Block chain 101 what it is, why it mattersPaul Brody
The Blockchain is an important new technology, but it is shrouded in mystery: what does it do? Why is it such a big deal? How is it related to bitcoin? In this short presentation (with attached video), I attempt to answer those questions.
The new digital era is knocking our doors, and these are arguably the most exciting times post invention of internet itself. Open your doors to the new advanced digital world, which promises to simplify and automate a lot of things around. In the list of remarkable technologies that promise to change the world, is Blockchain.
Conceived in 2008, this concept is generating a lot of buzz. This presentation discusses about this technology, working mechanism in case of Bitcoin, and its use cases beyond crypto-curreinces.
1. What is Block Chain
2. How Does it Work
3. What are the key attributes of Blockchain
4. What are applications areas for Block Chain
5. What are the advantages and Disadvantages of Block Chain
Block chain 101 what it is, why it mattersPaul Brody
The Blockchain is an important new technology, but it is shrouded in mystery: what does it do? Why is it such a big deal? How is it related to bitcoin? In this short presentation (with attached video), I attempt to answer those questions.
The new digital era is knocking our doors, and these are arguably the most exciting times post invention of internet itself. Open your doors to the new advanced digital world, which promises to simplify and automate a lot of things around. In the list of remarkable technologies that promise to change the world, is Blockchain.
Conceived in 2008, this concept is generating a lot of buzz. This presentation discusses about this technology, working mechanism in case of Bitcoin, and its use cases beyond crypto-curreinces.
1. What is Block Chain
2. How Does it Work
3. What are the key attributes of Blockchain
4. What are applications areas for Block Chain
5. What are the advantages and Disadvantages of Block Chain
An introductory look at various Blockchain Technologies and examples. In this slide I explain about basics of Etherium and types of Blockchain technology currently present and some known public projects/examples which use Blockchain.
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
A comparison of blockchain technologies for distributed votingRoderik van der Veer
This slidedeck was used at the third Blockchain Vlaanderen meetup in Antwerp. It explores the currently available Blockchains and their capabilities within the context of voting in Belgium.
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Blockchain introduction to common man. This is a very simple explanation given on blockchain technlogy. Main advantages of blockchain being in IOT, datastorage etc. Some of the applications of iot are also discussed. It is a very brief explanation and gives a wide view of the field.
An introductory look at various Blockchain Technologies and examples. In this slide I explain about basics of Etherium and types of Blockchain technology currently present and some known public projects/examples which use Blockchain.
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
A comparison of blockchain technologies for distributed votingRoderik van der Veer
This slidedeck was used at the third Blockchain Vlaanderen meetup in Antwerp. It explores the currently available Blockchains and their capabilities within the context of voting in Belgium.
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Blockchain introduction to common man. This is a very simple explanation given on blockchain technlogy. Main advantages of blockchain being in IOT, datastorage etc. Some of the applications of iot are also discussed. It is a very brief explanation and gives a wide view of the field.
Perfectevoucher.com the best Ukash , Perfect Money e-Voucher provider with accept PayPal , Credit Cards and Bit coin payment methods with low rates . Selling Perfect Money e-Voucher and Ukash Cards.
https://www.perfectevoucher.com/
University Talks #1 | Екатерина Мамонтова - Счастье не поддается инфляцииAmir Abdullaev
University Talks?
Это площадка для студентов, а также для неординарных личностей, на которой они могут поделиться своими идеями, мыслями с такими же студентами.
— Наша основная цель, чтобы каждый студент реализовал свой потенциал.
— Миссия University Talks
Сформировать сообщество целеустремленных студентов, которые меняют будущее.
— Задача University Talks
Найти студентов, которые любят то, что делают.
— Цель University Talks
Создать базовую площадку для развития конференции TED в России, а также популяризировать это движение.
Facebook recently launched the Open Graph API, a bundle of plugins that defines social relationships between objects (movies, music and activities) and the Facebook user profile. Finally, the semantic web becomes mainstream. How open is the Open Graph API? What are the alternatives? What are the implications for privacy and what new, innovative services enabled by semantic metadata web linking will become possible.
