The document provides an overview of the EOS blockchain, including what EOS is, why it was created, its key features and architecture. Some of the main points covered include:
- EOS aims to be a decentralized operating system that can support industrial-scale decentralized applications. It has its own cryptocurrency called EOS and claims to remove transaction fees, conduct millions of transactions per second, and have good governance.
- EOS uses delegated proof-of-stake consensus where block producers are elected by token holders and produce blocks in rounds. The top 21 voted producers in each round validate transactions and update the blockchain.
- The document discusses EOS's scalability, flexibility, usability, governance
This document provides an overview of digital electronics and basic digital logic gates. It discusses how digital computers store data in binary format using logic 0 and 1. There are two main types of logic blocks: combinational logic blocks whose output depends only on the current inputs, and sequential logic blocks whose output depends on the current inputs and previous state. Common basic logic gates like AND, OR, and NOT are described along with more useful gates like NAND and NOR. Combinational circuits like half adders, full adders, multiplexers, decoders, and comparators are explained at a high level.
Ethereum is a decentralized platform that runs smart contracts and distributed applications. It provides a programmable blockchain that anyone can use. Ethereum launched in 2015 and enables peer-to-peer transactions through digital tokens called Ether. Unlike Bitcoin, Ethereum supports smart contracts and distributed applications through an Ethereum Virtual Machine. Common tools for developing on Ethereum include Solidity for writing smart contracts, Geth and Parity for running nodes, and Metamask for interacting with dApps. Tokens on Ethereum can represent various assets and functions like currencies, shares, voting rights, and access to services.
Overview of what is Bitcoin, Ethereum, Smart Contract and Blockchain.
First explained what is Bitcoin and its entities involved. Then Ethereum and what is called Blockchain.
Examples of the existing platforms those are using Ethereum.
New to Corda and blockchain development? Join us for a live interactive session where we will introduce Corda, an open-source blockchain platform built for business applications.
Blockchain technology has the potential to disrupt how businesses transact. Corda is a next-gen platform that solves the key challenges of privacy and finality found in early blockchain platforms. Join us to learn how you can leverage Corda to develop powerful, distributed applications that allow direct transfer of value between organizations.
Bitcoin is a decentralized digital currency that uses cryptography to secure transactions. It allows for peer-to-peer transactions without intermediaries like banks. Transactions are recorded on a public ledger called the blockchain, which uses mining and proof-of-work to validate transactions and create new blocks. Miners are incentivized by new bitcoins and transaction fees to devote resources to processing transactions and maintaining the blockchain. While it enables censorship-resistant transactions, bitcoin is not legal tender and faces risks from volatility, acceptance, and illicit use.
Ethereum is an open-source blockchain platform that enables developers to build decentralized applications and smart contracts. It differs from Bitcoin in that it allows developers to build applications on top of its blockchain using its token Ether. Smart contracts on Ethereum use "gas" paid in Ether to execute transactions and are programs that automatically execute the terms of a contract. While smart contracts provide benefits like security, standardization and reducing the need for third parties, they also have disadvantages like being vulnerable to human error in coding and having an uncertain legal status.
Ethereum Blockchain with Smart contract and ERC20Truong Nguyen
This document discusses blockchain technology, Ethereum, and smart contracts. It begins with an overview of blockchain and how it works using blocks, transactions, and miners to validate transactions. It then discusses Ethereum, describing it as an open blockchain platform that allows anyone to build decentralized applications and smart contracts using its Ethereum Virtual Machine. It explains what smart contracts are and how they work using code on the blockchain to automatically execute agreed upon terms. Finally, it discusses ERC20, which defines a standard for Ethereum tokens, and sidechains, which are separate blockchains attached to parent blockchains to provide enhancements like security and performance.
The document describes a Universal Asynchronous Receiver/Transmitter (UART) and its functions. A UART is used for asynchronous serial communication between devices when high speed is not required and a cheap communication line is needed. It serializes parallel data for transmission and de-serializes received serial data. A UART was commonly used in personal computers, modems, and terminals to connect to other devices and networks. While newer interfaces have replaced UARTs, they are still used when simple low-speed communication is necessary. The document explains UART components like the transmitter, shift register, timing generator, and parity generator. It provides examples of UART transmission and reception timing.
This document provides an overview of digital electronics and basic digital logic gates. It discusses how digital computers store data in binary format using logic 0 and 1. There are two main types of logic blocks: combinational logic blocks whose output depends only on the current inputs, and sequential logic blocks whose output depends on the current inputs and previous state. Common basic logic gates like AND, OR, and NOT are described along with more useful gates like NAND and NOR. Combinational circuits like half adders, full adders, multiplexers, decoders, and comparators are explained at a high level.
Ethereum is a decentralized platform that runs smart contracts and distributed applications. It provides a programmable blockchain that anyone can use. Ethereum launched in 2015 and enables peer-to-peer transactions through digital tokens called Ether. Unlike Bitcoin, Ethereum supports smart contracts and distributed applications through an Ethereum Virtual Machine. Common tools for developing on Ethereum include Solidity for writing smart contracts, Geth and Parity for running nodes, and Metamask for interacting with dApps. Tokens on Ethereum can represent various assets and functions like currencies, shares, voting rights, and access to services.
