Pg. 04
Question Three
Assignment 3
Deadline: THURSDAY 9/4/2020 @ 23:59
[Total Mark for this Assignment is 6]
Decision support systems
IT445
College of Computing and Informatics
Question One
2 Marks
Learning Outcome(s): LO3
Use some DSS and demonstrate the database working with DSS and statistical models
ABC chocolate manufacturing company needs to decide on how many chocolate bars should they produce each month to maximize the company profit. ABC consider two types of chocolate bar ‘dark' and 'salted caramel’. Dark chocolate bar required $20 of raw ingredients and take 2 day to make and salted caramel chocolate bar required $30 of raw ingredients and take 4 working days to make. The profit contribution of each dark chocolate bar is $2 and salted caramel chocolate bar is $5. The Manufacture has capacity of 100,000 working days per month and ingredients budget of $10,000 per month. Using linear programming modelling for ABC company problem, answer the following questions.
a) Identify decision, constraint and result variables, and objective function.
b) Represent the model in excel sheet, run the model and show the result. Provide a screenshot of your solution. [Hint: using excel solver].
Question Two
2 Marks
Learning Outcome(s): LO2
Analyze various industrial applications of DSS and their limitations.
Give the name and a brief discussion of any four major types of models used in DSS?
Question Three
2 Marks
Learning Outcome(s): LO1
Describe the structure of Decision Support Systems (DSS) and their services
Write the differences between Forward Chaining and Backward Chaining also list some suitable application areas for both.
38 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprisi ...
38 C O M M U N I C AT I O N S O F T H E A C M M A.docxdomenicacullison
38 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Un.
In this case study, we are providing information about the Introduction of Blockchain Technology, Bitcoin and its environment setup, Ethereum coin, other cryptocurrencies, Bitcoin in education, and a case study of healthcare using blockchain.
Exploring blockchain technology and its potential applications for educationeraser Juan José Calderón
Exploring blockchain technology and its potential applications for education
Guang Chen1,2, Bing Xu1
, Manli Lu1 and Nian-Shing Chen3*
Abstract
Blockchain is the core technology used to create the cryptocurrencies, like bitcoin. As part of the fourth industrial revolution since the invention of steam engine, electricity, and information technology, blockchain technology has been
applied in many areas such as finance, judiciary, and commerce. The current paper focused on its potential educational applications and explored how blockchain technology can be used to solve some education problems. This article first introduced the features and advantages of blockchain technology following by exploring some of the current blockchain applications for education. Some innovative applications of using blockchain technology were proposed, and the benefits and challenges of using blockchain technology for education were also discussed.
Keywords: Blockchain, Educational evaluation, Instructional design, Learning is earning
38 C O M M U N I C AT I O N S O F T H E A C M M A.docxdomenicacullison
38 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Un.
In this case study, we are providing information about the Introduction of Blockchain Technology, Bitcoin and its environment setup, Ethereum coin, other cryptocurrencies, Bitcoin in education, and a case study of healthcare using blockchain.
Exploring blockchain technology and its potential applications for educationeraser Juan José Calderón
Exploring blockchain technology and its potential applications for education
Guang Chen1,2, Bing Xu1
, Manli Lu1 and Nian-Shing Chen3*
Abstract
Blockchain is the core technology used to create the cryptocurrencies, like bitcoin. As part of the fourth industrial revolution since the invention of steam engine, electricity, and information technology, blockchain technology has been
applied in many areas such as finance, judiciary, and commerce. The current paper focused on its potential educational applications and explored how blockchain technology can be used to solve some education problems. This article first introduced the features and advantages of blockchain technology following by exploring some of the current blockchain applications for education. Some innovative applications of using blockchain technology were proposed, and the benefits and challenges of using blockchain technology for education were also discussed.
Keywords: Blockchain, Educational evaluation, Instructional design, Learning is earning
How Blockchain Technology Is Evolving In The CloudShikhaKonda
https://go-dgtl.com/whitepaper/how-blockchain-technology-is-evolving-in-the-cloud/?utm_source=offpage&utm_medium=thirdparty&utm_campaign=alo-seo - Cloud and blockchain are increasingly becoming the most valuable combinations to enhance the security of enterprise data living on the cloud. Learn more
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfPeeterParkar
Blockchain is famous for its use as the technology behind cryptocurrencies. However, it has many other applications. One such application is in cloud computing, providing additional security and several other benefits. Cloud and blockchain are increasingly becoming the most valuable combinations to enhance the security of enterprise data living on the cloud
Blockchain and its Use in the Public Sector - OECDOECD Governance
Presentation on the OECD Working Paper "Blockchains Unchained: Blockchain Technology and its use in the Public Sector". This guide aims to equip public servants with the necessary knowledge to understand what the Blockchain architecture is, the implications it could have on government services, and the opportunities and challenges governments may face as a result. For more information see oe.cd/blockchain
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdfJOELCONTACTS
Blockchain Technology is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, documents, contracts, patents, copyrights, branding).
How does the Blockchain Work?
A blockchain is a distributed, peer-to-peer database that hosts a continuously growing number of transactions. Each transaction, referred to as a “block,” is secured through cryptography, timestamped, and validated by every authorized member of the database using consensus algorithms (i.e., a set of rules). A transaction that is not validated by all members of the database is not added to the database. Every transaction is attached to the previous transaction in sequential order, creating a chain of transactions (or blocks). A transaction cannot be deleted or edited, thereby creating an immutable audit trial. A transaction can only be changed by adding another transaction to the chain.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain Technology Explained
You must have heard about the term “blockchain,” in reference to Bitcoin and othercryptocurrencies.
https://www.leewayhertz.com/blockchain-technology-explained/
blockchain, Bitcoin, cryptocurrencies, blockchain technology, blockchain developers
#blockchain #Bitcoin #cryptocurrencies #blockchaintechnology #blockchaindevelopers
One of the most hyped IT buzzwords to have emerged in the last couple of years. Blockchain has found its way into major media headlines on a near-daily basis, but a year and a half ago, it was a word used by a relatively small number of people to describe the peer-to-peer distributed ledger technology.
Do a research and make a PowerPoint about Insulation for architectDustiBuckner14
Do a research and make a PowerPoint about Insulation for architecture
· What is Insulation?
· units of measurement and formulas
· Types of insulation and location of use
· Dew point
· Show examples for each type with pros and cons
· Sketch wall and detail sections and show each layer
· Provide some Research with links
Creative Commons Non Commercial CC-BY-NC: This article is distributed under the terms of the Creative Commons Attribution-
NonCommercial 3.0 License (http://www.creativecommons.org/licenses/by-nc/3.0/) which permits non-commercial use,
reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and
Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).
VikalPa • VolUMe 44 • iSSUe 1 • JanUaRY-MaRch 2019 1
Blockchain in Finance
Jayanth Rama Varma
P E R S P E C T I V E S
KEY WORDS
Blockchain
Distributed Ledger
DLT
Crypto Currency
includes research articles
that focus on the analysis and
resolution of managerial and
academic issues based on
analytical and empirical or
case research
B
lockchain—the decentralized replicated ledger technology that underlies
Bitcoin and other cryptocurrencies—provides a potentially attractive alterna-
tive way to organize modern finance. Currently, the financial system depends
on a number of centralized trusted intermediaries: central counter parties (CCPs)
guarantee trades in exchanges; central securities depositories (CSDs) provide secu-
rities settlement; the Society for Worldwide Interbank Financial Telecommunication
(SWIFT) intermediates global transfer of money; CLS Bank handles the settlement
of foreign exchange transactions, a handful of banks dominate correspondent
banking, and an even smaller number provide custodial services to large invest-
ment institutions. Until a decade ago, it was commonly assumed that the finan-
cial strength and sound management of these central hubs ensured that they were
extremely unlikely to fail. More importantly, it was assumed that they were too big to
fail (TBTF), so that the government would step in and bail them out if they did fail.
The Global Financial Crisis of 2007–2008 shattered these assumptions as many large
banks in the most advanced economies of the world either failed or were very reluc-
tantly bailed out. The Eurozone Crisis of 2010–2012 stoked the fear that even rich
country sovereigns could potentially default on their obligations. Finally, repeated
instances of hacking of the computers of large financial institutions is another factor
that has destroyed trust. When trust in the central hubs of finance is being increas-
ingly questioned, decentralized systems like the blockchain that reduce the need for
such trust become attractive.
It is no coincidence that Bitcoin was launched shortly after the failure of Lehman
that marked the peak of the global financial crisis. Over the subsequent decade,
cryptocurrenc ...
DiscussionThe vast majority of the population associates Blockch.docxmadlynplamondon
Discussion
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
· Ask an interesting, thoughtful question pertaining to the topic
· Answer a question (in detail) posted by another student or the instructor
· Provide extensive additional information on the topic
· Explain, define, or analyze the topic in detail
· Share an applicable personal experience
· Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
· Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.
300 words and 2 references.
Attached all the required documents.
computerweekly.com 10-16 September 2019 21
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT profession-als in the next five years. Analyst Gartner has forecast that by 2023, blockchain will support the global movement and
tracking of $2tn of goods and services.
It is regarded by many industry watchers as a disrupting force
in the financial world. A PwC global financial technology (fintech)
survey found that 56% of respondents recognise the importance
of blockchain. At the same time, however, 57% admit to being
unsure about or unlikely to respond to this trend.
Start witH tHe HaSH
Blockchain is effectively a shared ledger between a group of
people – for example, a group of companies that work together
to produce a service or product. What makes blockchain differ-
ent is the fact that the history of the changes – past transactions,
for example – are immutable.
Essentially, the historical entries become read-only and
unchangeable. This is due to the fact that each blockchain
entry relies on the hash – a computed value including part of a
previous block as part of its hashing calculation for the current
block. This means that if a previous block is somehow modi-
fied or corrupted, its hash value will change and therefore the
values after that point become broken, making the tampering
evident for all to see.