University Talks #2 | Анастасия Чекрыжова — Свежий взгляд на современное иску...Amir Abdullaev
На University Talks #2 выступила Настя Чекрыжова, невероятно образованная студентка МГУ. В своем выступлении Настя делится с посетителями конференции своими идеями и мыслями о современном искусстве.
How to bake reactive behavior into your Java EE applicationsOndrej Mihályi
Reactive applications are flexible and robust. Reactive programming is already an established concept and there are many modern frameworks and tools which support it. You need to understand the concept in order to build truly reactive applications. But you do not need to switch from what you already know to build them. With standard Java EE you have wide range of options to add reactive behavior to new and even existing applications.
Java EE is a modern and evolving framework, which supports reactive concepts. The latest versions of JDK and Java EE add even more asynchronous API to write fully reactive applications. On top of asynchronous processing in servlets, REST services and EJBs, there is asynchronous IO, managed multithreading and CompletableFuture with its promise-like API to tackle callback hell. Several Java EE implementations, like Payara Micro, go even further and provide extensions to scale your applications in natural way.
University Talks #2 | Елена Шилова — Свет и безопасностьAmir Abdullaev
Тема выступления Лены «Свет и безопасность. Как уличное освещение влияет на уровень преступности и ДТП». Выходя во двор после захода солнца, мы чувствуем себя небезопасно, боимся быть ограбленными или подвергнуться насилию. Лена поведает, как самыми привычными архитектурными приемами можно значительно повлиять на безопасность городской среды.
This demand for implementing the most common Transactions,Pay to PubKey Hash,Pay to PubKey,Pay to Script Hash,Multi-Signature and Null Data stemed from the need to have a closer look of how Bitcoin Transactions work in the context of my thesis as an undergraduate student of Department of Applied Informatics at the University of Macedonia,Greece.
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
Przemek Nowakowski: Blockchain to niewątpliwie jedna z najciekawszych i najbardziej kontrowersyjnych technologii ostatnich lat. Ale jak to ugryźć? I czy w ogóle jest sens ulegać hajpowi? W prezentacji omówimy blockchain – od podstaw po najprostszą implementację, zastanowimy się nad jego użytecznością oraz sprawdzimy, jakie narzędzia mamy do dyspozycji, jeśli zdecydujemy się go wykorzystać.
I spent quite some time to digest how Blockchain works and how it can influence our everyday life in the upcoming decades. My slides focus on that from a non-IT expert point view.
I spent quite some time to digest how Blockchain works and how it can influence our everyday life in the upcoming decades. My slides focus on that from a non-IT expert point of view.
We are happy to invite you all to participate in the lecture, which our blockchain specialists are going to present on at SoftUni.
On that lecture we’ll explain fundamentals of blockchain technology, real live examples and upcoming challenges for the future applications of that new and beneficial technology.
Our team will present also the Open Source University project, how it will reshape the future of education, enhancing the connection between businesses and learning content providers. (www.os.university)
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
The Harvard Business Review (HBR) thinks that Blockchain Technology has to power to keep data safe for consumers and businesses alike; because Blockchain provides a secure and immutable ledger, HBR says it represents the key to taking back privacy of data.
“You can keep certified copies of identity documents, biometric test results, health data, or academic and training certificates online, available at all times, yet safe unless you give away your key. At a whole system level, the database is very secure.”
FirstPartner's 2016 Blockchain Ecosystem Market Map gives a clear visual overview of the emerging blockchain landscape, highlighting key companies, projects, technologies and trends.
The Map summarises three main areas of focus emerging around the core blockchain or distributed ledger protocols:
Bitcoin and Cryptocurrencies: Providing an alternative to centrally managed "fiat" currencies, this sector includes Bitcoin exchanges, Bitcoin wallets, miners and cryptocurrency payment processors. The map illustrates how these companies interact and features some leading players including Coinbase, Circle, Kraken and 21 Inc.