Overview of what is Bitcoin, Ethereum, Smart Contract and Blockchain.
First explained what is Bitcoin and its entities involved. Then Ethereum and what is called Blockchain.
Examples of the existing platforms those are using Ethereum.
New to Corda and blockchain development? Join us for a live interactive session where we will introduce Corda, an open-source blockchain platform built for business applications.
Blockchain technology has the potential to disrupt how businesses transact. Corda is a next-gen platform that solves the key challenges of privacy and finality found in early blockchain platforms. Join us to learn how you can leverage Corda to develop powerful, distributed applications that allow direct transfer of value between organizations.
Bitcoin is a decentralized digital currency that uses cryptography to secure transactions. It allows for peer-to-peer transactions without intermediaries like banks. Transactions are recorded on a public ledger called the blockchain, which uses mining and proof-of-work to validate transactions and create new blocks. Miners are incentivized by new bitcoins and transaction fees to devote resources to processing transactions and maintaining the blockchain. While it enables censorship-resistant transactions, bitcoin is not legal tender and faces risks from volatility, acceptance, and illicit use.
Ethereum is an open-source blockchain platform that enables developers to build decentralized applications and smart contracts. It differs from Bitcoin in that it allows developers to build applications on top of its blockchain using its token Ether. Smart contracts on Ethereum use "gas" paid in Ether to execute transactions and are programs that automatically execute the terms of a contract. While smart contracts provide benefits like security, standardization and reducing the need for third parties, they also have disadvantages like being vulnerable to human error in coding and having an uncertain legal status.
Ethereum Blockchain with Smart contract and ERC20Truong Nguyen
This document discusses blockchain technology, Ethereum, and smart contracts. It begins with an overview of blockchain and how it works using blocks, transactions, and miners to validate transactions. It then discusses Ethereum, describing it as an open blockchain platform that allows anyone to build decentralized applications and smart contracts using its Ethereum Virtual Machine. It explains what smart contracts are and how they work using code on the blockchain to automatically execute agreed upon terms. Finally, it discusses ERC20, which defines a standard for Ethereum tokens, and sidechains, which are separate blockchains attached to parent blockchains to provide enhancements like security and performance.
The document describes a Universal Asynchronous Receiver/Transmitter (UART) and its functions. A UART is used for asynchronous serial communication between devices when high speed is not required and a cheap communication line is needed. It serializes parallel data for transmission and de-serializes received serial data. A UART was commonly used in personal computers, modems, and terminals to connect to other devices and networks. While newer interfaces have replaced UARTs, they are still used when simple low-speed communication is necessary. The document explains UART components like the transmitter, shift register, timing generator, and parity generator. It provides examples of UART transmission and reception timing.
Blockchain and cryptocurrencies are emerging technologies that are still not fully understood. There are differing views on their value. Blockchain is a distributed digital ledger of transactions that is replicated across multiple computers. Cryptocurrencies like Bitcoin use blockchain technology, and their value comes from factors like production costs, scarcity, and utility. Ethereum enables decentralized applications and smart contracts through its cryptocurrency Ether. Altcoins have proliferated since Bitcoin, with some gaining significant value through network effects. Initial coin offerings have also raised billions for new blockchain projects.
Ripple’s distributed financial technology allows for banks around the world to directly transact with each other without the need for a central counterparty or correspondent.
This document discusses the 51% attack on blockchains. It begins with a recap of how blockchains work, using Bitcoin as an example, explaining how transactions are ordered into blocks. It then explains that if a single miner or mining pool controlled over 51% of the computing power, they could perform a double spend attack by overriding the transaction ordering on the blockchain. However, the document argues that launching a 51% attack would be prohibitively expensive due to the computing power and infrastructure required. It claims it would not be profitable for an attacker to maintain over 51% of the hash power long enough to override the legitimate blockchain.
ERC20 is a #software or #code. It is a standard protocol just like #HTTP. It regulates the tokenization and ensures that the technical specification of the tokens is meet. If a token doesn’t meet regularity, it won’t be called #ERC20token. If it does, it can be termed as “ERC20 token.” https://www.developcoins.com/what-is-ethereum-token
This presentation shows the evolution of blockchain implementations from simple financial transactions to complex computer programs (i.e. Smart Contracts)
Ethereum at its simplest, is an open software platform based on blockchain technology
Ethereum allows developers to build and deploy decentralized applications.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
The document summarizes a class on cryptocurrency and Bitcoin script. It discusses generating Bitcoin addresses through hashing public keys, describes the Bitcoin script language as a stack-based language similar to JVML used to write programs in transactions. It also notes that while Bitcoin script has limitations, altcoins are taking different approaches to scripting languages. Finally, it reminds students that project 2 is due Friday and the next class will feature a guest lecture from Tom Dukes on cyberlaw.
This document provides an overview of the Ethereum blockchain platform and smart contracts. It discusses what Ethereum is, how it works, and its key components. The document covers Ethereum wallets, transactions, tokens, and the Solidity programming language for building smart contracts. It provides information on running Ethereum nodes, clients, and testnets. The document serves as training material for a blockchain specialist program.