One example where blockchain technology can be used is
where several companies come together to provide or consume
Blockchain:
hype vs reality
Regarded by many as a
disruptive force in finance
and beyond, blockchain
technology presents a number
of complex challenges that
must be overcome before
it can truly ...
Blockchain for science and knowledge creation. A technical fix to the reprodu...eraser Juan José Calderón
Blockchain for science and knowledge creation. A technical fix to the reproducibility crisis ?
PD Dr. med. Sönke Bartling (@soenkeba,soenkebartling@mailbox.org)
Associate researcher at the Humboldt Institute for Internet and Society Benedikt Fecher (benedikt.fecher@hiig.de)
German Institute for Economic Research and Alexander von Humboldt Institute for internet and society.
Abstract:
Blockchain technology has the capacity to make digital goods immutable, transparent,
externally provable, decentralized, and distributed. Besides the initial experiment or data
acquisition, all remaining parts of the research cycle could take place within a blockchain
system. Attribution, data, data postprocessing, publication, research evaluation,
incentivisation, and research fund distribution would thereby become comprehensible, open
(at will) and provable to the external world. Currently, scientists must be trusted to provide a true and useful representation of their research results in their final publication; blockchain would make much larger parts of the research cycle open to scientific selfcorrection. This bears the potential to be a technical solution to the current reproducibility crisis in science, and could ‘reduce waste and make more research results true’.
Sidechain is nothing but a separate chain as like blockchain, connected to the main blockchain via two-way-peg. Sidechains are considered as sub-chains or child chains and the first build blockchain are considered as a main chain or parent chain.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Foreword
This paper is the result of a research project carried out by Labs
in EVRY Financial Services during the fall of 2015. The content of
this report is the result of a comprehensive study, featuring online
sources, literary works, as well as recordings of financial
conferences such as Consensus 2015 and Fintech Week 2015.
We aim to provide a comprehensive report detailing the
opportunities, challenges and key success factors for financial
institutions looking to leverage the opportunities presented by
blockchain technology.
We hope you enjoy this study and that it helps give you greater
understanding.
Resources Assigned readings, ERRs, the Internet,and other resources.docxkarlhennesey
Resources: Assigned readings, ERRs, the Internet,and other resources
Write
a no more than 3 page paper, in which you identify a total compensation plan for an organization focused on internal equity, and a total compensation plan for an organization focused on external equity.
Identify
advantages and disadvantages of internal and external equity for the organizations.
Explain
how each plan supports that organization's total compensation objective and the relationship of the organization's financial situation to its plan.
Draw conclusions based upon Electronic Reserve Readings in eCampus
, Martocchio (2009) and/or Milkovich and Newman (2008),
personal experience, and data collected from organizations.
Integrate Week 2 readings
,
Martocchio (2009) and/or Milkovich and Newman (2008),
throughout paper.
Direct quotations should be avoided.
Research should be summarized and synthesized using your own words
; be certain to cite sources of knowledge.
Format
your paper consistent with
APA 6
th
Edition
guidelines.
.
Resource Review Documenting the Face of America Roy Stryker and.docxkarlhennesey
Resource:
Review "Documenting the Face of America: Roy Stryker and the FSA/OWI Photographers," and Ch. 5 of
Oxford History of Art: Twentieth-Century American Art
.
Write
a 200- to 350-word summary responding to the following:
How was photography used as an instrument for social reform? What photograph do you think makes the most powerful social commentary? Why?
Submit
your assignment in a Microsoft
®
Word document using the Assignment Files tab above.
.
More Related Content
Similar to Pg. 04Question Three Assignment 3Deadline THURS.docx
How Blockchain Technology Is Evolving In The CloudShikhaKonda
https://go-dgtl.com/whitepaper/how-blockchain-technology-is-evolving-in-the-cloud/?utm_source=offpage&utm_medium=thirdparty&utm_campaign=alo-seo - Cloud and blockchain are increasingly becoming the most valuable combinations to enhance the security of enterprise data living on the cloud. Learn more
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfPeeterParkar
Blockchain is famous for its use as the technology behind cryptocurrencies. However, it has many other applications. One such application is in cloud computing, providing additional security and several other benefits. Cloud and blockchain are increasingly becoming the most valuable combinations to enhance the security of enterprise data living on the cloud
Blockchain and its Use in the Public Sector - OECDOECD Governance
Presentation on the OECD Working Paper "Blockchains Unchained: Blockchain Technology and its use in the Public Sector". This guide aims to equip public servants with the necessary knowledge to understand what the Blockchain architecture is, the implications it could have on government services, and the opportunities and challenges governments may face as a result. For more information see oe.cd/blockchain
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdfJOELCONTACTS
Blockchain Technology is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, documents, contracts, patents, copyrights, branding).
How does the Blockchain Work?
A blockchain is a distributed, peer-to-peer database that hosts a continuously growing number of transactions. Each transaction, referred to as a “block,” is secured through cryptography, timestamped, and validated by every authorized member of the database using consensus algorithms (i.e., a set of rules). A transaction that is not validated by all members of the database is not added to the database. Every transaction is attached to the previous transaction in sequential order, creating a chain of transactions (or blocks). A transaction cannot be deleted or edited, thereby creating an immutable audit trial. A transaction can only be changed by adding another transaction to the chain.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain Technology Explained
You must have heard about the term “blockchain,” in reference to Bitcoin and othercryptocurrencies.
https://www.leewayhertz.com/blockchain-technology-explained/
blockchain, Bitcoin, cryptocurrencies, blockchain technology, blockchain developers
#blockchain #Bitcoin #cryptocurrencies #blockchaintechnology #blockchaindevelopers
One of the most hyped IT buzzwords to have emerged in the last couple of years. Blockchain has found its way into major media headlines on a near-daily basis, but a year and a half ago, it was a word used by a relatively small number of people to describe the peer-to-peer distributed ledger technology.
Do a research and make a PowerPoint about Insulation for architectDustiBuckner14
Do a research and make a PowerPoint about Insulation for architecture
· What is Insulation?
· units of measurement and formulas
· Types of insulation and location of use
· Dew point
· Show examples for each type with pros and cons
· Sketch wall and detail sections and show each layer
· Provide some Research with links
Creative Commons Non Commercial CC-BY-NC: This article is distributed under the terms of the Creative Commons Attribution-
NonCommercial 3.0 License (http://www.creativecommons.org/licenses/by-nc/3.0/) which permits non-commercial use,
reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and
Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).
VikalPa • VolUMe 44 • iSSUe 1 • JanUaRY-MaRch 2019 1
Blockchain in Finance
Jayanth Rama Varma
P E R S P E C T I V E S
KEY WORDS
Blockchain
Distributed Ledger
DLT
Crypto Currency
includes research articles
that focus on the analysis and
resolution of managerial and
academic issues based on
analytical and empirical or
case research
B
lockchain—the decentralized replicated ledger technology that underlies
Bitcoin and other cryptocurrencies—provides a potentially attractive alterna-
tive way to organize modern finance. Currently, the financial system depends
on a number of centralized trusted intermediaries: central counter parties (CCPs)
guarantee trades in exchanges; central securities depositories (CSDs) provide secu-
rities settlement; the Society for Worldwide Interbank Financial Telecommunication
(SWIFT) intermediates global transfer of money; CLS Bank handles the settlement
of foreign exchange transactions, a handful of banks dominate correspondent
banking, and an even smaller number provide custodial services to large invest-
ment institutions. Until a decade ago, it was commonly assumed that the finan-
cial strength and sound management of these central hubs ensured that they were
extremely unlikely to fail. More importantly, it was assumed that they were too big to
fail (TBTF), so that the government would step in and bail them out if they did fail.
The Global Financial Crisis of 2007–2008 shattered these assumptions as many large
banks in the most advanced economies of the world either failed or were very reluc-
tantly bailed out. The Eurozone Crisis of 2010–2012 stoked the fear that even rich
country sovereigns could potentially default on their obligations. Finally, repeated
instances of hacking of the computers of large financial institutions is another factor
that has destroyed trust. When trust in the central hubs of finance is being increas-
ingly questioned, decentralized systems like the blockchain that reduce the need for
such trust become attractive.
It is no coincidence that Bitcoin was launched shortly after the failure of Lehman
that marked the peak of the global financial crisis. Over the subsequent decade,
cryptocurrenc ...
DiscussionThe vast majority of the population associates Blockch.docxmadlynplamondon
Discussion
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
· Ask an interesting, thoughtful question pertaining to the topic
· Answer a question (in detail) posted by another student or the instructor
· Provide extensive additional information on the topic
· Explain, define, or analyze the topic in detail
· Share an applicable personal experience
· Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
· Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.
300 words and 2 references.
Attached all the required documents.
computerweekly.com 10-16 September 2019 21
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT profession-als in the next five years. Analyst Gartner has forecast that by 2023, blockchain will support the global movement and
tracking of $2tn of goods and services.
It is regarded by many industry watchers as a disrupting force
in the financial world. A PwC global financial technology (fintech)
survey found that 56% of respondents recognise the importance
of blockchain. At the same time, however, 57% admit to being
unsure about or unlikely to respond to this trend.
Start witH tHe HaSH
Blockchain is effectively a shared ledger between a group of
people – for example, a group of companies that work together
to produce a service or product. What makes blockchain differ-
ent is the fact that the history of the changes – past transactions,
for example – are immutable.
Essentially, the historical entries become read-only and
unchangeable. This is due to the fact that each blockchain
entry relies on the hash – a computed value including part of a
previous block as part of its hashing calculation for the current
block. This means that if a previous block is somehow modi-
fied or corrupted, its hash value will change and therefore the
values after that point become broken, making the tampering
evident for all to see.
One example where blockchain technology can be used is
where several companies come together to provide or consume
Blockchain:
hype vs reality
Regarded by many as a
disruptive force in finance
and beyond, blockchain
technology presents a number
of complex challenges that
must be overcome before
it can truly ...
