the Decentralized World ?Which Computing Infrastructure for the Decentralized World ?
Which Computing Infrastructure for the Decentralized World ?
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 

Recently uploaded

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

EthCon Korea 28 May 2019

Editor's Notes

  1. Thank you very much fo the introduction and the invitation. It’s a great honour to be here. in this talk, I will introduce our new vesion 3, with a focus on decenetralized marrketplace for datasets
  2. The amount of data generated by the humnkind is gowong exponentially. That was the web, information published on-line, then social interaction. In the future, we will see more and more devices connected to the Internet that will generate huge amount of data. So need for decentralization, we cannot store and process everything in the centralized Cloud
  3. Today main problem issue is that our data are handled by centralized authoities: eitheir Cloud poviders, or application: Facebook, Google etc. And what we want today is to get control over our data again. This is the promise of web3.0. We want decentralized processing for data. This as business impact. Today, I want to introduce you a new concept: data renting. You keep ownership of your data and you monetize the usage of your data. This is possible thanks to decentralization, because you control your data, and not someone else.
  4. To introduce iExec. I Was researcher with 15 years background in Clould and HPC. Did our ICO. 25 people. 2 weeks ago we released V3. Mainnet