The document provides guidelines for writing SystemVerilog code, including:
- Use descriptive names, consistent formatting, and comments to document code clearly.
- Structure code into classes that encapsulate related functionality and name classes after their purpose.
- Declare private class members with m_ prefix and define class methods externally.
- Organize files into directories based on functionality for better maintenance of code.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
Overview and clarification of blockchain on following respects: what blockchain is, when it appeared, how it works, who designed/develops it, what it can achieve?
Author : Dr Christian Cachin, IBM
The document provides an overview of the UVM configuration database and how it is used to store and access configuration data throughout the verification environment hierarchy. Key points include: the configuration database mirrors the testbench topology; it uses a string-based key system to store and retrieve entries in a hierarchical and scope-controlled manner; and the automatic configuration process retrieves entries during the build phase and configures component fields.
The document discusses the history and applications of blockchain technology and cryptocurrencies like Bitcoin. It provides statistics on search interest in Bitcoin and the number of cryptocurrencies. Blockchain allows for decentralized, secure transaction records maintained on distributed ledgers without intermediaries. Potential applications include financial settlement, digital art ownership, and supply chain management. It also discusses industry consortiums working on blockchain standards and predictions that blockchain will disrupt banking by 2035.
Semiconductor memory can be categorized based on attributes like read/write ability, storage permanence, and volatility. Common types include RAM, ROM, EEPROM, and flash memory. RAM is read/write and volatile, requiring power to maintain data. ROM is read-only and non-volatile, with data stored permanently. EEPROM and flash memory are read/write, non-volatile memories that retain data when powered off but with slower write speeds than RAM. Memory devices use architectures like rows and columns with decoders to access individual memory cells.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
Complete guide to Ripple XRPs. Everything you want to know about Ripple XRPs is here. This emerging digital currency seems to be promising and can attract lots of users to enjoy reliable and safe trading. Get ready to “Send money to anyone, anywhere and in any currency.”Ripple is all set to please you.
2019 2 testing and verification of vlsi design_verificationUsha Mehta
This document provides an introduction to verification of VLSI designs and functional verification. It discusses sources of errors in specifications and implementations, ways to reduce human errors through automation and mistake-proofing techniques. It also covers the reconvergence model of verification, different verification methods like simulation, formal verification and techniques like equivalence checking and model checking. The document then discusses verification flows, test benches, different types of test cases and limitations of functional verification.
Basics you need to know about Solidity and how it works. Learn the simple way of building a smart contract in Solidity. Tools that can be used with Solidity.
Blockchain and cryptocurrencies are emerging technologies that are still not fully understood. There are differing views on their value. Blockchain is a distributed digital ledger of transactions that is replicated across multiple computers. Cryptocurrencies like Bitcoin use blockchain technology, and their value comes from factors like production costs, scarcity, and utility. Ethereum enables decentralized applications and smart contracts through its cryptocurrency Ether. Altcoins have proliferated since Bitcoin, with some gaining significant value through network effects. Initial coin offerings have also raised billions for new blockchain projects.
Ripple’s distributed financial technology allows for banks around the world to directly transact with each other without the need for a central counterparty or correspondent.
This document discusses the 51% attack on blockchains. It begins with a recap of how blockchains work, using Bitcoin as an example, explaining how transactions are ordered into blocks. It then explains that if a single miner or mining pool controlled over 51% of the computing power, they could perform a double spend attack by overriding the transaction ordering on the blockchain. However, the document argues that launching a 51% attack would be prohibitively expensive due to the computing power and infrastructure required. It claims it would not be profitable for an attacker to maintain over 51% of the hash power long enough to override the legitimate blockchain.
ERC20 is a #software or #code. It is a standard protocol just like #HTTP. It regulates the tokenization and ensures that the technical specification of the tokens is meet. If a token doesn’t meet regularity, it won’t be called #ERC20token. If it does, it can be termed as “ERC20 token.” https://www.developcoins.com/what-is-ethereum-token
This presentation shows the evolution of blockchain implementations from simple financial transactions to complex computer programs (i.e. Smart Contracts)
Ethereum at its simplest, is an open software platform based on blockchain technology
Ethereum allows developers to build and deploy decentralized applications.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
The document summarizes a class on cryptocurrency and Bitcoin script. It discusses generating Bitcoin addresses through hashing public keys, describes the Bitcoin script language as a stack-based language similar to JVML used to write programs in transactions. It also notes that while Bitcoin script has limitations, altcoins are taking different approaches to scripting languages. Finally, it reminds students that project 2 is due Friday and the next class will feature a guest lecture from Tom Dukes on cyberlaw.
This document provides an overview of the Ethereum blockchain platform and smart contracts. It discusses what Ethereum is, how it works, and its key components. The document covers Ethereum wallets, transactions, tokens, and the Solidity programming language for building smart contracts. It provides information on running Ethereum nodes, clients, and testnets. The document serves as training material for a blockchain specialist program.
The document provides guidelines for writing SystemVerilog code, including:
- Use descriptive names, consistent formatting, and comments to document code clearly.
- Structure code into classes that encapsulate related functionality and name classes after their purpose.
- Declare private class members with m_ prefix and define class methods externally.
