SlideShare a Scribd company logo
IOTA
Ledger of Things
Hack The Valley
Introduction
Sharing Economy 2.0
Anything with a chip in it can be leased Devices trade resources among each
other
Cloud, Fog and Mist
EDGECORE
● Real Time Processing
● Avoid network congestion
and signal collisions
● Incentive for
interoperability
● Data Integrity
● Cisco & IBM love the fog
Requirements
How do we
achieve this?
Blockchain
● Scalability
● Storage
● Bandwidth
● Fees (~ $0.03 per
hash*)
● No Data Privacy
● Expensive Data
The solution
Rethink from scratch
A revolutionary new
distributed ledger designed
for Machine-to-Machine
interactions.
IOTA at its Core
7
10110
00110
01011
Data Security
All data cryptographically
secured in a Tangle. This
data can be made visible to
certain parties.
Automation
IoT the entire supply-chain. All
data and interactions are fed
securely into the Blockchain
through the IOTA protocol.
< / >
Lightweight, non-Turing
complete Smart
Contracts will support
automation at IoT scale
M2M
payments
Machine to Machine
micropayments. This way
machines can pay each
other for certain services
and resources.
$
Blockchain without the
Blocks and the Chain.
What???
Tangle
Tangle
Read our Whitepaper: https://iotatoken.com/IOTA_Whitepaper.pdf
● No Fees
● Scalable
● Quantum Secure
● Data Integrity
● Lightweight
● Partition Toleran
Protocol and Network
Statistics
◉ Genesis trx on 11.07.16
◉ 1.5 years of
development and
testing
◉ Community of 2000+
◉ More than 2.6m
transactions
◉ $60m+ of value transferred
◉ 100+ trx/s now
1000 trx/s in Feb 2017
Special
◉ Live Network Access
◉ Powerful functionality
◉ Micropayments with IOTA token
◉ Data Messaging/ Integrity on
Tangle
◉ IoT Hardware
iota.api.getNewAddress(seed [, options], callback)
sendTransfer(seed, depth, ... )
getTransfers(seed [, options], callback)
getAccountData(seed [, options], callback)
◉ Super Simple APIs

More Related Content

What's hot

Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
snehal_152
 
Demystifying Blockchains
Demystifying BlockchainsDemystifying Blockchains
Demystifying Blockchains
_hd
 
Blockchain for Automotive Industry
Blockchain for Automotive IndustryBlockchain for Automotive Industry
Blockchain for Automotive Industry
Vasiliy Suvorov
 
Block chain introduction
Block chain introductionBlock chain introduction
Block chain introduction
Nagendra Kumar Y
 
Blockchain - part 6 of 7 modern trends that every it pro should know about-
Blockchain  - part 6 of 7 modern trends that every it pro should know about-Blockchain  - part 6 of 7 modern trends that every it pro should know about-
Blockchain - part 6 of 7 modern trends that every it pro should know about-
Ibrahim Muhammadi
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Mike Cartwright
 
A complete list of top blockchain platforms 2020
A complete list of top blockchain platforms 2020A complete list of top blockchain platforms 2020
A complete list of top blockchain platforms 2020
celine anderson
 
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
Vidal Chriqui
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & crypto
Atul Mangat
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
Mat Keep
 
Blockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 BlockchainsBlockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 Blockchains
101 Blockchains Academy
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Ponthota Viswanath Reddy
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
kumar641
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Leonardo De Moura Rocha Lima
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
RajeshJade
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
Saima Mustafa
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
NexThoughts Technologies
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
Mayank Jain
 
Blockchain demystification
Blockchain demystificationBlockchain demystification
Blockchain demystification
Bellaj Badr
 

What's hot (20)

Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
 
Demystifying Blockchains
Demystifying BlockchainsDemystifying Blockchains
Demystifying Blockchains
 
Blockchain for Automotive Industry
Blockchain for Automotive IndustryBlockchain for Automotive Industry
Blockchain for Automotive Industry
 
Block chain introduction
Block chain introductionBlock chain introduction
Block chain introduction
 
Blockchain - part 6 of 7 modern trends that every it pro should know about-
Blockchain  - part 6 of 7 modern trends that every it pro should know about-Blockchain  - part 6 of 7 modern trends that every it pro should know about-
Blockchain - part 6 of 7 modern trends that every it pro should know about-
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
A complete list of top blockchain platforms 2020
A complete list of top blockchain platforms 2020A complete list of top blockchain platforms 2020
A complete list of top blockchain platforms 2020
 
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
 
Block chain
Block chainBlock chain
Block chain
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & crypto
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
 
Blockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 BlockchainsBlockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 Blockchains
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Blockchain demystification
Blockchain demystificationBlockchain demystification
Blockchain demystification
 

Viewers also liked

Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
Tim Lackey
 
CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102
Blockstrap.com
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
Blockstrap.com
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - Mining
Blockstrap.com
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101
Blockstrap.com
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
Blockstrap.com
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
Dinis Guarda
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
Blockstrap.com
 

Viewers also liked (8)

Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
 
CBGTBT - Part 4 - Mining
CBGTBT - Part 4 - MiningCBGTBT - Part 4 - Mining
CBGTBT - Part 4 - Mining
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 

Similar to IOTA Introduction for Hack the Valley attendees

Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
Stacey Roberts
 
IoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacyIoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacy
Paul Fremantle
 
Internet of things
Internet of thingsInternet of things
Internet of things
Alok Ranjan
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
Isuru Nuwanthilaka
 
eMsecure
eMsecureeMsecure
IOTA's Tangle Explained in 8 Minutes
IOTA's Tangle Explained in 8 MinutesIOTA's Tangle Explained in 8 Minutes
IOTA's Tangle Explained in 8 Minutes
Simplilearn
 
