Identity - Past Solutions & Current Blockchain Landscape. Intro and profile of ENS (Ethereum Naming Service) & uPort identity solution. Silicon Valley Ethereum meetup @ Goodwin Law, May 7, 2017.
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
A primer on how the blockchain may be repurposed within higher education contexts. Based on research and praxis. Link to the webinar: https://www.youtube.com/watch?v=2ubwTmtlkWc&t=316s
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
This talk discusses sovereignty as a foundational model for a new kind of identity system that not only establishes all entities as peers, but also provides the means of using verifiable claims to build trustworthy relationships. A self-soversign identity system with verifiable claims provides increased privacy and control for individuals, more transparent consent, opens new opportunities for relying parties and third party claims providers, and reduces or eliminates integration costs while making systems simpler.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
These slides were presented at Darefest 2016 in Antwerp. The presentation explains the evolution of cryptocurrency and the next steps towards full decentralisation.
For more info or to book your own session, visit www.bite.be
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
Let’s look into the world of self-sovereign identity and what problems technologies like Hyperledger Indy and Sovrin network try to solve with usage of blockchain.
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
A primer on how the blockchain may be repurposed within higher education contexts. Based on research and praxis. Link to the webinar: https://www.youtube.com/watch?v=2ubwTmtlkWc&t=316s
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
This talk discusses sovereignty as a foundational model for a new kind of identity system that not only establishes all entities as peers, but also provides the means of using verifiable claims to build trustworthy relationships. A self-soversign identity system with verifiable claims provides increased privacy and control for individuals, more transparent consent, opens new opportunities for relying parties and third party claims providers, and reduces or eliminates integration costs while making systems simpler.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
These slides were presented at Darefest 2016 in Antwerp. The presentation explains the evolution of cryptocurrency and the next steps towards full decentralisation.
For more info or to book your own session, visit www.bite.be
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Decentralized identity uses standards to create an interoperable language for new identity products and services to be build. Using Verifiable Credentials and Decentralized Identifiers.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
Let’s look into the world of self-sovereign identity and what problems technologies like Hyperledger Indy and Sovrin network try to solve with usage of blockchain.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Presented at TechTonic Tuesday hosted by NCTechConnection.
The promise of Blockchain : This sessions will cover important aspects of Blockchain technology that underlies Bitcoin and how this will impact the world we live in.
Rajiv Bio:
Rajiv is an educator, entrepreneur, risk manager and a technology management executive. He has co-founded and worked at startup companies in the Sacramento area. At present he is President of Laru Technologies, which leverages Business Intelligence methodologies to help Financial Institutions monitor payment risk. He is also an adjunct professor at Sacramento State University where he teaches Technology Management for Executives as part of the EMBA curriculum.
Permissionless society meetup Sept 21, 2017 Amsterdam. Introduction into the overlap in blockchain - and identity management technology: where they meet in symbiosis.
Blockchain and Hook model of engagement Rajeev Soni
This is a quick overview to Blockchains and the Hooked model of technology product engagement. I speak on Product Management, Digital Marketing and Technology topics.
This is a presentation I delivered at the Jamia Milia Islamia University in Delhi.
Nowadays most components of a full identity infrastructure are available as Open Source components - and some even within The ASF: identity repositories, provisioning engines, access management systems.
Picking these bricks to realize a solution that will suit the wide-range ever-changing organizations' needs is a real challenge for all system integrators in the Identity & Access Management area.
Some real-word use cases and scenarios will be reviewed in this presentation to highlight strengths, flexibility and benefits - but also wicked problems and possible improvements - that Open Source Identity infrastructures can provide to organizations and final users.
In this MIT Enterprise Forum of Cambridge Innovation Series event, we heard from CEOs, founders, and technology experts at the companies on the forefront of this ongoing digital transformation of supply chain.
Speakers: Samantha Radocchia, Co-Founder and Chief Product Officer, Chronicled, Brigid McDermott, Vice President, Blockchain, IBM, Dan Harple, Founder and CEO, Context Labs, Dan Doles, CEO, Mojix and Bill McBeath, Chief Research Officer, ChainLink Research
Moderated by: Michael Casey, Senior Advisor - Blockchain Research, MIT Media Lab
This talk will focus on the role of blockchain in the new digital economy and the characteristics of a sustainable blockchain company. Professor Lee will talk about the 4Ds and LASIC, Hinternet and the type of deep business skill and strategy that are needed to excel in the blockchain industry. Those who are looking into fundraising by ICO/ITS’s and investing in Blockchain technology will find this talk interesting.
A short 101 on blockchain and cryptocurrencies - What is blockchain? How to get started investing in crypto? Tactical tips for keeping your investment secure. Presentation for Blockchain & Cryptocurrency Meetup at WeWork San Francisco, Oct 23 2017.