Blockchain for science and knowledge creation. A technical fix to the reprodu...eraser Juan José Calderón
Blockchain for science and knowledge creation. A technical fix to the reproducibility crisis ?
PD Dr. med. Sönke Bartling (@soenkeba,soenkebartling@mailbox.org)
Associate researcher at the Humboldt Institute for Internet and Society Benedikt Fecher (benedikt.fecher@hiig.de)
German Institute for Economic Research and Alexander von Humboldt Institute for internet and society.
Abstract:
Blockchain technology has the capacity to make digital goods immutable, transparent,
externally provable, decentralized, and distributed. Besides the initial experiment or data
acquisition, all remaining parts of the research cycle could take place within a blockchain
system. Attribution, data, data postprocessing, publication, research evaluation,
incentivisation, and research fund distribution would thereby become comprehensible, open
(at will) and provable to the external world. Currently, scientists must be trusted to provide a true and useful representation of their research results in their final publication; blockchain would make much larger parts of the research cycle open to scientific selfcorrection. This bears the potential to be a technical solution to the current reproducibility crisis in science, and could ‘reduce waste and make more research results true’.
Sidechain is nothing but a separate chain as like blockchain, connected to the main blockchain via two-way-peg. Sidechains are considered as sub-chains or child chains and the first build blockchain are considered as a main chain or parent chain.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Foreword
This paper is the result of a research project carried out by Labs
in EVRY Financial Services during the fall of 2015. The content of
this report is the result of a comprehensive study, featuring online
sources, literary works, as well as recordings of financial
conferences such as Consensus 2015 and Fintech Week 2015.
We aim to provide a comprehensive report detailing the
opportunities, challenges and key success factors for financial
institutions looking to leverage the opportunities presented by
blockchain technology.
We hope you enjoy this study and that it helps give you greater
understanding.
Similar to Pg. 04Question Three Assignment 3Deadline THURS.docx (20)
Resources Assigned readings, ERRs, the Internet,and other resources.docxkarlhennesey
Resources: Assigned readings, ERRs, the Internet,and other resources
Write
a no more than 3 page paper, in which you identify a total compensation plan for an organization focused on internal equity, and a total compensation plan for an organization focused on external equity.
Identify
advantages and disadvantages of internal and external equity for the organizations.
Explain
how each plan supports that organization's total compensation objective and the relationship of the organization's financial situation to its plan.
Draw conclusions based upon Electronic Reserve Readings in eCampus
, Martocchio (2009) and/or Milkovich and Newman (2008),
personal experience, and data collected from organizations.
Integrate Week 2 readings
,
Martocchio (2009) and/or Milkovich and Newman (2008),
throughout paper.
Direct quotations should be avoided.
Research should be summarized and synthesized using your own words
; be certain to cite sources of knowledge.
Format
your paper consistent with
APA 6
th
Edition
guidelines.
.
Resource Review Documenting the Face of America Roy Stryker and.docxkarlhennesey
Resource:
Review "Documenting the Face of America: Roy Stryker and the FSA/OWI Photographers," and Ch. 5 of
Oxford History of Art: Twentieth-Century American Art
.
Write
a 200- to 350-word summary responding to the following:
How was photography used as an instrument for social reform? What photograph do you think makes the most powerful social commentary? Why?
Submit
your assignment in a Microsoft
®
Word document using the Assignment Files tab above.
.
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxkarlhennesey
Resource:
Review "Thelma Golden--How Art Gives Shape to Cultural Change," Ch. 9 and 11 of
Oxford History of Art: Twentieth-Century American Art
, and the Week Five Electronic Reserve Readings.
Write
a 200- to 350-word summary responding to the following:
How has art, in the context of the social justice movements of the twentieth century, challenged, and shaped American society?
Submit
in a Microsoft
®
Word document using the Assignment Files tab above
.
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxkarlhennesey
Resource:
Review "Representational Cityscape," and Ch. 3 of
Oxford History of Art: Twentieth-Century American Art
Write
a 200- to 350-word summary responding to and discussing the following:
The work of Joseph Stella and other early American modernists, such as Marsden Hartley, Max Weber, and Georgia O'Keeffe and how they differed greatly in subject and style to the work of the Ashcan School, and include the following:
Where did this abstract style originate? Describe at least one art work in your summary.
Choose one art form or cultural development that originated elsewhere but which is currently a part of American culture.
Describe how this art form has directly affected you.
Submit
your assignment in a Microsoft
®
Word document using the Assignment Files tab above.
.
Resource Part 2 of Terrorism TodayYou work on a national se.docxkarlhennesey
Resource
: Part 2 of
Terrorism Today
You work on a national security team of intelligence analysts and you have been asked to give a threat analysis presentation to intelligence agents who are assigned to work in various regions around the world. Your small team is assigned to present on one region specifically.
Select
one of the following eleven regions:
The Persian Gulf
Create
a 2 slide Microsoft® PowerPoint® presentation with
detailed speaker notes
. Use complete sentences, with correct grammar and punctuation, to fully explain each slide as if you were giving an in-person presentation.
Address
the following in your presentation:
Explain the purpose of counterterrorism analysis
Format
your presentation following APA guidelines.
.
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxkarlhennesey
Resources:
Appendix A, The Home Depot, Inc. Annual Report in
Fundamentals of Financial Accounting
Write
a 1,050- word paper in which you address the following:
Does management’s assessment of the financial condition agree with your assessment from the Financial Statements Paper Part I? Explain your response. Support your answer using trend analysis, vertical analysis, or ratio analysis.
In the Annual Report, there are several concerns from management. Discuss these concerns, and identify other weaknesses not discussed by management. Then, recommend a course of action addressing these concerns.
Format
your paper consistent with APA guidelines
.
Resources Annotated Bibliography document. Research five websites t.docxkarlhennesey
Resources: Annotated Bibliography document. Research five websites that contain mathematical activities, manipulatives, and lesson plans for different math concepts such as: fractions, decimals, or percentages. Prepare an annotated bibliography that includes the five selected websites. Include a brief explanation of why each site is a valuable resource and how each might be used in the classroom.
.
Resources American History, Primary Source Investigator;Cente.docxkarlhennesey
Resources: American History, Primary Source Investigator;
Center for Writing Excellence (CWE) Microsoft® PowerPoint® tutorial
Create a Microsoft® PowerPoint® or another multimedia tool presentation of at least 8 slides on the presidencies of Kennedy and Johnson.
Include the following:
•A title slide
•An introduction slide ◦At least 2 slides on Kennedy's domestic and international policies
◦At least 2 slides on Johnson's domestic and international policies
◦A conclusion slide
◦A reference slide
Include detailed speaker's notes.
Incorporate maps, images, and video from the Primary Source Investigator and from outside sources.
Create a visual template to use on each slide throughout the presentation. Use color.
Format your presentation consistent with APA guidelines
.
Resource University of Phoenix Material Data SetDownload the.docxkarlhennesey
Resource:
University of Phoenix Material: Data Set
Download
the data set.
Review
the age and gender data in the data set.
Display
gender information in a chart and plot age data in a box plot.
Calculate
the appropriate measure of central tendency and variability for the age and gender. What conclusion can you draw from the data?
.
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxkarlhennesey
Resource:
Ch. 6 & 7 of
Financial Accounting
Complete
Brief Exercises BE6-2, BE6-3, BE6-4, BE7-3, BE7-8 & BE7-9.
Complete
Exercise E7-8.
Submit
as either a Microsoft
®
Excel
®
or a Microsoft
®
Word document.
*Due on 06/10/2015
.
Resource Films on DemandCrime and Punishment”Experiment Res.docxkarlhennesey
Resource:
Films on Demand
“Crime and Punishment”
“Experiment Research and Design”
“Selecting a Sample”
Resource: Types of Crime video in CJ Criminology
“Introduction to Crimes Kiosk”
Resource:
Criminology in the 21st Century
How Crimes are Measured
Utilize
FBI Uniform Crime Report data and select one offense, such as burglary, in two metropolitan areas.
Choose
metropolitan areas with different data.
Write
a 700- to 1,050-word paper comparing the occurrence of the offense in the selected areas. Identify the number of occurrences reported to the police for each area, and address the following questions:
Which area had more reported incidents?
What were the rates of the crime for each area?
Did the rates change over time in either area?
What factors might explain the differences in the rates?
Include
at least two peer reviewed references. I have attached the references that need to be used.
Format
your paper consistent with APA guidelines
.
Resource Managing Environmental Issues Simulation(or research a.docxkarlhennesey
Resource:
Managing Environmental Issues Simulation
(or research an instance where a city council may need to consider all angles for a local community and its surrounding natural environment.)
Write
a 1,050- to 1,400-word proposal to a local city council in which you propose deciding how to use money to best serve the environment within a community.
Address
the following:
Take the role of one of these stakeholders listed in the simulation
You have investments that total $250,000.
Decide how you would spend this money to improve the status of the environment in this community.
Explain how environmental justice plays a part in your proposal.
Explain to the council why they should choose your proposal.
.
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxkarlhennesey
Resource: Ch. 9 of Introduction to Business
Create a 5-to-7 slide Microsoft PowerPoint presentation to teach your fellow students about the following IT applications:
Transaction processing systems
Knowledge management systems
Expert system and artificial intelligence
Enterprise resource planning systems
E-commerce systems
Include detailed speaker notes and examples.
Use images as well.
.
Resource Ch. 9 of Introduction to Business Complete the table in .docxkarlhennesey
Resource: Ch. 9 of Introduction to Business
Complete the table in Appendix E by describing the uses of following hardware and software components:
Legacy systems
Mainframe computers
Microprocessors
PCs
Network computers
World Wide Web and the Internet
Wired and wireless broadband technology
PC software
Networking software
Computer security software
.
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxkarlhennesey
Resource:
Ch. 3 of
Management
Identify
a time in your life when you had to make a personal or professional decision, such as buying a home, changing jobs, enrolling in school, or relocating to another state or region.
Write
a 200- to 350-word description in which you discuss your decision-making process. Support your ideas with academic research. Include the following:
Describe each step of your process.