- Organize files into directories based on functionality for better maintenance of code.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
Overview and clarification of blockchain on following respects: what blockchain is, when it appeared, how it works, who designed/develops it, what it can achieve?
Author : Dr Christian Cachin, IBM
The document provides an overview of the UVM configuration database and how it is used to store and access configuration data throughout the verification environment hierarchy. Key points include: the configuration database mirrors the testbench topology; it uses a string-based key system to store and retrieve entries in a hierarchical and scope-controlled manner; and the automatic configuration process retrieves entries during the build phase and configures component fields.
The document discusses the history and applications of blockchain technology and cryptocurrencies like Bitcoin. It provides statistics on search interest in Bitcoin and the number of cryptocurrencies. Blockchain allows for decentralized, secure transaction records maintained on distributed ledgers without intermediaries. Potential applications include financial settlement, digital art ownership, and supply chain management. It also discusses industry consortiums working on blockchain standards and predictions that blockchain will disrupt banking by 2035.
Semiconductor memory can be categorized based on attributes like read/write ability, storage permanence, and volatility. Common types include RAM, ROM, EEPROM, and flash memory. RAM is read/write and volatile, requiring power to maintain data. ROM is read-only and non-volatile, with data stored permanently. EEPROM and flash memory are read/write, non-volatile memories that retain data when powered off but with slower write speeds than RAM. Memory devices use architectures like rows and columns with decoders to access individual memory cells.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
Complete guide to Ripple XRPs. Everything you want to know about Ripple XRPs is here. This emerging digital currency seems to be promising and can attract lots of users to enjoy reliable and safe trading. Get ready to “Send money to anyone, anywhere and in any currency.”Ripple is all set to please you.
2019 2 testing and verification of vlsi design_verificationUsha Mehta
This document provides an introduction to verification of VLSI designs and functional verification. It discusses sources of errors in specifications and implementations, ways to reduce human errors through automation and mistake-proofing techniques. It also covers the reconvergence model of verification, different verification methods like simulation, formal verification and techniques like equivalence checking and model checking. The document then discusses verification flows, test benches, different types of test cases and limitations of functional verification.
Basics you need to know about Solidity and how it works. Learn the simple way of building a smart contract in Solidity. Tools that can be used with Solidity.
This document provides an introduction to blockchain technology. It discusses centralized vs decentralized systems, highlighting disadvantages of centralization like single points of failure. It introduces distributed ledger technologies which have no single source of truth and establish consensus through algorithms. It describes the proof of work consensus algorithm and concepts like difficulty and target. It also discusses attacks like 51% attacks and alternatives to proof of work. Finally, it briefly introduces applications of blockchain technology like Ethereum.
Blockchain is a decentralized approach to solving the double spend problem of digital currencies without a central authority. It uses a distributed ledger maintained on many computers to record transactions in blocks linked through cryptography. This allows participants to verify transactions without trusting a central party. Blockchain addresses issues like single points of failure, censorship, and high fees by achieving consensus across a peer-to-peer network through proof of work and an incentive for honest participation in maintaining the ledger. Potential applications include cryptocurrencies like Bitcoin and programmable platforms for smart contracts.
Fundametals of Blockchain and basics_L1.pptxmeena466141
This document discusses different blockchain consensus algorithms including Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS). PoW uses solving complex puzzles to select miners, while PoS selects validators based on their economic stake without expensive hardware. DPoS relies on delegation of votes to determine block miners who then distribute rewards to delegators. The consensus algorithms aim to reach agreement on the state of the distributed ledger across all nodes in a decentralized manner.
This document discusses blockchain technology, including what blockchain is, how it works, types of blockchain networks, applications of blockchain, advantages and disadvantages. Blockchain is a distributed digital ledger that records transactions in blocks that are linked using cryptography. It allows for transactions to be recorded and distributed without a central authority. Consensus algorithms like proof of work are used to validate transactions and add new blocks to the blockchain. Blockchain has applications in financial transactions, asset tracking, data storage and decentralized applications. Its advantages include transparency, security and cost reduction. However, it also faces challenges related to speed and implementation costs.
The document discusses the architecture of blockchain technology. It describes how blockchain stores transaction data in blocks that are linked together in a chain. It then explains some key components of blockchain architecture, including transactions, blocks, peer-to-peer networks, and consensus algorithms. Transactions bundle sender/receiver addresses and values, blocks contain bundled transactions and metadata, peer-to-peer networks allow decentralized replication of the blockchain across nodes, and consensus algorithms like proof-of-work ensure consistency across copies of the ledger. Examples of blockchain projects like Bitcoin, Ethereum and Hyperledger are also summarized.
The document discusses how Algorand addresses the blockchain trilemma of achieving scalability, decentralization, and security simultaneously without compromising on any factor. It explains how proof-of-work blockchains like Bitcoin face centralization issues over time as mining becomes concentrated, and how proof-of-stake blockchains can also centralize if stakeholders pool their funds. Algorand uses a pure proof-of-stake protocol with random selection of block proposers and committees to achieve true decentralization. Its protocol allows for fast consensus, low computation needs, and scalability to many users through independent, concurrent lotteries and short confirmation messages.