The Financial Services Blockchain: This has been the main area of focus over the last 12 months as attention shifts from Bitcoin to Financial Services applications. An increasing number of players are focussing on commercialising blockchain technologies for banks, securities, derivatives and asset markets and institutional investors - and are attracting VC funding to do so. Ripple and Ethereum are leading candidate protocols for payment processing and smart contracts and players including Ripple, Chain and Digital Asset Holdings are gaining traction with Financial Institutions. The Map highlights leading technology companies and some of the banks, card schemes and processors who are investing in or evaluating distributed ledger technologies.
Other Use Cases: The distributed ledger concept and its ability to support transparent and tamperproof asset registration, proof of ownership and asset transfer transactions makes it potentially applicable to multiple non-financial use cases. The Map highlights a number of candidate use cases including publishing, legal, distributed data storage, document management and IoT. Some of the pioneering initiatives and companies exploring these applications are included.
Crucially the Map also provides a clear pictorial explanation and summary of the leading protocols at the heart of the ecosystem and concepts including coloured coins and smart contracts that supplement them to make a number of the proposed services possible.
You can download a copy of the map at www.firstpartner.net.
FirstPartner's 2016 Blockchain Ecosystem Market Map helps to decrypt the blockchain landscape with a visual overview of the emerging ecosystem, players, technologies and trends. It clearly summarises three main areas of focus emerging around the core blockchain or distributed ledger protocols:
1) Bitcoin and Cryptocurrencies: Providing an alternative to centrally managed "fiat" currencies, this sector includes Bitcoin exchanges, Bitcoin wallets, miners and cryptocurrency payment processors. The map illustrates how these companies interact and features some leading players including Coinbase, Circle, Kraken and 21 Inc.
2) The Financial Services Blockchain: This has been the main area of focus over the last 12 months as attention shifts from Bitcoin to Financial Services applications. An increasing number of players are focussing on commercialising blockchain technologies for banks, securities, derivatives and asset markets and institutional investors - and are attracting VC funding to do so. Ripple and Ethereum are leading candidate protocols for payment processing and smart contracts and players including Ripple, Chain and Digital Asset Holdings are gaining traction with Financial Institutions. The Map highlights leading technology companies and some of the banks, card schemes and processors who are investing in or evaluating distributed ledger technologies.
3) Other Use Cases: The distributed ledger concept and its ability to support transparent and tamper-proof asset registration, proof of ownership and asset transfer transactions makes it potentially applicable to multiple non financial use cases. The Map highlights a number of candidate use cases including publishing, legal, distributed data storage, document management and IoT. Some of the pioneering initiatives and companies exploring these applications are included.
Crucially the Map also provides a clear pictorial explanation and summary of the leading protocols at the heart of the ecosystem and concepts including coloured coins and smart contracts that supplement them to make a number of the proposed services possible.
A printable version of the map can be downloaded from www.firstpartner.net.
In this session we will have a closer look at distributed ledger technology and its applications in the modern world.
We will discuss the essential components of a set of technologies that are typically referred to as "Blockchain"
and try to distill these components to their essential parts.
Secondly we will explore two main use-cases, cryptocurrencies like BitCoin, ZCash and GridCoin and smart contract platforms like Ethereum.
Our approach will be critical and technical, the goal of this workshop is to explore and discuss "the blockchain" in a practical and accurate way
WSO2Con USA 2017: Keynote - The Blockchain’s Digital DisruptionWSO2
Almost a decade ago, little-known open-source cryptocurrency called Bitcoin made its debut with little fanfare. Its underlying technological innovation has now caught the world’s attention; developers, startups, corporations, academic institutions, and governments are all examining what blockchain technology can solve. Currency, assets, identity, trade settlement, cross-border payments, privacy and regulation are areas being explored. This session will explore the past, present, and future of blockchain technology and how it may influence your business.
GTECH ATFG Framework is designed to guide Students to become Industry Ready. The mission is to Decentralise, Demonetise, and Democratise Learning. The framework is developed and maintained by GTech, the premier association of Tech companies in Kerala.
흁Learn is our program element promoting microlearning groups. Identified topic areas are lead by Mentors who are prominent teachers and personalities in the field.