Distributed Ledgers, Blockchains, and Smart Contracts
Distributed Ledgers, Blockchains, and Smart ContractsDistributed Ledgers, Blockchains, and Smart Contracts
Distributed Ledgers, Blockchains, and Smart Contracts
Dusan Andric
 
Cto eng
Cto engCto eng
Cto eng
gary wang
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
Using Connectivity to Its Full Potential: Examining IoT Gateways' Function
Using Connectivity to Its Full Potential: Examining IoT Gateways' FunctionUsing Connectivity to Its Full Potential: Examining IoT Gateways' Function
Using Connectivity to Its Full Potential: Examining IoT Gateways' Function
fredrikeriksson398
 
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
ASADULLAHPRANTO
 
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
Дмитрий Плахов
 
Understanding IoT Data Protocol - PyCon ID 2018
Understanding IoT Data Protocol - PyCon ID 2018Understanding IoT Data Protocol - PyCon ID 2018
Understanding IoT Data Protocol - PyCon ID 2018
Tegar Imansyah
 
Internet of things - what is really happening
Internet of things - what is really happeningInternet of things - what is really happening
Internet of things - what is really happening
Thor Henning Hetland
 
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected worldSFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
South Tyrol Free Software Conference
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
SORACOM,INC
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
xinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
Inxee
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 

Similar to IOTA Introduction for Hack the Valley attendees (20)

Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
 
IoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacyIoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacy
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
eMsecure
eMsecureeMsecure
eMsecure
 
IOTA's Tangle Explained in 8 Minutes
IOTA's Tangle Explained in 8 MinutesIOTA's Tangle Explained in 8 Minutes
IOTA's Tangle Explained in 8 Minutes
 
Distributed Ledgers, Blockchains, and Smart Contracts
Distributed Ledgers, Blockchains, and Smart ContractsDistributed Ledgers, Blockchains, and Smart Contracts
Distributed Ledgers, Blockchains, and Smart Contracts
 
Cto eng
Cto engCto eng
Cto eng
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
 
Using Connectivity to Its Full Potential: Examining IoT Gateways' Function
Using Connectivity to Its Full Potential: Examining IoT Gateways' FunctionUsing Connectivity to Its Full Potential: Examining IoT Gateways' Function
Using Connectivity to Its Full Potential: Examining IoT Gateways' Function
 
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
 
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
Dmitri Reshetov. Distributed Ledger Technologies for Internet of Things #spbl...
 
Understanding IoT Data Protocol - PyCon ID 2018
Understanding IoT Data Protocol - PyCon ID 2018Understanding IoT Data Protocol - PyCon ID 2018
Understanding IoT Data Protocol - PyCon ID 2018
 
Internet of things - what is really happening
Internet of things - what is really happeningInternet of things - what is really happening
Internet of things - what is really happening
 
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected worldSFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
SFScon 2020 - Antonio Nardella - Networks of Trust in a connected world
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

IOTA Introduction for Hack the Valley attendees

  • 1. IOTA Ledger of Things Hack The Valley Introduction
  • 2. Sharing Economy 2.0 Anything with a chip in it can be leased Devices trade resources among each other
  • 3. Cloud, Fog and Mist EDGECORE ● Real Time Processing ● Avoid network congestion and signal collisions ● Incentive for interoperability ● Data Integrity ● Cisco & IBM love the fog Requirements
  • 5. Blockchain ● Scalability ● Storage ● Bandwidth ● Fees (~ $0.03 per hash*) ● No Data Privacy ● Expensive Data
  • 6. The solution Rethink from scratch A revolutionary new distributed ledger designed for Machine-to-Machine interactions.
  • 7. IOTA at its Core 7 10110 00110 01011 Data Security All data cryptographically secured in a Tangle. This data can be made visible to certain parties. Automation IoT the entire supply-chain. All data and interactions are fed securely into the Blockchain through the IOTA protocol. < / > Lightweight, non-Turing complete Smart Contracts will support automation at IoT scale M2M payments Machine to Machine micropayments. This way machines can pay each other for certain services and resources. $
  • 8. Blockchain without the Blocks and the Chain. What??? Tangle
  • 9. Tangle Read our Whitepaper: https://iotatoken.com/IOTA_Whitepaper.pdf
  • 10. ● No Fees ● Scalable ● Quantum Secure ● Data Integrity ● Lightweight ● Partition Toleran
  • 11. Protocol and Network Statistics ◉ Genesis trx on 11.07.16 ◉ 1.5 years of development and testing ◉ Community of 2000+ ◉ More than 2.6m transactions ◉ $60m+ of value transferred ◉ 100+ trx/s now 1000 trx/s in Feb 2017
  • 12. Special ◉ Live Network Access ◉ Powerful functionality ◉ Micropayments with IOTA token ◉ Data Messaging/ Integrity on Tangle ◉ IoT Hardware iota.api.getNewAddress(seed [, options], callback) sendTransfer(seed, depth, ... ) getTransfers(seed [, options], callback) getAccountData(seed [, options], callback) ◉ Super Simple APIs

Editor's Notes

  1. 100 Satoshi per 1 byte -> 0-30 minutes latency (https://bitcoinfees.21.co/) = 0.0010$ (25.01.17). SHA3-256 / SHA256 -> 32Byte = 3.2C
  2. Data security extension (masked authenticated)
  3. Practical data integrity (no transaction fees)
  4. 100+ trx p/s on a public, aiming for 1K in february (testing, need a bigger network), more tips higher performance