How similar was your decision-making process to the one described in the text?
How might your decision be different if you had used the same steps included in the text?
Format
your paper consistent with APA guidelines.
Click
the Assignment Files tab to submit your assignment.
.
Resource Significant Health Care Event Paper Grading Criteria.docxkarlhennesey
Resource:
Significant Health Care Event Paper Grading Criteria
Select
,from your Week One readings, a significant event or aspect that has changed or affected health care today. Examples include, but are not limited to, managed care, capitation, the multiple-payer system, excessive litigation, and so forth.
Write
a 700- to 1,050-word paper and discuss the following:
How does this significant event relate to the changes on health care?
In your opinion, has this event impacted the historical evolution of health care? If so, how? If not, could it?
Do you personally agree with the event’s significance, based on your beliefs and values? How so?
Format
your paper consistent with APA guidelines
.
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxkarlhennesey
Resource:
Ch. 3 of
Financial Accounting
Complete
Exercises E3-9 & E3-13.
Submit
as either a Microsoft
®
Excel
®
or Microsoft
®
Word document.
Click
the Assignment Files tab to submit your assignment.
A
Template
is provided for this weeks' assignment; please see materials.
****Due today before 8 pm central time
.
Resource University of Phoenix Material Appendix AIdentify.docxkarlhennesey
Resource:
University of Phoenix Material: Appendix A
Identify
a critical asset in your city or state that may be vulnerable to domestic terrorism.
Use
University of Phoenix Material: Appendix A to identify five threats against your critical asset. Consider both terrorist and non-terrorist threats and include at least one weapon of mass destruction.
Calculate
the risk for each threat and identify existing countermeasures.
Write
a 1,400- to 2,100-word proposal that assesses the current vulnerability of the critical asset. Consider the threats identified, the calculated risk, and existing countermeasures. Determine if the vulnerability is reasonable and offer additional countermeasures to mitigate the risk of attack.
Use
at least two sources for support.
Format
your paper consistent with APA guidelines, and include the University of Phoenix Material: Appendix A as an appendix.
University of Phoenix Material
Appendix A
Security Assessment
THREAT
Examples
RISK
COUNTERMEASURE
Probability
Criticality
Total
Bomb
3/10
8/10
11/20
Bomb dogs
Sniper attack
4/10
6/10
10/20
Spot scopes and increase officer presence
Biological weapon
1/10
9/10
10/20
Contamination equipment
Cyber virus
8/10
3/10
11/20
Enhanced virus protection and biometric access
.
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxkarlhennesey
Resource:
The Threat of Bioterrorism Video
Write
a 700 to 850-word paper discussing the goals of biological terrorism and how the potential threat of terrorist activity effects the public’s perception of risk.
Include
the following information in your paper:
Provide at least two examples of potential and past biological threats.
Describe how the potential threat of bioterrorism affects society
Discuss ways to mitigate the public’s perception of risk of biological threats.
Format
your paper consistent with APA guidelines.
.
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxkarlhennesey
Resource: Ch. 14 of Introduction to Psychology
Create an 8 to 12 slide Microsoft PowerPoint presentation with speaker notes.
Summarize how psychological disorders are classified. Include the role of the DSM IV TR. Your presentation must have at least one slide for each major class of psychological disorders listed below. Describe the major characteristics of each class of disorder, and identify at least three disorders that fall under each category.
Anxiety disorders
Dissociative disorders
Somatoform disorders
Mood disorders
Schizophrenia
Personality disorders
Substance abuse disorders
.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Pg. 04Question Three Assignment 3Deadline THURS.docx
1. Pg. 04
Question Three
Assignment 3
Deadline: THURSDAY 9/4/2020 @ 23:59
[Total Mark for this Assignment is 6]
Decision support systems
IT445
College of Computing and Informatics
Question One
2 Marks
Learning Outcome(s): LO3
Use some DSS and demonstrate the database working with DSS
and statistical models
2. ABC chocolate manufacturing company needs to decide on how
many chocolate bars should they produce each month
to maximize the company profit. ABC consider two types of
chocolate bar ‘dark' and 'salted caramel’. Dark chocolate bar
required $20 of raw ingredients and take 2 day to make and
salted caramel chocolate bar required $30 of raw ingredients
and take 4 working days to make. The profit contribution of
each dark chocolate bar is $2 and salted caramel chocolate bar
is $5. The Manufacture has capacity of 100,000 working days
per month and ingredients budget of $10,000 per month. Using
linear programming modelling for ABC company
problem, answer the following questions.
a) Identify decision, constraint and result variables, and
objective function.
b) Represent the model in excel sheet, run the model and show
the result. Provide a screenshot of your solution. [Hint: using
excel solver].
Question Two
2 Marks
Learning Outcome(s): LO2
Analyze various industrial applications of DSS and their
limitations.
Give the name and a brief discussion of any four major types of
models used in DSS?
3. Question Three
2 Marks
Learning Outcome(s): LO1
Describe the structure of Decision Support Systems (DSS) and
their services
Write the differences between Forward Chaining and Backward
Chaining also list some suitable application areas for both.
38 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
4. papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
5. the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Universe
D O I : 1 0 . 1 1 4 5 / 3 3 0 3 8 6 8
6. Article development led by
queue.acm.org
Blockchain remains a mystery,
despite its growing acceptance.
BY JIM WALDO
http://dx.doi.org/10.1145/3303868
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 39
I
M
A
G
E
B
Y
A
N
D
R
I
J
B
O
8. K
to be independent of any central or
trusted authority. This is meant to be
a peer- or participant-driven system
in which no entity has more or less
authority or trust than any other. The
design seeks to ensure the other goals
as long as more than half of the mem-
bers of the participating community
are honest.
Components of Blockchain
While there are lots of different ways to
implement a blockchain, all have three
major components. The first of these is
the ledger, which is the series of blocks
that are the public record of the trans-
actions and the order of those transac-
tions. Second is the consensus proto-
col, which allows all of the members of
the community to agree on the values
stored in the ledger. Finally, there is the
digital currency, which acts as a reward
for those willing to do the work of ad-
vancing the ledger. These components
work together to provide a system that
has the properties of stability, irrefut-
ability, and distribution of trust that
are the goals of the system.
The ledger is a sequence of blocks,
where each block is an ordered se-
quence of transactions of an agreed-
upon size (although the actual size
9. varies from system to system). The first
entry into a block is a cryptographic
hash (such as those produced by the
Secure Hash Algorithm SHA-256) of
the previous block. This prevents the
contents of the previous block from be-
ing changed, as any such change will
alter the cryptographic hash of that
block and thus can be detected by the
community. These hash functions are
easy to compute but (at least to our cur-
rent knowledge) impossible to reverse.
So once the hash of the contents of a
block is published, anyone in the com-
munity can easily check that the hash
is correct.
So far, this is nothing new; it is sim-
ply a Merkle chain, which has been
in use for years. The wrinkle in block-
chain is that the calculation of the hash
needs to add a nonce (some random
set of bits) to the block being hashed
until the resulting hash has a certain
number (generally six or eight) of lead-
ing zeros. Since there is no way to pre-
dict the value that will give that num-
ber of leading zeros to the hash, this is
a brute-force calculation, which is ex-
ponentially difficult on the number of
zeros required. This makes the calcula-
tion of the hash for the block computa-
tionally difficult and means any mem-
ber of the community has the chance
of coming up with an acceptable hash
10. with a probability that is proportional
to the amount of computing resources
the member throws at the problem.
40 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
for the calculation of the next block in
the chain. This requires an incentive
mechanism, which is where the third
component of the blockchain universe
enters the picture: digital currency.
Digital currency. The reason for a
miner to do all the computational work
to calculate the nonce and hash of a
block is that the first to do so gets an al-
location of digital currency as the first
transaction in the next block. This also
encourages other miners to accept a
block as quickly as possible, so they can
start doing the work to hash the next
block (which has likely been filled with
transactions during the time it took to
hash the previous block). Bitcoin was
the original blockchain currency and in-
centive; in September 2017 the reward
for hashing a block was 12 bitcoins8
when the exchange rate was 1 bitcoin
= ~$4,500 U.S. (prices fluctuate rather
wildly). This reward halves (for bitcoin)
every 210,000 blocks. The next halving
11. is expected around May 25, 2020.1
Other digital currencies work in a
similar fashion. To spend the currency,
entries are made in the then-current
block, which acts as a ledger of all the
currency exchanges for a particular
ledger/digital coin combination.
Problems with Blockchain
While blockchain was originally pro-
posed as a mechanism for trustless
digital currency, its uses have expand-
ed well beyond that particular use case.
Indeed, the emphasis seems to have bi-
furcated into companies that empha-
size the original use for currency (thus
the explosion of initial coin offerings,
which create new currencies) and the
use of the ledger as a general mecha-
nism for recording and ordering trans-
actions. For the first use, the claim is
that blockchain can replace outdated
notions of currency and allow a new,
private, friction-free economy. For the
latter use, the claim is that blockchain
can be used to track supply chains, cre-
ate self-enforcing contracts, and gen-
erally eliminate layers of mediation in
any transaction.
Both of these kinds of uses pres-
ent some serious problems. Many
are problems any new technology
encounters in replacing entrenched
interests, but a number of them are
12. technical in nature; those are the
ones discussed here.
Coming up with the hash and the right
nonce is a proof of work (and, perhaps,
luck) that can be easily verified by any-
one in the community. Those attempt-
ing to calculate the right hash value
for a block are the miners of the block-
chain world; they are exchanging com-
putation for pay.
Once a miner comes up with the right
nonce that produces the right hash, they
broadcast the result to the rest of the
community, and all miners start work
on the next block. The first entry in the
new block will be the hash of the last
block, and the second entry in the block
will be the creation of some amount of
currency assigned to the miner who
found the hash for the previous block.
This works only if you have a block
to start the chain. This is done in the
same way all systems get started: by
cheating and declaring a block to be
the Genesis block.