FAYA:80(read FAYA port 80) is a monthly technology session hosted by FAYA Corporation, where technology enthusiasts converge to discuss and analyse the emerging trends in technology. The sessions aim to provide a platform for both amateurs and experts, to keep at par with the emerging tools and technologies in the IT industry. The objective of this endeavour is to create further tech communities which will enable peer group learning.
It aims to inculcate a culture of community of practise for the entrepreneurs, developers and technology professionals whereby they ignite the art of knowledge gaining and knowledge sharing.
Born out of a desire that technology professionals in Technopark, Kerala, should not lag behind when it comes to the futuristic technologies, FAYA:80 was kick-started in June, 2013 and is organized on the first Wednesday of every month at the Floor of Madness, FAYA in Technopark, Trivandrum.
FAYA:80 celebrated its 50th edition in July, 2017 with DISRUPT KERALA 2017, a day-long tech event, with a lineup of global speakers and visionaries. DISRUPT KERALA 2017 also saw the launch of two separate ongoing chapters of FAYA:80 in Kochi and Kozhikode, which are conducted on the second and third Wednesdays of the month respectively.
This slide was used by Mr.Viju Chacko at FAYA:80 that gave a basic introduction to Ai. It act as an introduction to different terminologies related to AI that could enable its audience to understand the technology better.
This slide provides a birds eye view on DevOps. The slide was used to discuss devOps in comparison with Waterfall and Agile methodologies. It explains the reason for adopting DevOps and the Challenges and potential risks. It also goes through some Tools and Frameworks for Continuos Integration and Automation. Trunk Based Development, Testing Levels and Test Infrastructure and some other points discussed here.
REACT.JS : Rethinking UI Development Using JavaScriptDeepu S Nath
Isn't React that clear? Don't you fully understand how/why you should use it on your apps and why it gained all this attention? Do you want to learn the basics and to understand why it's so powerful?
This coffee@DBG will explore how this library works and you will discover and understand its main concepts in details. At the end of this session you'll learn main concepts like Components, Virtual DOM, One-way data binding etc.
Components
JSX
Data for component
The component lifecycle
Component Methods
Component Breakdown
Life Cycle of an App - From Idea to Monetization Deepu S Nath
This is the slide created for MobConf Kochi, to explain Life Cycle of an App - From Idea to Monetization in a Start Up Perspective. This includes tools that could help them to handle things better during various phases including ideation, wireframing, designing, development, testing, Appstore optimisation, Marketing, Analytics, Seed Funding, Venture Funding, Crowd Funding etc..
Uncommon Python - What is special in PythonDeepu S Nath
1. What's special is in python compared to usual programming languages
2. Python Overview
3. Language Paradigms
4. Future of Python
5. How to start with Python
Apple Watch - Start Your Developer EngineDeepu S Nath
Explore Apple Watch development including the new capabilities introduced by Watch OS2. WatchKit for watchOS 2 introduced many new capabilities for creating responsive Watch experiences, Beyond a faster architecture. At the end of this session you’ll learn about all new updates on digital crown, accelerometer and heart rate data, as well as providing physical feedback via the Taptic Engine.
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...Deepu S Nath
This is the slide used by Kamal of Travancore Analytics for his session on "What’s new for Android Developers in 2015"
Material Design
Android Studio
Gradle
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Functions of Money
- Medium of Xchng (purchase Goods/Services)
- Unit of Accounts (Goods and Services are
quoted in terms of money value)
- Store of Value (Can be used to transfer
purchasing power to a future date)
3. A Lookback at Modern FIAT Currencies
- Money printed based on Govt. Decree (FIAT)
- All Currencies are Inflationary (Value depletion)
- Most often Value is arbitrary
- decided by currency supply/demand
- market sentiment
- Hedging ( China and India in $ )
4. What is Bit-Coin?
- A Crypto Currency
- A Technology ( an Open distributed Ledger)