Introduction to Blockchain
History of Blockchain
How Blockchain works
Blockchain platforms
Blockchain consensus/validation algorithms
Proof-of-work algorithm (PoW)
Practical byzantine fault tolerance algorithm (PBFT)
Proof-of-stake algorithm (PoS)
Delegated proof-of-stake algorithm (DPoS)
Who uses blockchain
Advantages and disadvantages of blockchain
different consensus protocols in blockchian.pptxmeena466141
The document discusses various consensus mechanisms used in blockchain networks. It describes Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), Practical Byzantine Fault Tolerance (pBFT), Proof of Weight (PoWeight), Proof of Capacity (PoC), Proof of Authority (PoA), and Proof of Importance (PoI). For each mechanism it provides details on how it works and its advantages and disadvantages.
New Microsoft PowerPoint Presentation.pptxmeena466141
The document discusses different types of blockchain technology. It begins by defining blockchain and platforms. It then outlines the evolution from the first public blockchain with Bitcoin to different types now. Public blockchains allow anyone to join and transact but have issues with speed and scalability. Private blockchains are permissioned and controlled by an entity, making them suitable for internal company use cases. The document provides details on public and private blockchains, their advantages, disadvantages, and examples.
Bitcoin is a digital currency that uses blockchain technology to function as a decentralized peer-to-peer network without government control. It was created in 2009 by an anonymous founder known as Satoshi Nakamoto and uses cryptography and proof of work to validate transactions. Transactions are grouped into blocks and added to the blockchain through mining, where miners use computing power to solve cryptographic puzzles and are rewarded with new bitcoins. The blockchain serves to order and verify transactions through mathematical linking of blocks to prevent double spending. As more blocks are added, the blockchain record of transactions becomes more secure.
- Exonum is an open source framework for private blockchains that provides high security and high performance. It includes tools for development and enables smart contract functionality.
- Exonum uses a Byzantine Fault Tolerant consensus algorithm that can achieve 5,000 transactions per second with 0.5 second latency. It also anchors to the Bitcoin blockchain to increase security.
- Exonum provides a light client software library that allows for auditability, transparency and proof verification for clients.
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
A blockchain is a general digital ledger of transactions that are executed on the network, e.g. using Bitcoin to buy a cup of coffee is a transaction.
All users of the network, ‘Nodes’, have a copy of the transaction records and can access them freely, a role previously played by centralized institutions. Therefore, the blockchain network is ‘decentralized’.
Blockchain & Cryptocurrencies Intro - July 2017🔗Audrey Chaing
An overview of blockchain, cryptocurrencies, Bitcoin, Ethereum, ICOs. Meant to be introductory level but provide a slightly higher level of detail. Includes some companies to watch in the blockchain space. Prepared before the August 1 fork, which did occur.
The future of ICOs - Thoughts after beeing back from #DEVCON3Vidal Chriqui
- ICOs will continue but may raise less money as investors become more sophisticated
- Ethereum developers are concerned about too many focus on ICOs instead of protocol upgrades
- Future tokens will be classified based on their use as currency substitutes or investments backed by an issuer
- Standards like ERC-223 and contracts like MiniMe could become more common as they provide more flexibility than ERC-20
- Interactive coin offerings may help set market prices rather than arbitrary valuations
- Upgradable smart contracts are needed to fix bugs and add features based on user feedback
The document outlines Ergo, a new cryptocurrency platform focused on decentralization and long-term survivability. Key points include:
- Ergo aims to improve on existing blockchains by focusing on decentralization without sacrificing capabilities like smart contracts.
- It uses a novel proof-of-work algorithm called Autolykos that requires memory rather than specialized hardware, and supports light clients.
- Ergo also includes a demurrage component where users pay miners storage fees over time to discourage hoarding and fund the network.
- The platform aims to have flexible governance via a voting system to allow protocol updates over time while avoiding centralized control.
Presentation to a local meetup group interested in blockchain in Guangzhou, China on latest trends happening with DeFi, NFT, and other cryptocurrency projects in China
1) The document describes a decentralized application (dApp) that aims to securely store vehicle details on the blockchain to address issues like tampering of registration details and creation of fake identity cards.
2) Current vehicle data storage in centralized servers is hackable and vulnerable, while a blockchain provides a permanent, decentralized, and secure way to store and retrieve vehicle details.
3) The dApp pushes vehicle details like VIN, model, plate number, owner onto the Ethereum blockchain using smart contracts, and retrieves the data to a dashboard using tools like web3.js and Metamask. This resolves issues around trusting third parties and identifies smuggled vehicles.
This document proposes storing weather report data on the blockchain to improve weather prediction accuracy. It identifies issues with existing weather data systems such as data being manually collected and potentially tampered. The proposed solution involves using IoT sensors to automatically collect temperature and humidity data, storing it on the blockchain to make it trusted and immutable, which could then be used to enhance prediction algorithms. The document outlines the technical approach involving sensors, cloud services, smart contracts, and blockchain storage. An initial proof of concept collecting and storing weather data this way was implemented successfully.