It is possible that two different min-
ers could both find, at the same time
(or close enough), a nonce that gives
a candidate hash value with the right
number of leading zeros, or that some-
one seeing a nonce that works could
claim the discovery as their own. There
13. could even be two different blocks be-
ing proposed as the next entry in the
chain. Dealing with such issues re-
quires the next component of the sys-
tem: the consensus protocol.
Consensus protocols are among the
most-studied aspects of distributed
systems. While it was proved some
time ago that no algorithm will guaran-
tee consensus if there is a possibility of
any kind of failure,3 a number of well-
known protocols such as Paxos4 have
been used in systems for some time
to give highly reliable mechanisms for
distributed agreement. In consensus
protocols such as Paxos, however, it is
assumed the systems that must reach
agreement are known.
Depending on the failure model
used, the number of systems that must
agree to reach consensus changes.
When a majority of systems agree in
such a protocol (for some definition of
majority), consensus has been reached
in systems that want to protect from
non-byzantine failure. If the system is
subject to byzantine failure, then two-
thirds of the systems (plus one) need
to agree. While the voting can be done
in peer-to-peer systems, most efficient
versions of the algorithms depend on a
leader to initiate the voting and tally the
results.
14. In the blockchain universe, how-
ever, there is a trust-free system, which
means there can be no leader. Further,
in the blockchain universe the number
of systems participating in validating
the transactions (that is, finding a hash
for the block with the right number of
zeros in the prefix) is not known. This
makes claims that a block is accept-
ed when 51% of the miners agree on
the block nonsense, since there is no
known value for the number of entities
trying to agree.
Instead, the majority is determined
by the calculation of the hash for the
next block. Since that block begins
with the hash of the previous block,
and since the likelihood of the next
block’s hash being calculated is pro-
portional to the amount of computing
resources trying to calculate the ap-
propriate hash for the next block, if a
majority of the computing power avail-
able to the miners starts to work on a
block that is seeded with the previous
hash, then that block is more likely to
be offered as the next block. This is the
reason for consensus being tied to the
longest chain, as that chain will be pro-
duced by the largest number of com-
puting resources.
This mechanism relies on the gen-
eration of a hash with the right set of
15. leading zeros being genuinely random.
Being random also means that on oc-
casion someone will get lucky and a
chain that is being worked on by a mi-
nority of the miners will be hashed ap-
propriately before a chain that is being
worked on by a larger amount of com-
puting resources.
In an important sense, however, this
does not matter. The blockchain uni-
verse defines a majority as the produc-
tion of an appropriate nonce and hash.
Sometimes this means more than half
of the computing power has worked on
the problem, but other times it might
mean only one (exceptionally lucky)
miner got the answer. This might mean
a set of transactions in a block that is
not verified first need to be rolled back,
but that is the nature of in-flight trans-
actions.
It does mean all of the miners in
the blockchain universe need to move
to a newly hashed block as the basis
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 41
practice
A number of criticisms of block-
chain center on the mechanism used
16. to create an accepted hash for a block.
To ensure this can be discovered by
anyone, the mechanism needs to be
one that takes significant computation
but can be easily verified. To ensure
the blocks that are verified cannot be
changed, the computation needs to
be impractical to reverse. Hashing the
block using a function such as SHA-256
and requiring that a nonce value is add-
ed until some number of leading zeros
appears in the hash fits these charac-
teristics nicely. This very set of require-
ments, however, means the consensus
mechanism has intrinsic limitations.
Scaling. An obvious worry about
the consensus-by-hashing mechanism
used in blockchain is whether the tech-
nology can scale to the levels needed
for more general use. According to
blockchain.com, the number of con-
firmed transactions averages around
275,000 per day, with a peak over the
last year of about 380,000.2 This is an
impressive number but hardly the
400,000 transactions per minute that
major credit-card systems perform on
peak days. Blocks can currently be veri-
fied at a rate of four to six per second,
and this is the limiting factor on the
number of transactions.
While there are a number of pro-
posals to deal with scaling block-
chain, it is unclear how these fit with
17. the base design of the system. Making
the verification of a block difficult and
random is an important aspect of the
basic design of blockchain; this is the
proof of work that is at the core of the
trustless consensus algorithm. If the
verification of a block is made easier,
then the probabilistic guarantees of any
miner being able to discover the appro-
priate hash decreases, and the possibil-
ity of some miner with a large amount
of computing taking over the chain in-
creases. Verifying a block is meant to be
hard; that’s how the system avoids hav-
ing to trust any particular member or
set of members.
One mechanism suggested for scal-
ing is to shard the blockchain into a
number of different chains, so that
transactions can be done in parallel
in different chains. This is happen-
ing in the different coin exchanges;
each coin system can be thought of
as a separate shard. This introduces
its own complexity in order to have a
transaction that crosses these shards,
since the notion of ensured consis-
tency requires that all ledgers are
self-contained to allow consistency
checking within each ledger. A new
blockchain could be created to be
used for cross-blockchain transac-
tions, but the incentive mechanism
for that blockchain would be a new
18. electronic currency that would need
to stay within the ecosystem of this
new blockchain. Getting the interact-
ing blockchains to trust the mediating
blockchain is an unsolved problem.
There have also been attempts
to use some mechanism other than
proof of work to drive the consensus
protocol. Perhaps the best known of
these is the proof-of-stake approach,
in which a block can be calculated in
much simpler ways, and consensus is
reached when those with a majority of
the currency agree on the hashing of
the block. Since the amount of curren-
cy and its owners are known, this is not
subject to the problem of not knowing
the members of the community to vote.
But this does reintroduce the notion
of trust to the system; those who have
more money have more of a stake, and
therefore are trusted more than those
who have less of a stake. This is the
electronic equivalent of an oligarchy,
which has not worked particularly well
in the past but might prove more stable
in this context.
Power consumption. A second criti-
cism of blockchain technology that is
an outgrowth of the consensus mech-
anism is the amount of energy con-
sumed in the discovery of an appro-
priate hash for a block. Calculating a
hash with the appropriate number of
19. leading zeros requires many hashing
calculations, which in turn burn a lot
of electricity; some have claimed that
bitcoin and related cryptocurrencies
are mechanisms to transform elec-
tricity into currency. The estimates
of how much electricity is consumed
range from the low side stating that it
is about as much as is used by the city
of San Jose, CA, to the high side that
it is equivalent to Denmark’s power
consumption. No matter which model
is used for the calculation, the answer
is large.
The hope is that this energy drain
will diminish, perhaps by changing the
While blockchain
was originally
proposed as a
mechanism for
trustless digital
currency, its uses
have expanded
well beyond that
particular use case.
42 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
known cryptographic protocols could
20. be done in a number of ways. Doing it
on top of a system such as blockchain
is needed if the requirement that the
system be trustless (except for trusting
the software) is added. Such a trustless
system comes with a cost.
Whether the cost is worth it is a de-
cision that requires an understanding
of the various parts of the system and
how they interact. A public, unforge-
able, unchangeable ledger is possible
without cryptocurrency or a consensus
algorithm based on a difficult-to-com-
pute one-way function that is easily ver-
ified. Cryptocurrencies can be created
without the use of either a public led-
ger or a trustless consensus algorithm.
And consensus algorithms can be cre-
ated that do not require a financial in-
centive system or a public ledger.
Related articles
on queue.acm.org
Bitcoin’s Academic Pedigree
Arvind Narayanan and Jeremy Clark
https://queue.acm.org/detail.cfm?id=3136559
Research for Practice: Cryptocurrencies,
Blockchains, and Smart Contracts;
Hardware for Deep Learning
https://queue.acm.org/detail.cfm?id=3043967
Certificate Transparency
Ben Laurie, Google
21. https://queue.acm.org/detail.cfm?id=2668154
References
1. Bitcoinblockhalf.com. Bitcoin block reward halving
countdown.
2. Blockchain.com. Confirmed transactions per day,
2018; https://www.blockchain.com/charts/n-transacti
ons?daysAverageString=7.
3. Fischer, M., Lynch, N.A., Paterson, M. Impossibility of
distributed consensus with one faulty process. JACM
32,2 (1985), 374–382.
4. Lamport, L. The part-time parliament. ACM Trans.
Computer Systems 16, 2 (1998), 133–169.
5. Morris, D.Z. Bitcoin is in wild upheaval after the
cancellation of the Segwit2x fork. Fortune (Nov.
12, 2017); http://fortune.com/2017/11/12/bitcoin-
upheavel-segwit2x-fork/.
6. Nakamoto, S. Bitcoin, a peer-to-peer electronic cash
system, 2008; https://bitcoin.org/bitcoin.pdf.
7. Thompson, K. Reflections on trusting trust. Commun.
ACM 27, 8 (Aug. 1984), 761–763; https://dl.acm.org/
citation.cfm?id=358210.
8. Trubetskoy, G. Electricity cost of 1 bitcoin (Sept. 2017);
https://grisha.org/blog/2017/09/28/electricity-cost-
of-1-bitcoin/.
9. Yaga, D., Mell, P., Roby, N., Scarfone, K. Blockchain
technology overview. NISTIR 8202 (Oct. 2018).
22. National Institute of Standards and Technology;
https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.
IR.8202.pdf.
Jim Waldo is a professor of the practice of computer
science at Harvard University, where he is also the chief
technology officer for the School of Engineering, a position
he assumed after leaving Sun Microsystems Laboratories.
Copyright held by author/owner.
Publication rights licensed to ACM.
hardware used for the hashing to some-
thing far more efficient (such as special-
ized ASICs). Making the hashing pro-
cess more efficient, however, is at odds
with blockchain’s fundamental mecha-
nism of trusting no one; the point is
that the verification of a block must be
difficult and random so that any miner
is equally likely to find the hash.
