The document discusses blockchain technology and its potential practical uses. It begins by defining blockchain as a distributed digital ledger that allows participants in a network to securely record transactions without a central authority. It then provides examples of how blockchain could be used in healthcare to securely store electronic health records, enable smart contracts to automatically pay providers, and track medical devices to prevent counterfeiting. The document concludes by describing a hypothetical example where blockchain is used to give healthcare providers access to a patient's complete medical history from various sources to improve treatment while reducing redundant tests.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
***** Blockchain Training : https://www.edureka.co/blockchain-training *****
This Edureka video on "Blockchain Explained" is to guide you through the fundamentals of the new revolutionary technology called Blockchain and its defining concepts. Below are the topics covered in this tutorial:
1. History of blockchain
2. What is Blockchain
3. Traditional Transaction vs Blockchain
4. How Blockchain Works
5. Benefits of Blockchain
6. Blockchain Transaction Demo
Here is the link to the Blockchain blog series: https://goo.gl/DPoAHR
You can also refer this playlist on Blockchain: https://goo.gl/V5iayd
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
The Basic Introduction to Blockchain technology and its features along with its working ,usage and application areas. This presentation clarifies all the basic concenpts related to blockchain technology .
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
A Blockchain is a type of diary or spreadsheet containing information about transactions. Each transaction generates a hash. If a transaction is approved by a majority of the nodes then it is written into a block. Each block refers to the previous block and together make the Blockchain. And I am sharing this to help everyone to learn about blockchain technology.
1. What is Block Chain
2. How Does it Work
3. What are the key attributes of Blockchain
4. What are applications areas for Block Chain
5. What are the advantages and Disadvantages of Block Chain
A presentation explaining the concepts of Blockchain. It covers the introduction to blockchain, types of blockchain, process of adding blocks in bitcoin blockchain, hyperledger block structure, use cases of blockchain explained.
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
We will focus on understanding "Proof of Stake (PoS)" Algorithm, how it different from "Proof of Work" algorithm, the performance benefits and security overview. We will also discuss the upcoming blockchain protocols that are planning to move to PoS.
Blockchain Technology and Its Application in LibrariesNabi Hasan
Background
Blockchain: Conceptual Understanding
What is Blockchain Technology?
The Three Pillars of Blockchain Technology
Why is Blockchain Popular?
What is Distributed Ledger?
Blockchain for Enterprise Application Developer
Possible Areas of Implimention of Blockchain Technology in Libraries
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...Mindfire LLC
Blockchain has proven to be a technological breakthrough that will aid businesses in their shift to increased efficiency and security. According to a PwC poll of 600 Executives conducted in 2018, 84 percent of respondents’ firms are actively engaging with distributed ledgers.
Blockchain use cases in health and educationNetcetera
Blockchain is disrupting all industries, since it is a general purpose technology. At the Open Banking Forum in Zürich at the end of March, our expert Elena Karafiloski presented use cases in health and education.
***** Blockchain Training : https://www.edureka.co/blockchain-training *****
This Edureka video on "Blockchain Explained" is to guide you through the fundamentals of the new revolutionary technology called Blockchain and its defining concepts. Below are the topics covered in this tutorial:
1. History of blockchain
2. What is Blockchain
3. Traditional Transaction vs Blockchain
4. How Blockchain Works
5. Benefits of Blockchain
6. Blockchain Transaction Demo
Here is the link to the Blockchain blog series: https://goo.gl/DPoAHR
You can also refer this playlist on Blockchain: https://goo.gl/V5iayd
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
The Basic Introduction to Blockchain technology and its features along with its working ,usage and application areas. This presentation clarifies all the basic concenpts related to blockchain technology .
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
A Blockchain is a type of diary or spreadsheet containing information about transactions. Each transaction generates a hash. If a transaction is approved by a majority of the nodes then it is written into a block. Each block refers to the previous block and together make the Blockchain. And I am sharing this to help everyone to learn about blockchain technology.
1. What is Block Chain
2. How Does it Work
3. What are the key attributes of Blockchain
4. What are applications areas for Block Chain
5. What are the advantages and Disadvantages of Block Chain
A presentation explaining the concepts of Blockchain. It covers the introduction to blockchain, types of blockchain, process of adding blocks in bitcoin blockchain, hyperledger block structure, use cases of blockchain explained.
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
We will focus on understanding "Proof of Stake (PoS)" Algorithm, how it different from "Proof of Work" algorithm, the performance benefits and security overview. We will also discuss the upcoming blockchain protocols that are planning to move to PoS.
Blockchain Technology and Its Application in LibrariesNabi Hasan
Background
Blockchain: Conceptual Understanding
What is Blockchain Technology?
The Three Pillars of Blockchain Technology
Why is Blockchain Popular?
What is Distributed Ledger?