The document discusses efficient smart contract design for blockchains. It begins with an introduction to blockchains and smart contracts. It then describes the current Ethereum blockchain design, which executes smart contract transactions sequentially. This results in poor throughput due to underutilization of multi-core processors. The document proposes a new concurrent methodology using software transactional memory systems to allow miners to execute smart contract transactions concurrently. This aims to improve efficiency and throughput. However, concurrent execution presents challenges such as identifying and resolving data conflicts between transactions. The document discusses protocols to enable concurrent transaction execution while maintaining equivalent results to the serial execution model.
This document discusses blockchain technology and Ethereum. It provides an overview of basic blockchain features like decentralization and cryptography. It describes how Ethereum uses smart contracts and the Solidity programming language. It also discusses Ethereum test networks for development versus the main network. The document outlines how decentralized applications are built using smart contracts, databases, front-end frameworks, and tools like Truffle. It provides details on the author's work with crypto currencies, initial coin offerings, and smart contract testing. Finally, it proposes ideas for blockchain applications to reduce corruption and monitor vehicle performance.
The document proposes using blockchain technology to monitor factories and industries for illegally disposing of waste. Smart devices would collect data on air quality and waste levels, which would be stored decentralized on the blockchain. A smart contract would then record the data permanently on the blockchain, preventing tampering. This ensures factories and industries comply with waste disposal limits set by the government.
This document proposes using blockchain technology to monitor factories and industries by recording their hazardous waste disposal measurements immutably on a distributed ledger. Blockchain provides a permanent, decentralized, and cryptographically secure record that cannot be tampered with. Smart contracts would collect data from sensors, store it decentralizedly, then push the measurements to the blockchain, enforcing compliance by making waste disposal amounts transparent and immutable. This ensures factories follow limits and prevents illegal tampering of waste disposal records.
The document discusses blockchain technology and related concepts. It explains the double spending problem and how miners validate transactions in bitcoin to prevent double spending. It also describes cryptographic hash functions, digital signatures, the mining process, proof-of-work, blockchain types including public, private and consortium models, consensus, and smart contracts.
The document discusses block chain technology and its applications. It begins with an overview of bitcoin and how blockchains work, then discusses how bitcoin is obtained through mining. It describes how blockchains provide a secure and distributed ledger to record transactions. The document proposes a project using blockchain technology to record and secure funding distributions for an open defecation free survey in India in order to reduce corruption. In the proposed system, funds would be tracked in a distributed ledger from the original budget amount down to individual recipients.
This document proposes using blockchain technology to address issues with fake driving licenses and vehicle smuggling through centralized databases. It outlines developing a decentralized system using smart contracts and distributed ledgers to securely store identity and vehicle registration data in a tamper-proof manner. The document discusses analyzing existing centralized systems, developing a blockchain solution, deploying a smart contract on the Ropsten test network, and potential future applications like integrating the system with transportation companies.
Ethereum is a decentralized platform that runs smart contracts. It uses a blockchain and cryptocurrency called Ether. Smart contracts are programs that run exactly as programmed without downtime, censorship, fraud or third party interference. They are written in Solidity and run on the Ethereum Virtual Machine. Remix is an IDE used to write, deploy and test smart contracts. It provides different environments like JavaScript VM, injected web3 and web3 provider to interact with local or remote Ethereum networks.
The document discusses the deep web and dark web. The deep web refers to parts of the world wide web that are not indexed by traditional search engines. It is estimated to be 500 times larger than the surface web. The dark web is a part of the deep web that allows for anonymous communication and is used for both legal and illegal activities due to its anonymity. Some illegal activities include buying drugs and weapons. The Tor project is commonly used to access the dark web anonymously.
Decentralization of internet of things with blockchain architectureV C
This document proposes decentralizing the Internet of Things using blockchain architecture. It discusses challenges like storing IoT device data and linking communications between devices. The authors propose sending data directly from IoT devices to APIs and then to smart contracts using Oraclize, allowing the smart contracts to store the data on the blockchain. Potential applications include using IoT sensors to monitor pollution levels and track vehicle locations to combat theft. Future work involves practical experiments, applying the approaches to more major applications, and further integrating IoT and blockchain.
This document presents a project to create a reliable crop information system for farmers. It aims to develop a model to increase crop production and an application for farmers to predict the best seasonal and yearly crops, provide historical crop data, and details on seeds and pesticides for predicted crops. The project uses linear regression algorithms and input labels like rainfall, season, soil type, and production data to predict the best yielding crop as the output. It describes a working mobile application model that takes location and soil data from farmers to provide personalized best crop recommendations and information through voice and images. Technologies involved include Scratch, MIT App Inventor, Android App Studio, Java, JavaScript, IBM Bluemix, and machine learning courses.
Bitcoin is a cryptocurrency and peer-to-peer electronic cash system that uses blockchain technology to record and verify transactions. New bitcoins are created through a process called mining, where users lend their computing power to verify transactions and are rewarded with bitcoins. The blockchain is a public digital ledger that records all bitcoin transactions, maintaining transparency and preventing corruption. However, bitcoins also carry risks like volatility, lack of regulation, and potential use for illegal activities. While their use is not currently illegal in India, the government is still researching whether and how to implement them.