The energy consumption might
be less worrisome if the calculations
eating all of this power were gener-
ally useful. [email protected], for example,
uses a considerable amount of energy
by offloading analysis of background
radio-wave transmissions to Internet-
connected computers. This initiative,
based at UC Berkeley’s SETI (Search for
Extraterrestrial Intelligence) Research
Center, is trying to find signs of other
intelligent life in the universe, which is
seen by the participants as worth doing
(and paying for the extra electricity).
23. Perhaps the calculation used to ver-
ify the blockchain could be changed to
something that offered more than just
verification of the blockchain. Such
a calculation would need to have the
properties of being equally possible
for all miners to find (given equality of
computing resource), difficult to find,
and easy to verify. It is not clear what
this calculation might be.
Trust. Perhaps the most problem-
atic aspect of blockchain is its core
notion of being trustless. Much of the
complexity of the technology is caused
by this requirement. It is unclear, how-
ever, that this is even necessary for the
kinds of uses people talk about as core
to blockchain, or that the system is ac-
tually free of trust.
It is because of the lack of trust
that the system requires verification
of the block to be computationally
difficult, one-way, and easy to verify.
If this requirement of trustlessness
were dropped, then production of a
public ledger that was unchangeable
and easily verified could be done eas-
ily. Suppose such a ledger is to be used
for inter-bank transfer (which has been
suggested as a use for blockchain). In-
stead of a trustless system, however,
the users decide to trust a consortium
of major banks, the Federal Reserve
24. Board, and some selection of consum-
er watchdog agencies or organizations.
This consortium could choose a mem-
ber (perhaps on a rotating basis) who
is responsible for keeping the ledger
(a leader). Transactions are written to
the ledger, and when the ledger block
reaches an appropriate size, the lead-
er hashes the ledger, uses the hash to
start a new block, and continues (just
as in the current blockchain).
The difference is that there is no
need for the leader to randomly try val-
ues added to the block until the right
number of leading zeros is produced
in the hash. Without that requirement,
the hash can be done very quickly with
little energy expense. The block still
can’t be changed (since the hash is still
a one-way function), and any member
of the consortium (or anyone else who
has access to the ledger) can quickly
check the hash. A public, verifiable,
and unchangeable ledger can be pro-
duced in this way but at much lower
cost in both time and energy.
This does require trust in the various
members of the consortium, but verify-
ing that the consortium is not cheat-
ing on the hashing of a block would be
easy. This is not a fully centralized trust
in a single entity but, rather, trusting a
group. The larger and more varied the
25. group, the less likely the group would
collude. Note also that such a system
does not need an incentive mechanism
such as a digital currency to operate.
Who Do You Trust?
Maybe you really do not want to trust
anyone. Calibrating paranoia is diffi-
cult, and perhaps you really do want to
have an economic system in which no
specifiable set of entities has the ability
to collude and control the system. That
is the real reason for blockchain.
As Ken Thompson pointed out in
1984, trust has to happen somewhere.7
Even if you do not trust any group to
calculate the blocks, you need to trust
the developers of the software being
used to manage the blocks, the ledgers,
and the rest. Everything from bugs to
design changes5 in the software have
led to forks in the bitcoin ecosystem
that have caused considerable churn
in those systems. If your trust is in the
security and solidity of the code, that is
a choice you make. But it is not a trust-
less system.
A public, nonrefutable, unalter-
able ledger for transactions could be
a useful tool for a number of applica-
tions. Building such a system on top of
26. Copyright of Communications of the ACM is the property of
Association for Computing
Machinery and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
THE WORLD BITCOIN CREATED
THE FIRST BIG DIGITAL CURRENCY GAVE US A
GLIMPSE OF A NEW ECONOMIC ORDER—ONE
THAT RAISES MORE QUESTIONS THAN ANSWERS
BITCOIN. CRYPTOCURRENCIES. SMART CONTRACTS.
MANY PEOPLE HAVE NOW heard of the
rapidly changing ecosystem of financial technology, but few
have wrapped their heads around it. Hundreds
of central banks and corporations are incubating a game-
changing technology called blockchain—and
investors are betting billions on it. Yet only 24 percent of
global financial services professionals surveyed
in 2017 by PricewaterhouseCoopers (PwC) described
themselves as “extremely” or “very” familiar with it.
Much of the public is unsure if any of this is legal, if they
understand it at all. Evangelists say it has the
power to upend entire economic systems; others, such as Emin
Gün Sirer, a block-chain researcher at
Cornell University, warn that while the technical core is
“fascinating and disruptive, there’s also a lot of
hokum out there.” How to parse the nuance—or get a handle on
what a blockchain is?
27. It all starts with Satoshi Nakamoto, the world’s most reclusive
pseudonymous billionaire. In October 2008
Nakamoto published a paper via an obscure Internet mailing list
detailing a design for the world’s first
blockchain: a public database distributed and synchronized
every 10 minutes across thousands of
computers, accessible to anyone and yet hackable by no one. Its
purpose? To provide a decentralized,
bulletproof record of exchange for a new digital currency
Nakamoto called Bitcoin.
Until that point, the trouble with “peer-to-peer electronic cash”
was that nobody could reliably prevent you
from spending it twice. Block-chain technology changed all that
by inscribing every transfer of Bitcoin into
a “distributed ledger”—a kind of digital spreadsheet that, thanks
to the laws of mathematics and
cryptography, was more inviolable than carving it in stone. The
Economist dubbed it “the trust machine.”
The technology that underpins Bitcoin quickly outgrew it,
driving a frenetic period of innovation. Think of
blockchain as a scaffolding that can hold any data that need
secure provenance: financial histories,
ownership documents, proofs of identity. This “worldwide
ledger”—as Don Tapscott, co-author of
Blockchain Revolution, calls it—is a blank slate. But the
technology, imperfect as it is, can be tapped for
evil, too, and some are pumping the brakes on the frenzy.
Here’s a guide to the digital landscape that
Satoshi Nakamoto—whoever he is—has thrust before us.
CORE CONCEPTS
CRYPTOCURRENCY A form of digital currency that relies on
the mathematics of cryptography to control
how and when units of the currency are created and to ensure
28. secure transfer of funds.
PEER-TO-PEER (P2P) NETWORK A web of computers linked
in a decentralized way, such that any
computer can communicate directly with any other without
going through a central server or other
administrator. Napster, the network for sharing music files that
launched in the late 1990s, popularized the
concept.
NODE A computer connected to a P2P network. The Bitcoin
network currently has thousands of nodes
spread across the globe.
DISTRIBUTED LEDGER A list of recorded, time-stamped
transactions that is simultaneously broadcast,
copied and verified via consensus across many different
computers in a P2P network. If every node in the
network has an identical copy of the ledger, falsified entries or
corrupted versions can be easily detected.
BLOCK A grouping of individual transaction records on a
blockchain. On the Bitcoin network, new blocks
are added to the chain every 10 minutes.
HASHING A cryptographic method that uses a mathematical
function to condense any amount of data into
a unique string of alphanumeric characters of a certain fixed
length—called a hash value. This creates an
easily verifiable digital fingerprint for the hashed data. If even
a single bit of the original data is changed or
corrupted, the fingerprint that emerges from the hash function
will be drastically different, making it easy to
http://eds.a.ebscohost.com/eds/delivery?sid=4d7023a5-8a77-
44cb-88c8-
29. 0a64f6737b8d%40sessionmgr4008&vid=10&ReturnUrl=http%3a
%2f%2feds.a.ebscohost.com%2feds%2fdetail%2fdetail%3fvid%
3d5%26sid%3d4d7023a5-8a77-44cb-88c8-
0a64f6737b8d%40sessionmgr4008%26bdata%3dJkF1dGhUeXBl
PXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#toc
detect errors or tampering. Hashes are also “one-way”—the data
cannot be reassembled or extracted from
the fingerprint.
MINING The process by which nodes of a cryptocurrency
network compete to securely add new blocks of
transactions to a blockchain. Units of the currency are the
reward—and hence, a financial incentive to
ensure security. Mining involves downloading the latest version
of the blockchain’s transactions for
verification, then using brute-force computation to randomly
search for the solution to a difficult
mathematical puzzle created via hashing. The first node to
discover the correct solution “mines” that block,
adding it to the blockchain and claiming the reward associated
with it. Humans control nodes, but the
competition has nothing to do with skill: simply, the more raw
computing power a miner applies toward the
solution, the more likely he or she is to find it—a process called
proof of work.
HOW BLOCKCHAIN WORKS
How does digital currency—or any data—reliably pass back and
forth on a decentralized network full of
strangers that don’t have a reason to trust one another at all? By
generating a permanent ledger of
transactions that can’t be changed by any single network
member.
30. 1 A blockchain transaction begins with one party agreeing to
send data to another. These data could be
anything. But because the point of a blockchain is to create a
permanent, verifiable record of exchange, the
data usually represent some valuable asset. Common examples:
units of a cryptocurrency or other financial
instrument; contracts, deeds or records of ownership; medical
information or other identity data.
peer network of computers operating the
blockchain. Every node on the network is equipped with a
procedure for verifying whether the transaction
is valid or not. (In a Bitcoin transaction, for example, the
network would verify whether those paying actually
have the amount of Bitcoins they say they do.) Once the
network has reached a consensus, algorithms
package up the validated transaction with other recent
transactions into a block.
hashing the data inside it, together with two other
pieces of information: the fingerprint of the preceding block and
a random number called a nonce.
digital fingerprint that also mathematically encodes
the validated fingerprints of every block preceding it. These
nested fingerprints make the blockchain
increasingly secure with every new block that gets added
because altering a single bit of information
anywhere in the blockchain would drastically change not only
the fingerprint of that particular block but
every subsequent one in the chain as well.
31. another for the right to add the new block to the
blockchain. Their computers perform a tedious set of hash based
calculations over and over again by trial
and error, hoping to generate a solution that satisfies an
arbitrary rule defined by the network. (On the
Bitcoin blockchain, the miners are searching for solutions—or
“hash values”—that have a particular number
of zeros at the beginning.) Whoever is first to complete this
proof of work process and find the matching
solution successfully “mines” that block, earning a financial
reward.