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
Similar to Identity - Past Solutions & Current Blockchain Landscape (20)
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Identity - Past Solutions & Current Blockchain Landscape
1. Identity: Past Solutions &
Current Blockchain Landscape
SiliconValley Ethereum Meetup: May 7, 2017
Andy Atkin (andrew.atkin@gmail.com)
2. What is Identity? (Dictionary)
1. The fact of being who or what a person or thing is.
2. A close similarity or affinity
• People
• Organizations (e.g. companies)
• Things (e.g. IoT devices, servers)
3. Identity: Control & Ownership
(B. Golden, email conversation 3/2017)
•Who “owns” it?
•Who controls it?
•Who has the ability to change it?
4. Personal Identity
(wikipedia)
• Composed of multiple overlapping attributes many of
which change over time:
• Age
• Race
• Clan/Family
• Ethnicity
• Nationality
• Gender
• Profession etc.
• A philosophical and social construct.
5. Digital Identity – Related Concepts
(wikipedia)
•Subject & Entity
•Attributes, Preferences &Traits
•Trust, Authentication & Authorization
•IdentityTaxonomies
•Identity Networks
6. Digital Identity – Some Legal Intersections
Compliance Census/National ID Digital
Notaries
Travel Crime
KYC/AML – US
Financial
Sector
India - Aadhaar Notarize.com Passports –
TSA ”Pre”
Identity
Theft
HIPAA – US
Healthcare
Citizenship Services -
Estonia
DocuSign Immigration &
Visas
Fraud
Right to be
Forgotten - EU
Access to Medical
Care
Blockchain
Solutions – e.g.
Blocknotary
Refugees and
plight of the
undocumented
Illicit
Purchase
7. Current Electronic Identifier Examples
(all have limits, often combined in 2FA & MFA)
1. Username/Password
2.Biometrics
3. “Hard” tokens
4. PKI – Client Certificates
5.PGPWeb of Trust / Keybase
6.EmailAddress
10. ”Traditional” Blockchain Identity
(Excerpt from Sabadello on github)
• Wallet Address is an abstract term for the entirety of addresses owner by a
single user (stackexchange)
• Namecoin is a blockchain that has been conceived from the start to be used
for registering domain names. It is the first fork of the Bitcoin software
• Contract Address (ethereum), the original Eris project was an early attempt
a DAO contract registry written in LLL (DOUG).
• Simple Registries (e.g. namereg on ethereum), e.g. wallet address -> 20 byte
name or email lookup
12. Self-Sovereign Identity (Allan)
1. Existence: Users must have an independent existence.
2. Control: Users must control their identities.
3. Access: Users must have access to their own data.
4. Transparency: Systems and algorithms must be transparent.
5. Persistence: Identities must be long-lived.
6. Portability: The user remains in control of his identity no matter what.
7. Interoperability: IDs are of little value if they work only in little niches.
8. Consent: Users must agree to the use of their identity.
9. Minimization: Disclosure of claims must be minimized.
10.Protection: Freedoms and rights of the individuals over the needs of the
network.
13. uPort - Overview
(uPort.me)
• Uses mobile devices, the ethereum blockchain and off-chain BLOB store
(e.g. IPFS, AWS, Dropbox)
• Built on self-sovereign identity principles
• Key recovery/revocation possible using a quorum of delegates
• Allows for creation of attestations, credentials and reputation on an
immutable identity
15. uPort – Current Status
(from uPort.me)
• Incubated by ConsenSys
• Currently in Alpha
• iOS & Android* client currently available (keys stored in secure
enclaves)
• Partnered with Gnosis, others to follow
• Future Enhancements (whitepaper):
1. Multiple identities
2. Swappable enhanced controller with spending limits and other features
3. Recovery delegate list to be hidden from public view
4. End-to-End encryption for messaging server (Chasqui)
5. Better user subsidy logic for onboarding users (Sensui)
• * Just updated slide
16. What Makes a Good Name Service?
(Johnson)
1. Separation of concerns
• Don’t conflate registration & resolution a la GoDaddy etc.
2. Distributed authority & implementation
• Keep in decentralized to avoid single points of failure
3. Forward-compatibility
• There will be unforeseen applications of a naming service
as there were with DNS
4. Efficient on-chain resolution (must be fast!)
17. Ethereum Naming Service –Version 0.1
(ENS Documentation, EIP 137, 162)
• Performs a similar functional as DNS but implementation
details differ significantly
• Resolve human readable names for ethereum addresses,
Swarm & IPFS content hashes as well as metadata (e.g.
whois, contract ABIs)
• Composed of:
1. Registry
2. Resolvers
3. Registrars
18. Components of ENS
(Johnson)
Registrar/Owners of a Domain Registry Resolver
• Set the resolver andTTL for
domain
• Records owner of the domain • Translates names into addresses
• Transfer ownership of domain to
another address
• Records resolver of the domain • Supports an optional number of
different record types
• Change ownership of subdomains • RecordsTTL for all records under
domain
19. Registering a Name
(ENS Documentation, EIP 162)
1. .eth Registrar is FIFS (first in first served)
2. Interim “McDonalds” solution until permanent
registry is finalized
3. Restricted to .ethTLD with subdomains being a
minimum of 7 characters in length
4. Uses aVickrey auction: Sealed bid, 2nd price
5. Initial deeds last for 1 year
20. ENS – Current Status
1. Supported by
• Metamask supports sending funds to ENS names.