This document provides an overview of blockchain and Ethereum. It defines blockchain as a decentralized, distributed database or ledger of records that maintains information in immutable blocks. Each block contains a collection of transactions and points to the previous block. Blockchain applications include cryptocurrencies, smart contracts, supply chain management, and more. The document then discusses Ethereum, describing its peer-to-peer network and how transactions are executed and added to the blockchain via miners and validators. It provides details on Ethereum smart contracts and includes an example ballot smart contract written in Solidity to illustrate how voting would work.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
2. Overview
• What is EOS Blockchain?
• Why EOS?
• Features Of EOS.
• EOS Architecture.
• Delegated Proof of Stake.
• Updating the Protocol & Constitution.
• Life cycle of a transaction.
• Deterministic parallel execution of
Applications.
• Inter Blockchain Communication.
• Three broad classes of resources.
• Challenges in EOS.
• References.
2
3. What Is EOS
Blockchain
?
A decentralized operating system which can
support industrial-scale decentralized
applications.
Like most blockchains, EOS has its own native
cryptocurrency, simply called EOS.
Claims three things:
Completely remove transaction fees.
Conduct millions of transactions per second.
Good governance to resolve disputes, bug fixes.
3
4. Ethereum is clearly the most
obvious choice in the market. It
has amazing smart contract
abilities, Why EOS ?
What was the
Problem ?
5. • Both Ethereum and EOS are capable of hosting
Dapps, which are supported by smart contracts.
• But the low transaction speed is a major issue. Plus,
the gas price (transaction fee) is problematic as well
for ethereum.
• Proof of work makes miners to waste vast
computational power and electricity only to
compute whose block to add to the Blockchain.
• DAO attack.
Bitcoins - 7 transactions per second
Ethereum – 15 transactions per second
EOS – Millions of transactions per second (claims)
5
7. EOS
Architecture
(Governance)
A blockchain based on EOS.IO
software assumes that all who use
the blockchain are members under a
short Constitution and by agreeing
to which, all members form a
Community subject to the
Constitution.
7
12. Updating the
Protocol &
Constitution
• Block producers propose a change to the
constitution and obtains 15/21 approval.
• Block producers maintain 15/21 approval
of the new constitution for 30
consecutive days.
• Community has to accept the proposal.
• Changes are made.
• Block producers maintain 15/21 approval
of the new code for 30 consecutive days.
• Changes to the code take effect within 7
days.
• Nodes who don’t upgrade, shut downs
automatically.
• Typically, updating the Blockchain takes 2
to 3 months and bug fixes takes 1 to 2
months
12
14. Deterministic
parallel execution
of Applications
• Minimizing communication
latency(actions within a block)
• Read only action handlers(for a
successful action to happen)
• Atomic transactions with multiple
accounts
• Partial evaluation of Blockchain
state(only needful)
• Subjective best effort scheduling (a
txn. using more resources are
removed)
• Deferred transactions(parallel
execution)
• Context free actions(signature
verification – runs parallel)
14
15. Three
broad
classes of
Resources:
Bandwidth and Log Storage (Disk) –
• Log of actions(messages) is useful to restore the
states.
• A state is the block of unspent transactions and
nature of chain at a particular instance of time.
Computation and Computational Backlog
(CPU) –
• Computational Dept(calculations performed to
regenerate the action log) is to be minimized and
maintained properly.
State Storage (RAM) –
• Information that is accessible from applications logic
• Ex.: Account balances.
If anyone have 1% tokens of EOS then they
have potential to use 1% of resources.
15
16. Inter Blockchain
Communication
• Merkle proofs for light
client validation
• Latency of interchange
communication
• Proof of completeness
• Actions
• Sequence numbers
• Segregated Witness
• Signatures are not
relevant after a txn. Is
immutably included
in Blockchain.
• Merkle hash SegWit
16
17. Challenges in EOS
Profitability is low
for all other nodes
except Block
producers
EOS and its 4TB
Blockchain
Problem.
Block producers
may not show
interest to produce
blocks
Vote buying and
Voting issues
Unsolved issues –
solving thousands
of issues takes
time
17
20. Delegated Proof of Stake in EOS.IO
• Block producers are elected by community. Community is those who holds EOS tokens.
• EOS Token holders must stake tokens for a period of 3 days in order to vote.
• The person who is having 1 EOS token can vote 30 Block producers.
• The token holders can vote to delegates by using command line tool – ‘cleos’.
• If you vote a delegate, they will get voter power proportional to the tokens you have
staked.
• Suppose, if you have staked 100 tokens, then for the delegates you vote each of them
will get 100 tokens as vote power.
• Proxy voting is also supported. A proxy is someone to whom you delegate the authority
to vote on your behalf.
• Once a user has registered as a proxy, another user can delegate their voting power to
that proxy.
• This effectively causes your votes to mirror that of the proxy you have named.
20
21. • Unlike Proof-of-stake, instead of choosing block producers at random,
they are chosen by voting process by the community.
• Instead of purely staking EOS tokens, block producers stake their
investment in the network in the form of infrastructure, community
support, development etc.,
• Every token holder can vote to anyone as block producer at any time
without any reason.
• Top 21 delegates who are voted by community can produce Blocks. Each
block is having certain number of transactions happen in EOS Blockchain.