Blockchain for Enterprise Application Developer
Possible Areas of Implimention of Blockchain Technology in Libraries
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...Mindfire LLC
Blockchain has proven to be a technological breakthrough that will aid businesses in their shift to increased efficiency and security. According to a PwC poll of 600 Executives conducted in 2018, 84 percent of respondents’ firms are actively engaging with distributed ledgers.
Blockchain use cases in health and educationNetcetera
Blockchain is disrupting all industries, since it is a general purpose technology. At the Open Banking Forum in Zürich at the end of March, our expert Elena Karafiloski presented use cases in health and education.
các hiểu biết hiện hành trong việc sử dụng blockchain trong chuỗi cung ứng lạnh dược phẩm.
Xem thêm các tài liệu khác trên kênh của Công ty Cổ phần Tư vấn Thiết kế GMP EU.
Blockchain is a peer-to-peer distributed ledger technology that helps obtain transparency and trust. Due to these two benefits Blockchain technology is integrated in the healthcare industry. From better pharma supply chains to removal of third parties, this distributed leger technology presents many benefits. Blockchain’s opportunities in patient-data portability, interoperability, and administration can provide answers to various challenges in the Healthcare industry. Swipe through this presentation to know more.
Visit us now at https://www.debutinfotech.com/blockchain-development-services
Blockchain, Predictive Analytics and HealthcareRuchi Dass
Episode-of-care payment and comprehensive care payment systems can help providers prevent health problems; prevent the occurrence of acute episodes among individuals who have health conditions; prevent poor outcomes during major acute episodes, such as infections, complications, and hospital readmissions; and reduce the costs of successful treatment.
Using cryptography to keep exchanges secure, blockchain provides a decentralized database, or “digital ledger”, of transactions that everyone on the network can see. This network is essentially a chain of computers that must all approve an exchange before it can be verified and recorded.
Learn more about Blockchain in healthcare here.
Episode-of-care payment and comprehensive care payment systems can help providers prevent health problems; avoid the occurrence of acute episodes among individuals who have health conditions; prevent poor outcomes during major acute episodes, such as infections, complications, and hospital readmissions; and reduce the costs of successful treatment.
Using cryptography to keep exchanges secure, blockchain provides a decentralised database, or “digital ledger”, of transactions that everyone on the network can see. This network is essentially a chain of computers that must all approve an exchange before it can be verified and recorded.
Learn about the healthcare IT trends that will shape 2017 and beyond. Discover how healthcare on the blockchain will move from theory to practice, how the Trump presidency will rock the healthcare boat, how demand will drive adoption of healthcare e-commerce and how telehealth will finally go mainstream.
Patientory Blockchain Privacy, How is it Achieved?Patientory
Patientory.com. Learn how PTOYMatrix network solves limitations currently facing electronic health record systems, primarily privacy limitations.
Your Health, at your fingertips. Visit Now Patientory.com.
Blockchain is helping in shaping the industry like never before. You can find so many use cases of this technology, and because of the overwhelming results which Blockchain is offering, it has become the technology of the future.
This document presents an overview of the Blockchain applications in Life Sciences. The applications are mapped onto Life Sciences value chain – preclinical, clinical, manufacturing, distribution, and customer. Blockchain could be used in many applications across the value chain including but not limited to peer-to-peer network, data storage, smart contracts and file sharing. This innovative technology presents a lot of promise in accelerating drug discovery and removing many inefficiencies.
This disclaimer informs readers know that the views, thoughts, and opinions expressed in the presentation belong solely to the author, and not to the author’s employer, organization, committee or other group or individual.
Similar to Practical Applications of Block Chain Technologies (20)
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
Key Discussion Pointers:
1. Introduction to Data Privacy
- What is data privacy
- Privacy laws around the globe
- DPDPA Journey
2. Understanding the New Indian DPDPA 2023
- Objectives
- Principles of DPDPA
- Applicability
- Rights & Duties of Individuals
- Principals
- Legal implications/penalties
3. A practical approach to DPDPA compliance
- Personal data Inventory
- DPIA
- Risk treatment
It covers popular IaaS/PaaS attack vectors, list them, and map to other relevant projects such as STRIDE & MITRE. Security professionals can better understand what are the common attack vectors that are utilized in attacks, examples for previous events, and where they should focus their controls and security efforts.
Discuss Security Incidents & Business Use Case, Understanding Web 3 Pros
and Web 3 Cons. Prevention mechanism and how to make sure that it doesn’t happen to you?