- A Political Tool
5. What is Block Chain?
- The Technology behind Bit-Coin
- A Tamper proof Decentralized Open Ledger
- A Protocol which ensures Transaction
- Confidentiality,Integrity,Availability
- Has a Network Consensus Algorithm in it
- Every node stores all transactions since the
Genesis Block
- A Triple Entry Accounting System
10. Block Chain 3.0 (Beyond Smart Contracts)
- An Effective way to organize Activities
- Censorship-Resistant Organizational Models
- Example of a Distributed DNS ( NameCoin)
- Alexandria (Combining Tweet/BC)
- Ostel (Encrypted VOIP/survilence proof)
- Digital Identity ( OneName, BitID)
- Virtual notary (http://virtual-notary.org/)
- Digital Rights Management (DRM)
- Decentralized Govt. Services
11. Currency,Private equities,Public equities,
Bonds,Derivatives (futures, forwards, swaps,
options, and more complex variations),Voting rights associated with any of the
preceding,Commodities,Spending records,Trading records,Mortgage/loan
records,Servicing records,Crowdfunding,Microfinance
Microcharity
Legra Capital – Finance Record Keeping using Block
Chain
12. Land titles,Vehicle registries,Business license,Business incorporation/dissolution
records,Business ownership records,Regulatory records,Criminal
records,Passports,Birth certificates,Death certificates,Voter IDs,Voting,Health/safety
inspections,Building permits,Gun permits,Forensic evidence,Court records,Voting
records,Nonprofit records,Government/nonprofit accounting/transparency
Legra Capital – Public Records
17. BitCoin/BlockChain Internals
“There are no bitcoins, only records of bitcoin
transactions in a Block Chain (Transaction based
accounting). Another funny fact is that, there is no
Encryption. A distributed Ledger which can get open as
it can ” – something worth remembering!
23. Hashing (SHA256) demo using OpenSSL
• Create a Text file (temp.txt) using “Hello World..” as the content
• Generate the SHA256 of the temp.txt using OpenSSL
• openssl –dgst sha256 temp.txt
• Output
SHA256(temp.txt)=
bbf242f2054d9c01a623b6d340378f83c2e1e3baa055c04ef31f045f24a11b7c
• Generate SHA256 by changing contents of the temp.txt into
“Hello World…”
• openssl –dgst sha256 temp.txt
• Output
SHA256(temp.txt)=
77e612c2fd40015a1945fc2b20d6ac6febcf57d6cbd8ec8026df317e03a346
26. • Some facts about Elliptic Curve Cryptography for BitCoin
• Private keys => 32 bytes long.
• Public keys =>64 bytes (uncompressed form) or 32 bytes (compressed form) long plus a 1-byte prefix.
• The elliptic curve C is the secp256k1 curve.
• EC crypto is based on modular arithmetic
• Generate a ECC Private Key (Output in Base64 format)
openssl ecparam -name secp256k1 -genkey -out ec-priv.pem
• Output in Human Readable format
openssl ec -in ec-priv.pem -text –noout
• Output the public key to a file ( ec-pub.pem)
openssl ec -in ec-priv.pem -pubout -out ec-pub.pem
• Output the file in human readable format
openssl ec -in ec-pub.pem -pubin -text –noout
• Output in the Compressed format
openssl ec -in ec-pub.pem -pubin -text -noout -conv_form compressed
27. EC DSA using OpenSSL
• Take a file and digitally sign its SHA256 digest using EC
• openssl dgst -sha256 -sign ec-priv.pem ex-message.txt >ex-signature.der
• Hex Encoded Signature
• openssl dgst -sha256 -hex -sign ec-priv.pem ex-message.txt
• Verify the Signature
• openssl dgst -sha256 -verify ec-pub.pem -signature ex-signature.der ex-
message.txt
38. Hashing and Proof of work
• The Hash value generated is a random one
• hash256(BlockHeader + Nonce) < target (This is infamous Puzzle)
• Target is based on the current difficulty level
• Target is reduced to make it hard to find out the right Nonce (More
computing power)
• Arrived based on the computation happened in the last 2016
• next_difficulty = (previous_difficulty * 2016 * 10 minutes) / (time to
mine last 2016 blocks)