• Mist is working on ENS support
• LEth is working on ENS support
• Status is working on ENS support
2. No firm date for permanent registry (?)
3. Not directly affiliated with ConsenSys
21. Questions/Comments?
• Feel free to get in touch with me:
andrew.atkin@gmail.com
• SpecialThanks to:
Grant Fondo (speaker and host @ Goodwin Law)
Bernard Golden (speaker & topic idea)
Christian Peel (SV Meetup organzizer)
Daniel Buchner (speaker)
SteveWaldman (moderator)
22. References
1. Antonopoulos, A. (2014). Mastering Bitcoin Unlocking Digital Cryptocurrencies. Chapter 4. San Francisco, CA:
O’Reilly Media.
2. Allan, C. (2015, April 25). The Path to Self-Sovereign Identity [Web log post]. Retrieved May 7, 2017, from
http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.
3. D’Ambrosi, C. (2017, January). The Identity Industry Landscape: 225+ Companies . Retrieved May 7, 2017 from from
https://oneworldidentity.com/identity-industry-landscape/.
4. Digital Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Digital_identity.
5. Johnson, Nick. (Presented at DEVCON2, September 19-21, 2016). ENS: Ethereum Naming Service. Retrieved May
7, 2017, from https://arachnid.github.io/devcon2/#/title
6. Lundkvist, Heck,Torstensson et al. (DraftVersion February 21, 2017). uPort: A Platform for Self-Sovereign Identity.
Retrieved May 7, 2017, from https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf.
7. Personal Identity. (2017, May). Retrieved May 7, 2017 from https://en.wikipedia.org/wiki/Personal_identity
8. Sabadello, M. (2017, April). Blockchain and Identity. Retrieved May 7, 2017, from
https://github.com/peacekeeper/blockchain-identity.
9. The Identity Startup Landscape: 187 Companies. (2017, February). Retrieved from
https://oneworldidentity.com/identity-startup-landscape.
10. Welcome to ENS’s documentation!. (2017, May). Retrieved May 7, 2017 from http://docs.ens.domains/en/latest/
11. uPort. (2017, May). Retrieved May 7, 2017 from https://www.uport.me/.
Editor's Notes
Identity is core concept on which so many others are anchored. Buchner: “Anchor identity on the blockchain”.
Fragmented & siloed. Many of these are great technical solutions but UX and portability hinders wide adoption. Low adoption in turn lowers the value of a given solution due to network effects.
Existence: Users must have an independent existence. Any self-sovereign identity is ultimately based on the ineffable "I" that’s at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported
Control: Users must control their identities. Subject to well-understood and secure algorithms that ensure the continued validity of an identity and its claims, the user is the ultimate authority on their identity.
Access: Users must have access to their own data. A user must always be able to easily retrieve all the claims and other data within his identity. There must be no hidden data and no gatekeepers.
Transparency: Systems and algorithms must be transparent. The systems used to administer and operate a network of identities must be open, both in how they function and in how they are managed and updated.
Persistence: Identities must be long-lived. Preferably, identities should last forever, or at least for as long as the user wishes.
Portability: Transportable identities ensure that the user remains in control of his identity no matter what, and can also improve an identity’s persistence over time.
Interoperability: Identities should be as widely usable as possible. Identities are of little value if they only work in limited niches. The goal of a 21st-century digital identity system is to make identity information widely available, crossing international boundaries to create global identities, without losing user control. Thanks to persistence and autonomy these widely available identities can then become continually available.Consent: Users must agree to the use of their identity.
Minimization: Disclosure of claims must be minimized. When data is disclosed, that disclosure should involve the minimum amount of data necessary to accomplish the task at hand.
Protection: When there is a conflict between the needs of the identity network and the rights of individual users, then the network should err on the side of preserving the freedoms and rights of the individuals over the needs of the network.
Controller controls access to the proxy contract and contains recovery contract – you can lose your phone and still recover your immutable ID (great!)
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Controller controls access to the proxy contract and contains recovery contract
Proxy holds the immutable ID and is used to pass ID to the App/Dapp contract(s)
Use the right arrow to click through/animate Nick Johnson’s slides (not obvious).