The document is a presentation by Daniel Lilliehöök on bitcoin and blockchain technology. It provides an overview of bitcoin as a digital currency and payment network not controlled by any central authority. It explains how transactions are recorded on a distributed public ledger called the blockchain, which uses cryptography and a consensus mechanism called proof-of-work to ensure security. Miners process transactions and are incentivized with block rewards and transaction fees to secure the network and validate new blocks.
Write fast, think later - Event sourcing for IoT and MobileLorenzo Nicora
Write fast, think later - Event sourcing for building reliable microservices in the unreliable world of IoT and Mobile
[Munich microservices meetup - 18/01/2018]
DSD-INT 2018 Building a Blockchain - De RooijDeltares
Presentation by Erik de Rooij (Deltares) at the Data Science Symposium 2018, during Delft Software Days - Edition 2018. Thursday 15 November 2018, Delft.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Write fast, think later - Event sourcing for IoT and MobileLorenzo Nicora
Write fast, think later - Event sourcing for building reliable microservices in the unreliable world of IoT and Mobile
[Munich microservices meetup - 18/01/2018]
DSD-INT 2018 Building a Blockchain - De RooijDeltares
Presentation by Erik de Rooij (Deltares) at the Data Science Symposium 2018, during Delft Software Days - Edition 2018. Thursday 15 November 2018, Delft.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
During this presentation, we will cover a brief introduction into Blockchain technology, historic use cases & emerging trends for Blockchain technology. We will also touch on what to expect from Blockchain technology in 2019. It is important to understand the progress that is being achieved every day with every single step we take towards real use cases for Blockchain projects. 2019 might be the first year where the Blockchain starts to become a central part in people’s lives and in some industries.
Main points covered:
• Conduct a brief introduction to Blockchain technology;
• Discuss both historic use cases and emerging trends for Blockchain technology;
• What to expect from Blockchain technology in 2019
Presenter:
Our presenter for this webinar is Kenneth Kimbel, a Cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Currently, Kenneth is a data privacy and Cybersecurity Advisory Consultant with Deloitte. He is also knowledgeable on both current technical and legal issues in security.
Date: March 27th, 2019
Recorded webinar: https://youtu.be/fLjVgj6MAPY
Confidential Computing - Analysing Data Without Seeing DataMaximilian Ott
How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks.
In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...Ingo Weber
This keynote talk covered research and insights from the speaker’s last 7 years of research on two topics of relevance to the RSDA workshop. The first part was about behavioural data analytics for reliability and dependability purposes, i.e., with a focus on sequences of events, rather than static structures or the presence of certain events in a log. Specifically, the approach of using Process Mining techniques to gain insights into traces of logged events was presented.
The second part of the talk was centred around a summary of insights into security, dependability, and reliability aspects of blockchain applications. With the introduction of smart contracts, blockchain technology has become a general-purpose code execution framework, and architects and developers need to understand the specific implications on security and dependability when building applications on blockchain.
This presentation was part of an entry to the internal PayPal Singapore Development Centre TechSpeaker contest. It tries to explain to the audience how I would go about adding a missing core features into an old hackathon product (a Notarization Service built on Bitcoin) and the motivation for doing so. The Presentation made it into the final 5 contestants.
The presentation will give the basic idea about what is blockchain technology, it's architecture, main features, types of blockchain network and other things that will make your fundamentals clear.
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Grokking TechTalk #17: Introduction to blockchainGrokking VN
Speaker: Do The Luan - CARDADO labo
Bio: I work currently for CARDADOlabo, a Japanese Fintech startup. I'm obsessed by Ethereum and I have had a strong passion of research. I hold B.S from University of Science of HCM city and a M.S of computer science from La Rochelle University. I was a lecturer for 3 years at the University of Information Technology.
Description:
In this talk, Luan will share with us a high-level technical introduction about Blockchain, Bitcoin and Eutherium.
- What is blockchain and how is it related to bitcoin?
- What is Ethereum, the second-generation of blockchain
By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet. Originally devised for the digital currency, Bitcoin, the tech community is now finding other potential uses for the Blockchain technology.
Ethereum, 2nd generation blockchain technology, is an open source blockchain project that was built specifically to realize the coding of simple contracts on distributed ledgers. Still in its early stages, Ethereum has the potential to leverage the usefulness of blockchain on a truly worldchanging scale.
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
This presentation gives you the sense on what is Blockchain and how does work
Blockchain is the technology that can disrupt economies by decentralizing , democratizing trust and eliminating unnecessary intermediaries using the TRUST protocol!
(Note: All numbers / brands / currencies used in these slides are for demonstration purposes)
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
During this presentation, we will cover a brief introduction into Blockchain technology, historic use cases & emerging trends for Blockchain technology. We will also touch on what to expect from Blockchain technology in 2019. It is important to understand the progress that is being achieved every day with every single step we take towards real use cases for Blockchain projects. 2019 might be the first year where the Blockchain starts to become a central part in people’s lives and in some industries.