AS AN ALTERNATIVE: Proof of work mining is energy
intensive, so some new blockchains are doing away
with it, instead using a preapproved network of “validator”
nodes who can notarize transactions via an
alternative process called proof of stake. Because this process
doesn’t rely on difficult hashing calculations,
it uses much less computing power (and much less electricity).
BLOCKCHAIN DEMYSTIFIED: FREQUENTLY ASKED
QUESTIONS ABOUT A RAPIDLY EXPANDING
TOPIC
1. ARE BITCOIN AND BLOCKCHAIN THE SAME?
No, but it’s easy to get them confused because they both came
into public awareness in 2008, when Satoshi
Nakamoto published his paper describing how to implement
them simultaneously. Bitcoin is one type of
cryptocurrency. What people call “blockchain” is a technology
that makes Bitcoin possible—an
infrastructure that can be used for tracking many types of
transactions. Blockchain technology exists without
32. Bitcoin—but not the reverse. Think of Bitcoin as a kind of
application that runs “on” the blockchain, much
like Web sites run on the Internet.
10% Predicted amount of the world’s gross domestic product
that will be stored in blockchain based
technology by 2025, according to a 2015 survey report from the
World Economic Forum.
WHO IS USING BLOCKCHAIN TECHNOLOGY?
FINANCIAL INSTITUTIONS: Global banks and investment
institutions are researching and pursuing
blockchain projects, sometimes joining forces in consortiums.
Since 2012 Ripple has been a thriving,
blockchain-based system for settling international transactions
among banks. Start-ups such as Bloom
intend to deploy blockchains to credit reporting, hoping to end
data breaches like the Equifax hack.
GOVERNMENTS: Delaware and Illinois use distributed ledgers
for birth certificates. A Vermont law allows
blockchain technology to verify the authenticity of legal
documents. Dubai integrated blockchains into many
of its administrative services, such as obtaining licenses. In
2016 Tunisia began issuing a blockchain-
backed version of its digital national currency called the eDinar.
TECH ENTREPRENEURS: The Ethereum network—which was
designed to support new applications,
rather than just a digital cash ecosystem like Bitcoin—is like an
App Store for blockchain start-ups.
Hundreds of projects and businesses are running on it. One
notable: We Power wants to let households
33. buy and sell renewable energy (from, say, roof-mounted solar
panels) directly to one another.
COPYRIGHT AND IP HOLDERS: U.K. musician Imogen Heap
started Mycelia, a tech incubator that tracks
metadata associated with creative works, cutting out
intermediaries like iTunes.
NONPROFITS AND AID GROUPS: The BitGive Foundation is
boosting the accountability of philanthropic
giving. And the United Nations World Food Program is
streamlining how it tracks and delivers assistance
to Syrian refugees in Jordan.
ACADEMIC INSTITUTIONS: Forget sheepskins. The
Blockcerts project wants to make all manner of
academic and professional credentials more trustworthy and
shareable.
ASSET MANAGERS: London-based Everledger is targeting the
diamond industry by recording the
attributes and provenance of each precious stone. Fine wine and
art are tracked, too.
JOURNALISTS: To push back against fake news, Civil gives
news makers a platform to create ad-free,
inalterable journalism that’s immune to outside interests
(Russia; Facebook) and supported by readers.
REGULAR PEOPLE: For migrant workers who send money to
their families back home, using
Bitcoin costs less than using Western Union, which is why an
estimated 20 percent of international
remittances between South Korea and the Philippines now rely
on it. It’s not just for cyber libertarians, and
34. it goes way beyond finance. Here’s an incomplete lineup:
WHY WOULD YOU USE A CRYPTOCURRENCY INSTEAD
OF A NATIONAL CURRENCY?
Imagine holding a $100 bill that buys only $50 worth of goods.
In Venezuela, where the official currency is
crashing in value, that scenario is a reality. “You’re losing
something like half of the value of your net income
every year to hyperinflation,” says venture capitalist Morris.
“People are thinking: ‘How can I stop that?’ And
they’re buying Bitcoin.”
Why would a hard-to-understand cryptocurrency with no
government guaranteeing its value as “legal
tender” seem like a better bet than a more traditional value-
holding commodity such as gold? For one thing,
converting Venezuelan bolivars into Bitcoin is simply a lot
easier for ordinary folks—anyone with access to
the Internet can do it. Because Bitcoin has no physical form,
you don’t have to stash it somewhere unsafe—
like a mattress or, in Venezuela’s case, a bank. Of course,
Bitcoin doesn’t have a stable value, either. But
while the bolivar has nose-dived, the value of a Bitcoin is at
least trending ever upward. In a country where
inflation is expected to exceed 2,300 percent in 2018 (according
to the International Monetary Fund), it
seems like a reasonable risk to take.
Zimbabweans have the opposite problem. After ditching its own
currency for the U.S. dollar, the country
now relies on currency imports to run its economy—and it’s
facing a shortage. Bitcoin is now common
35. enough that it’s even accepted by car dealers.
2 WHERE DOES THE VALUE OF A CRYPTOCURRENCY
COME FROM?
Some experts say that a cryptocurrency like Bitcoin has value
because of its security (the Bitcoin blockchain
has never been hacked—yet) or its mathematically imposed
“scarcity” (a fixed supply of 21 million Bitcoins
means they can never be devalued by “printing more money”).
Others say that they have intrinsic value
because mining them is tedious work that makes the network
stronger—in other words, there’s value in ef
ort. But what about cryptocurrencies that aren’t mined?
According to Christian Catalini of the Massachusetts
Institute of Technology, “value comes from consensus. We all
agree it has value.” In this sense,
cryptocurrencies may have more in common with social
networks than with central banks. “Money is a way
for society to keep track of checks and balances,” Catalini says.
“If cryptocurrencies end up being a better
way to track information,” their value is secured—whether they
represent a physical asset or just a number.
77% of the global financial services industry is expected to
adopt blockchain as part of a production system
or process by 2020, according to PwC.
SO, BITCOIN: THE FUTURE OR A FLASH IN THE PAN?
Bitcoin is the world’s most popular digital currency. But it’s
also wildly speculative, and many financial
experts point to its legendary volatility: the currency’s value
has risen more than 10-fold since 2016, but it
lost 40 percent of its value in a span of two weeks in September
2017—only to regain
36. (and surpass) it just as quickly. (Who knows what it will be by
the time you read this.) To others, the
network’s technical limitations—it is sluggish at handling
transactions—combined with its unsustainable
mining costs make it the equivalent of a financial time bomb.
“We don’t bet on Bit-coin,” says Charlie Morris,
chief investment officer of Next-Block Global, a firm that
invests in blockchain technology.
Bitcoin legitimized the basic economics of a global
cryptocurrency. But the next-largest “altcoin” may have
more staying power: Ether is less a cash like currency than a
“blockchain asset,” as Morris calls it, used to
power and secure the Ethereum network. Much like renting
virtual servers in Google’s “cloud,” developers
who want to create applications using Ethereum’s blockchain
must pay for access in tokens of Ether. The
more useful Ethereum becomes as a mainstream platform, the
more stable and valuable Ether becomes,
too. New currencies and platforms are very likely to emerge—
the race for prominence has only just begun.
ARE WE FACING THE END OF CASH?
It may seem that printed money is headed for the same fate as
newspapers. But experts say that cash is
far from dead. “We’re still using great piles of paper to pay for
things like international shipping of sea
containers,” says Vinay Gupta, CEO of Mattereum, a legal
services firm for smart contracts. “The system
is not so broken that people are willing to tear it up.” The
trouble with Bitcoin and Ether is that while they
can function as a store of value or unit of exchange, they’re not
accepted as legal tender in enough places
to compete with cash. In places such as Kenya, where few
37. people have traditional bank accounts and
“mobile money” services such as M-Pesa have made saving and
sending money by phone much easier
than exchanging physical cash, cryptocurrencies might seem
like a natural fit. But mining still requires a lot
of processing power—not a common resource in Africa, where
inexpensive feature phones outsell
smartphones and not many own PCs. The computations required
to secure blockchain transactions could,
in theory, happen on “your old Nokia SIM card,” Gupta says.
Still, cold, hard paper won’t soon disappear.
3. IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
Not quite, because the blockchain itself requires the Internet to
support and maintain its peer-to-peer
network. It’s also important to note that when people talk
informally about “the” blockchain, they’re almost
always referring to the specific system that Nakamoto
implemented to support Bit-coin. The Bitcoin
blockchain was the first distributed ledger system that didn’t
require a centralized server or organization to
support it. It’s still one of the biggest: as of November 2017 it
contains more than 130 gigabytes (140 billion
bytes) of information, and every new transaction increases its
size. But that’s still many orders of magnitude
smaller than the amount of data on the Internet, which is
estimated to be on the yottabyte scale (1024, or
septillions of bytes).
IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
IF CRYPTOCURRENCIES ARE DIGITAL, WHAT POWERS
38. THEM?
Just because cryptocurrencies have no physical attributes
doesn’t mean that there’s no cost to using them.
The intentionally effortful process by which new Bitcoins are
“mined”—how new transactions are added to
the ledger—requires that the entire P2P network cycle through a
mind-boggling number of random
computations to validate blockchain transactions. All of that
processing requires energy.
How much energy? Start with the amount of computation. In
late 2017 the Bitcoin network’s “hash rate”
was around 10 exahashes—that’s 10 million trillion
calculations—per second. Deriving a precise energy
estimate from that figure is impossible because the network,
being decentralized, can’t account for
individual nodes. But credible estimates peg the Bitcoin
network’s annual electricity consumption at around
27 terawatt-hours—roughly equivalent to that of Ireland. To put
that in perspective, producing a year’s worth
of Bitcoin alone requires the equivalent of burning about 11
million tons of coal, which pours nearly 29
million tons of carbon dioxide into the atmosphere. Fueling
Bitcoin by solar power would require harnessing
more than half of the entire U.S.’s annual utility-scale solar
capacity. Ethereum’s creator, Vitalik Buterin, is
currently transitioning the network’s blockchain to a different
validation mechanism called proof of stake,
which doesn’t rely on mining at all.