• Transaction may be transferring amount from one account to other
account or it may be sending message from one account to other
account formerly known as actions.
Delegated Proof of Stake in EOS.IO
21
22. • Remaining delegates who get fewer votes than 21 block producers can
get chance to produce blocks when any of the 21 block producers are
voted out by community at any time. These delegates are known as
standby producers.
• There may be any number of standby producers who get chance if any of
21 block producers are voted out.
• In theory, every token holder can vote any one as block producer.
• But in general community vote for those who prove that they have
enough resources to supply the infra structure required to facilitate the
proper functioning and continual growth of the EOS ecosystem.
• The producers order to produce blocks is decided by 21 block producers
among themselves but somehow that order is followed only when it is
approved by 15 or more block producers out of 21.
Delegated Proof of Stake in EOS.IO
22
23. • Each block is produced exactly by 0.5 seconds. If producers don’t
produce blocks at that 0.5 seconds, then no other producer shouldn’t
produce at that time slot.
• It is invalid for a block producer to produce a block at any other time slot
than one they are scheduled for.
• When one or more blocks are skipped, there is a 0.5 or more second gap
in the blockchain.
• If a producer misses a block and has not produced any block within the
last 24 hours or miss leaded the blockchain based on cryptographic
evidence, then they are removed.
• DPOS doesn’t experience a fork because instead of competing to find
blocks, the producers will have to co-operate instead. In the event of a
fork, the consensus switches automatically to the longest chain.
Delegated Proof of Stake in EOS.IO
23
24. • Like all other consensus algorithms, longest chain is considered as the valid chain
of transactions.
• As 15 out of 21 block producers must agree for a block producer to produce a
block, i.e., 2/3rd of 21 block producers should agree which means 1/3rd of the block
producers can get chance produce bad blocks.
• However, the blocks produced by 1/3rd of block producers grow slower compared
to 2/3rd block producers and consensus make long chain into consideration.
• As we know community elects block producers for every round. The block
producers which produces bad blocks can be voted out by community. In this way,
“nothing at stake problem” is resolved.
• A blockchain that adopts the EOS.IO software will award new tokens to a block
producer every time a block is produced.
• In these circumstances, the number of tokens created is determined by the
median of the desired pay published by all block producers.
• The EOS.IO software may be configured to enforce a cap on producer awards such
that the total annual increase in token supply does not exceed 5%.
Delegated Proof of Stake in EOS.IO
24
25. • In these 5% of rewards, block producers benefit only 1% and other 4% is
spent in the network in the form of infrastructure, community support,
development.
• This 1% block rewards are again distributed as 0.25% per block rewards and
0.75% per vote rewards.
• The top 21 divide up the 0.25% per-block rewards proportional to the number
of blocks each one producers.
• All block producer candidates (including the top 21) also divide up the .75%
per-vote rewards budget proportional to the total number of votes they
receive.
• They can claim their share of the per-vote rewards at most once-per-day
• In order to claim their share they must qualify for at least 100 tokens/day.
• Producers candidates who do not qualify for at least 100 tokens/day on a per-
vote basis will receive nothing.
Delegated Proof of Stake in EOS.IO
25
26. Comparison of Developing Dapps in
Ethereum and EOS.
Dapps in Ethereum
• For every transaction, you need to
pay some transaction fee.
• For the developers , they have to
rent the computational power
(CPU, RAM) and resources in terms
of GAS.
Dapps in EOS
• There will be no transaction fee for
users to use Dapps.
• Once you buy the tokens, you own
that percentage of computational
power by putting that token as
stake.
• Resources you used are
proportional to the tokens you
spent.
26
27. Usability
Tools:
• Web based toolkits
provides framework
for Accounts,
Naming, Permission,
Recovery, Database
storage, Scheduling,
Authentication, and
Inter-app
asynchronous
communication.
Language:
• Wren(Intermediate
scripting language) –
1000 TPS,
• WASM(Web
assembly) – 50,000
TPS,
• WASM with C, C++
Environment:
• Governance with
Constitution
• Arbitration,
Producers and
Referenda
27
28. Transactions
and
Accounts
Typical DPOS have 100% block producers
participation.
A transaction is confirmed within 0.25 seconds
from time of broadcast.
Every transaction is a part
of recent block header
which is used to
Prevent a replay of
transaction
Signals network that a
transaction happened on a
specific fork.
All accounts referred by a unique 12 characters,
can be created by user.
The account creator must reserve the RAM to
store new account until they stake tokens to
reserve its own RAM
For a new user to take an account, nominal fee
has to be paid
28
30. Role Based
Permission
Managem
ent
• Permission management determines
whether or not an action is properly
authorized or not.
• EOS.IO provides a declarative permission
management i.e., it controls who can do
what and when.(standard and separate
from business logic)
• It provides performance optimization.
• Multi-user control
• Named permission levels
• Ex.: Steem have permission levels as
Owner, Active and Posting
• Permission Mapping (Ex.: Friend)
• Evaluating Permissions (hierarchy is
followed)
• Parallel Execution of Permissions (read
only)(regeneration of states)
• Actions with Mandatory delay
• Recovery from stolen keys
30