Main points covered:
• Conduct a brief introduction to Blockchain technology;
• Discuss both historic use cases and emerging trends for Blockchain technology;
• What to expect from Blockchain technology in 2019
Presenter:
Our presenter for this webinar is Kenneth Kimbel, a Cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Currently, Kenneth is a data privacy and Cybersecurity Advisory Consultant with Deloitte. He is also knowledgeable on both current technical and legal issues in security.
Date: March 27th, 2019
Recorded webinar: https://youtu.be/fLjVgj6MAPY
Confidential Computing - Analysing Data Without Seeing DataMaximilian Ott
How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks.
In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...Ingo Weber
This keynote talk covered research and insights from the speaker’s last 7 years of research on two topics of relevance to the RSDA workshop. The first part was about behavioural data analytics for reliability and dependability purposes, i.e., with a focus on sequences of events, rather than static structures or the presence of certain events in a log. Specifically, the approach of using Process Mining techniques to gain insights into traces of logged events was presented.
The second part of the talk was centred around a summary of insights into security, dependability, and reliability aspects of blockchain applications. With the introduction of smart contracts, blockchain technology has become a general-purpose code execution framework, and architects and developers need to understand the specific implications on security and dependability when building applications on blockchain.
This presentation was part of an entry to the internal PayPal Singapore Development Centre TechSpeaker contest. It tries to explain to the audience how I would go about adding a missing core features into an old hackathon product (a Notarization Service built on Bitcoin) and the motivation for doing so. The Presentation made it into the final 5 contestants.
The presentation will give the basic idea about what is blockchain technology, it's architecture, main features, types of blockchain network and other things that will make your fundamentals clear.
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Grokking TechTalk #17: Introduction to blockchainGrokking VN
Speaker: Do The Luan - CARDADO labo
Bio: I work currently for CARDADOlabo, a Japanese Fintech startup. I'm obsessed by Ethereum and I have had a strong passion of research. I hold B.S from University of Science of HCM city and a M.S of computer science from La Rochelle University. I was a lecturer for 3 years at the University of Information Technology.
Description:
In this talk, Luan will share with us a high-level technical introduction about Blockchain, Bitcoin and Eutherium.
- What is blockchain and how is it related to bitcoin?
- What is Ethereum, the second-generation of blockchain
By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet. Originally devised for the digital currency, Bitcoin, the tech community is now finding other potential uses for the Blockchain technology.
Ethereum, 2nd generation blockchain technology, is an open source blockchain project that was built specifically to realize the coding of simple contracts on distributed ledgers. Still in its early stages, Ethereum has the potential to leverage the usefulness of blockchain on a truly worldchanging scale.
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
An introduction to blockchains, a session handled by Adri Jovin J J, Department of Information Technology, Sri Ramakrishna Institute of Technology. This gives a basic outline of the blockchains.
This presentation gives you the sense on what is Blockchain and how does work
Blockchain is the technology that can disrupt economies by decentralizing , democratizing trust and eliminating unnecessary intermediaries using the TRUST protocol!
(Note: All numbers / brands / currencies used in these slides are for demonstration purposes)
Block Chain as a Platform February 2015 - LERNER ConsultingLERNER Consulting
Block chains are part of the underlying infrastructure for Bitcoins. They are the accounting portion of the bitcoin ecosystem. The art of the possible for block chains is to use them for a larger ledger systems.
Any digital centralized registry (e.g., health records) can be made a part of the block chain system. Much like public and private cloud infrastructure has arisen, block chain as a platform is an emerging opportunity for entrepreneurs and innovator.
Presentation to the Pittsburgh Association of Financial Professionals discussing Crypto-currencies and Blockchain. Emphasis on the importance of expanding familiarity with virtual currency and Blockchain technology. Exploring the potential for both utility and disruption for financial professionals.
Instructor: Roger Royse, Founder of Royse Law Firm
Course Title: The Business Basics of Blockchain, Cryptocurrencies, and Tokens
Location: Stanford Continuing Studies
Week: 2 (of 7)
The second class will describe the underlying blockchain technology and explain key concepts such as block, hash, blockchain, mode, nonce, distributed and decentralized ledgers, mining, tokens, proof of work, and proof of stake. We will discuss how the technology works and the ways that block chain solutions verifies transactions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Daniel Lilliehöök:
• Ph.D. theoretical physics 2000
– Post doc at MIT and Oxford University
• In IT-architecture since 2003
– Chief IT-architect at Eniro, Riksbyggen
• Co-founder of Innovate Security 2015
– Information security and architecture
– 10 employees 2017
• Heard about ”Bitmoney-something” 2013...