Bitcoin’s larger, more decentralized network is unlikely to make
a similar move anytime soon. But Vinay
Gupta, who designed Dubai’s blockchain strategy, believes that
the same greed that motivates miners to
turn kilowatts into cryptocurrency will ultimately spur them to
39. innovate their way out of this scalability
problem. Venture capitalist Charlie Morris thinks that as proof-
of-stake cryptocurrencies prove their mettle
in the market, “mining will become like a little blip in history,”
he says. “People will say, ‘Remember when
we all did that—wasn’t that ridiculous?’”
WHERE DOES MINING ACTUALLY OCCUR?
country is India, at
ent. Tip: Don’t try mining at home—alone. The task is
now dominated by giant mining pools akin to
the ones in China, so the chances of a solo node mining a block
today
is about one in eight million. Lone operators would spend far
more on energy bills than they’d get in profits.
Want to become a mining hobbyist? Join a public mining pool.
4. ARE BLOCKCHAINS EVEN LEGAL?
Yes. But their decentralized nature and association with
Bitcoin—which has been used in illegal
transactions such as drug and arms sales—can give blockchains
an “outlaw” reputation it doesn’t
necessarily deserve. Blockchains can be used for many different
purposes, good or ill, just like Facebook,
e-mail or any other Internet technology.
ARE BLOCKCHAINS EVEN LEGAL?
WHAT DOES THE PUBLIC THINK ABOUT BLOCKCHAIN?
40. illegal purchases or don’t know what they’re used
for at all, according to a 2017 YouGov survey.
they had never heard of blockchain
technology; 80 percent of those who had heard of the
technology still don’t understand what it is.
they had little or no knowledge about
blockchain technology, according to a 2017 Deloitte survey.
HOW WILL THIS TECHNOLOGY BE USED IN THE
FUTURE?
Anyone building on blockchain technology is, by definition, a
futurist. Once distributed ledger technology
gets out of its training-wheels phase, what might we create with
it?
SELF-DRIVING, SELF-OWNING CARS: Instead of driving for
Uber, your car would drive itself while you
work or sleep. Blockchain-backed smart contracts could remove
middlemen like Uber and Lyft from the car-
sharing equation by automating their two basic functions—
matching cars with riders and facilitating
payments. You could also own “shares” of a car represented by
cryptocurrency tokens.
PORTABLE MEDICAL DATA: The same technology that
allows two people to exchange units of Bitcoin
without necessarily trusting each other could also vouchsafe
medical information, putting control firmly in
the hands of patients, says Brian Behlendorf, executive director
of the Linux Foundation’s Hyperledger
project, a tool kit for building blockchain applications. Patients
41. would receive a “‘health wallet” with their
data and histories. A doctor could go to a ledger and request
your blood type, generating an access request
on the user’s phone. “You get an audit trail of who you shared
that data with and the option to delete it when
the treatment is over,” Behlendorf says.
A GLOBAL SUPERCOMPUTER: Linking your devices to
thousands of others in a P2P network—and using
a blockchain to pay you for their use—would create a financial
incentive to support a worldwide,
decentralized supercomputer. While you sleep, your laptop and
phone could be rented by scientists who
want to run models, for example. A project called Golem is
already working on it. “The number of idle
laptops is so much larger than the computing power of the data
centers,” Gupta says. “Artificial intelligence,
climate modeling—all of that stuff could be accelerated 1,000-
fold.”
WHAT ARE THE LIMITATIONS AND DANGERS OF
BLOCKCHAIN?
“Blockchains provide a substrate that, if certain assumptions are
held to, is very difficult to modify ex post
facto,” says Cornell blockchain researcher Emin Gün Sirer. “But
that doesn’t mean that everything recorded
to a blockchain is true or desirable. If I get hacked and someone
steals my cryptocoins and tries to use
them, I would very much like to undo that transaction. That’s
where immutability becomes a liability.” It’s
also easy to confuse a blockchain’s theoretical immutability
with actual data security: public blockchains
like Ethereum and Bitcoin don’t actually encrypt any
information. The Linux Foundation’s Brian Behlendorf
goes one step further: “The ledger should never be used to store
42. personal data or anything sensitive, not
even in encrypted form,” he says, “because we know that no
matter what we encrypt today, probably in 40
or 50 years we’ll be able to decrypt it” with more advanced
technology. Some advocates speak of blockchain
as a panacea for any social problem involving trust, but that’s
blindly optimistic. For more on the limitations
of blockchain as a societal savior, see page 38.
5. HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
Because they’re ultimately nothing but software, the
trustworthiness of a cryptocurrency “comes from the
code base,” says M.I.T. researcher Catalini. Anyone can gin up
a cryptocoin and raise funds by selling it
through an initial coin offering—even Paris Hilton did it,
lending her name to promote an obscure token. But
it’s no coincidence that the two most popular cryptocurrencies,
Bitcoin and Ether, were engineered by
computer-programming savants. That said, even coins with
impressive technical bona fides can be risky.
The DAO—a “decentralized autonomous organization” running
on Ethereum that raised over $100 million
in 2016—“had a bug” (in Catalini’s understated terms) that
allowed hackers to make of with $50 million
worth of Ether.
HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
HOW DO YOU REGULATE A DECENTRALIZED SYSTEM?
43. Given the Wild West reputations of decentralized digital
currencies, it’s easy to assume that they were
created to dismantle or avoid financial regulation. But that’s not
quite accurate. Bitcoin is full of regulations,
after all—they’re just defined and enforced by source code (and
the collective activity of its P2P network)
rather than by governments or financial institutions. “The whole
innovation about Bitcoin is in eschewing
social governance of record keeping,” says Patrick Murck, a
lawyer who researches blockchain policy and
regulation at Harvard University’s Berkman Klein Center for
Internet and Society. Ethereum’s stated purpose—to support the
deployment of autonomous smart
contracts—is essentially regulatory. A blockchain is arguably
nothing but regulation: a mathematically
enforced system of rules about what can and cannot be done
with records in a database.
What always matters about financial regulation, decentralized
or not, is who gets to do the regulating and
how. “If you have a system that’s decentralized, there’s
nowhere to attach regulation—but wherever that
system gets reinter mediated [by third parties], regulation will
follow,” Murck says. In 2013 China banned
cryptocurrencies from its banking system, and last September it
ordered all domestic Bitcoin exchanges to
shut down. The U.S. and Japan are moving to regulate
cryptocurrency exchanges and “initial coin offerings”
with the same vigilance they apply to stock trading and
investment banking.
One future application of blockchain technology is in securing
digital identity records, and according to
venture capitalist Charlie Morris, new cryptocurrencies may
emerge that marry identity data with financial
44. information. They wouldn’t have the anonymity of Bitcoin
(Morris estimates the number of Bitcoin holders
who pay honest taxes on them to be mere hundreds). But as
digital money goes mainstream, the trade-off
in perceived security and stability may make oversight
tolerable—or even desirable. Says Murck: “If I’m
trusting you with some property to hold on my behalf and
transact with it—whether it’s Bitcoin or Beanie
Babies—then you’re either regulated or about to be regulated.”
CAN BLOCKCHAINS FAIL?
To date, the Bitcoin blockchain—the world’s first and at present
its largest and most widely used—has
never been compromised or hacked. But that doesn’t mean that
every blockchain is invulnerable by
definition. “There’s no such thing as a perfect technology,” says
Cornell’s Gün Sirer, co-director of the
Initiative for Cryptocurrencies and Contracts. Here are three
gaps in a blockchain’s armor:
51% ATTACK: Blockchain-backed cryptocurrency networks
rely on two bottomless resources for security:
the speed and greed of their miners. But it’s theoretically
possible to overpower both. To subvert the
blockchain’s consensus mechanism, hackers would need to gain
control over a majority of nodes in the
network. This would give them the power to control how and
which blocks get mined. They could reverse
new transactions, allowing them to double spend digital
currency. Or they could prevent other people’s
transactions from being validated. Bitcoin’s P2P network, with
thousands of nodes worldwide, seems
unlikely to fall prey to such an attack. But smaller “altcoins”
are at risk: one called Krypton was hit in 2016
by a group called the 51 crew. Even blockchains that don’t use
45. mining are vulnerable because they still rely
on an “assumption that a majority of nodes in their network are
benign,” Gün Sirer warns.
GOOD OLD-FASHIONED HUMAN ERROR: It may take the
computing equivalent of moving mountains to
compromise the blockchain itself. But anything built on it or
attached to it is just as vulnerable as it is now.
Mt. Gox, a Bitcoin currency exchange (that is, an intermediary
that lets people convert traditional
currencies—like dollars—into Bitcoin) plagued by
mismanagement and faulty code, lost 850,000 Bitcoins
(worth $620 million at the time) in 2014. Ultimately
blockchains are just distributed ledgers with no help
desk—so if you have a digital wallet full of cryptocurrency and
you lose the password, that money is almost
certainly gone. There is rich irony in the fact that some
cryptocurrency users keep a hard copy of their pass
codes (or even the currency itself, stored on a USB drive) in a
safety deposit box at the bank—a practice
known as cold storage.
“BLOCKCHAIN BLOAT”: This is less of a vulnerability than a
natural consequence of blockchains working
too well. Because every new block essentially revalidates every
block before it that means every node
performing the validation needs a copy of the latest version of
the entire chain to deal with every new
transaction. At more than 130 gigabytes and growing, the
Bitcoin blockchain is already getting unwieldy.
Ethereum’s ledger, designed to be more flexible (so that it can
act as a platform for more sophisticated
trans actions such as smart contracts), is already bigger than
46. Bitcoin’s—if everyone were to start using it,
would only high-performance supercomputers be able to handle
the load? That could effectively
decentralize the network, defeating the purpose of the
distributed ledger in the first place.