2018-02 Daniel Lilliehöök
3. What is bitcoin?
1. An independent
currency
2. A digital peer-to-
peer payment
network
2018-02 Daniel Lilliehöök
4. How to send or receive bitcoin
2018-02 Daniel Lilliehöök
5. What’s new?
• International currency
– Not tied to any country
• Not controlled by any central authority
– No central bank
– No bank account needed
• Total amount of bitcoins is fixed
– Known and unchangeable internal inflation
• Transactions are irreversible
– No one can undo a transaction for you
2018-02 Daniel Lilliehöök
6. What’s the value?
• Exchange rate is set in
a free market
– Have to exchange with
someone who owns
bitcoin
• Exchange sites
matches trade orders
– Coinbase, Kraken,
Bitstamp, LocalBitcoins…
2018-02 Daniel Lilliehöök
14. The bitcoin blockchain
Blocks contain transactions
between liability accounts
2018-02 Daniel Lilliehöök
Transaction id Account nr Debit Credit Verification nr
2566 1111111-1 1,21 1234
2566 2222222-2 1,20
2566 3333333-3 0,01
15. The bitcoin blockchain
Blocks contain transactions
between liability accounts
2018-02 Daniel Lilliehöök
Transaction id Account Nr Debit Credit Verification nr
2566 1111111-1 1,21 #####
2566 2222222-2 1,20
2566 3333333-3 0,01
Bitcoin address Input Output Digital signature
bitcoin
terminology
16. Nothing new yet
• Any part (company, bank etc) can issue
and administer an accounts book
• BUT then:
– Users have to apply to get an account
– Have to trust the issuer
2018-02 Daniel Lilliehöök
18. Hash functions
2018-02 Daniel Lilliehöök
Input data
…………………
…………………
…………………
…………….
Hash value
Input data of any length
Fixed length hash value
Hash
function
19. Hash function: SHA-256
2018-02 Daniel Lilliehöök
fox
SHA-256
The quick
brown fox
jumps over
the lazy dog
d7a8fbb307d78094
69ca9abcb0082e4f
8d5651e46d3cdb76
2d02d0bf37c9e592
SHA-256
The quick
brown fox
jumps ouer
the lazy dog
SHA-256
776cb326ab0cd5f0
a974c1b9606044d8
485201f2db19cf8e
3749bdee5f36e200
1f74feeeff32873c
2dcef987ff8fb8b8
becefef4ead58eb0
407d439c19f92b32
20. Swedish social security numbers
2018-02 Daniel Lilliehöök
Luhn hash
function
840101-971 9 Control digit
9
21. Private- and public keys
2018-02 Daniel Lilliehöök
Private key Public key
A * B = C
22. Digital signatures
2018-02 Daniel Lilliehöök
Message
…………………
…………………
…………………
…………….
Hash value
=
?
Signature
function
Verification
function
Hash value
Signature
23. Bitcoin addresses
• Generate a private and public key-pair
• Bitcoin address is the hash (of the hash) of
the public key
2018-02 Daniel Lilliehöök
1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
Public key
24. Bitcoin wallets
• Generates new bitcoin
addresses
• Stores your private key(s)
• Listens to transactions on the
network
• Can generate and post
signed transactions
2018-02 Daniel Lilliehöök
28. Block rewards
• One special transaction allowed on each
block:
• All initial balances come from these
• Incitement for many to submit new blocks!
2018-02 Daniel Lilliehöök
Transaction id Bitcoin address Input Output Digital signature
2582 ????????? 12,5 [N/A]
29. Proof-of-Work
• Must be difficult to submit a new block:
– Add a meaningless but hard mathematical puzzle
for each block
– Adjust the difficulty of the puzzle depending on
how many are trying
2018-02 Daniel Lilliehöök
30. Proof-of-work
Bloch hash must be smaller than a target number
2018-02 Daniel Lilliehöök
Block 118
Previous hash
Timestamp
Nonce
Block hash
117
Nonce
Block hash
119
Previous hash
Timestamp
32. Rule: block reward declines
• The block reward is cut in half every 4
years (every 210’000 block)
2018-02 Daniel Lilliehöök
33. Blockchain rules:
• Anyone can request and verify blocks
• Anyone can submit new blocks
• Valid blocks requires a proof-of-work
hash
• Miners collect transactions, and try to
compose new valid blocks
• Miners and users trust the longest chain
2018-02 Daniel Lilliehöök
34. What miners do – startup
• Request and verify first
block(s)
• Verify transactions
• Keep track of unspent
outputs
• Repeat with next block(s)…
2018-02 Daniel Lilliehöök
Unspent
outputs
35. What miners do – continually
• Collect new transactions from network
– Check signatures
– Verify and update unspent outputs
– Add my own address as recipient of the transaction fees
• Construct a suggested next block
– with the block reward and fees given to my own address
• Try to find a nonce so that block-hash is less than
target difficulty
– If I find a nonce that makes the block valid, post it to all
other peers
– If someone else posts a new valid block, process it and
start working on the next block
2018-02 Daniel Lilliehöök
36. Immutability of the blockchain
• To “cheat” the blockchain, an attacker
needs to control more than 50% of the
hash-power in the network
• More miners => higher security
• Higher security => higher value
• Higher value => more miners…
2018-02 Daniel Lilliehöök
37. What’s a hard fork?
• As long as all peers agree on the same rules,
only one version of the chain will grow.
• If community is divided in two different sets of
rules, the chain will split in two separate
branches.
2018-02 Daniel Lilliehöök
38. Summary
• The bitcoin blockchain is an immutable
distributed ledger of credit balances on
bitcoin addresses
• Miners bookkeep transactions and are
rewarded newly created bitcoins for their
efforts
• A large number of independent miners
ensure that no single party can manipulate
data recorded on the blockchain
2018-02 Daniel Lilliehöök