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
Round Table Discussion On "Emerging New Threats And Top CISO Priorities In 2022"_ Bangalore
Date - 28 September, 2022. Decision Makers of different organizations joined this discussion and spoke on New Threats & Top CISO Priorities
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
Cloud Security Groups are the firewalls of the cloud. They are built-in and provide basic access control functionality as part of the shared responsibility model. However, Cloud Security Groups do not provide the same protection or functionality that enterprises have come to expect with on-premises deployments. In this talk we will discuss the top cloud risks in 2020, why perimeters are a concept of the past and how in the world of no perimitiers do Cloud Security groups, the "Cloud FIrewalls", fit it. We will practically explore Cloud Security Group limitations across different cloud setups from a single vNet to multi-cloud
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
The Internet is home to seemingly infinite amounts of confidential and personal information. As a result of this mass storage of information, the system needs to be constantly updated and enforced to prevent hackers from retrieving such valuable and sensitive data. This increasing number of cyber-attacks has led to an increasing importance of Ethical Hacking. So Ethical hackers' job is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weakness or loopholes in a computer, web applications or network and reports them to the organization. It requires a thorough knowledge of Networks, web servers, computer viruses, SQL (Structured Query Language), cryptography, penetration testing, Attacks etc. In this session, you will learn all about ethical hacking. You will understand the what ethical hacking, Cyber- attacks, Tools and some hands-on demos. This session will also guide you with the various ethical hacking certifications available today.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. • A blockchain is a data structure that makes it possible to create a digital
ledger of transactions and share it among a distributed network of
computers.
• It uses cryptography to allow each participant on the network to
manipulate the ledger in a secure way without the need for a central
authority.
• Once a block of data is recorded on the blockchain ledger, it’s extremely
difficult to change or remove.
• When someone wants to add to it, participants in the network — all of
which have copies of the existing blockchain — run algorithms to
evaluate and verify the proposed transaction.
• If a majority of nodes agree that the transaction looks valid — that is,
identifying information matches the blockchain’s history — then the new
transaction will be approved and a new block added to the chain.
What is Blockchain?
2
5. Username +
Password +
Biometric data
Basics – Tokenization (public/private keys)
Create a Secure Identity
for Everything
Token -
0x23e423s3234…
Owner -
0xfe839a340d…
Owner
• id
• proof
Person
• Userna
me
• SSN
• DOB
Data
• Address
• Phone
Slides courtesy of Microsoft
8. Blockchain | Overview
Cryptographically Authentic
Uses tried and true public/private signature
technology. Blockchain applies this technology to
create transactions that are impervious to fraud
and establishes a shared truth.
Shared
Blockchain’s value is directly linked to the number of
organizations or companies that participate in them. There is
huge value for even the fiercest of competitors to participate
with each other in these shared database implementations.
Distributed
There are many replicas of the Blockchain
database. In fact, the more replicas there are,
the more authentic it becomes.
Ledger
The database is a read/write-once database
so it is an immutable record of every
transaction that occurs.
8
Slides courtesy of Microsoft
11. Payments and Remittance – Transactions can occur directly between
two parties on a frictionless P2P basis. The technology’s application for
overseas transactions has the potential to reduce risk, transaction costs
and to improve speed, efficiency and transparency.
Issuance, Ownership and Transfer of Financial Instruments – A
blockchain-based securities market allows traders to buy or sell stocks
directly on exchanges or directly to other market participants in a P2P
manner without the intermediation services provide by a broker or
clearinghouse.
Clearing and Settlement Latency – On the blockchain, the entire
lifecycle of a trade, including its execution, clearing and settlement can
occur at trade level, lowering post-trade latency and reducing counterparty
exposures.
Practical Use of Block Chain - Financial
12. Smart Contracts – Smart contracts would automatically pay providers
when conditions of service are established such as;
•Validation that a service was received by a registered Medicaid patient
•Service was provided by a properly registered doctor & provider
•Neither party is on a known list of past participants in any fraud
Cost Containment – The block chain can be filtered to identify and alert
about specific activity on the chain, monitoring, using patterns, can include
data that represents a doctor, consumer, drugs, procedures, all can to
tokenized and added to the chain.
• Building a rule base using best practices, CPT codes, ICD codes,
medical procedures and other costs can be monitored and audited
using blockchain.
Practical Use of Block Chain - Healthcare
12
13. EHR storage & security - Blockchain is a security technology at its core
and with the ever-present concern over the security of electronic health
records, it is likely to cater to this challenge first as it enters healthcare.
This approach can secure medical records and audit trails using the
Blockchain.
• We can do this by cryptographically encoding private medical data and
then a digital fingerprint is formed for time-stamping and verification
purposes.
DNA wallets – This concept stores genetic and medical data which is
again secured via the blockchain and accessed using private keys and
this will form a “DNA wallet”. This could allow healthcare providers to
securely share – and possibly monetize – patient data, helping
pharmaceutical companies to tailor drugs more efficiently.
Practical Use of Block Chain - Healthcare
14. Practical Use of Block Chain - Healthcare
Anti-counterfeit drugs – The industry is designing blockchain in the
fight against counterfeit drugs. It features panels on drug packages
that can be peeled or scratched off to reveal a unique verification tag.
This is then cross referenced with the blockchain to ensure that the
pharmaceutical product is legitimate.
Protein folding - Stanford University previously relied on expensive
super computers to simulate protein folding as it happens incredibly
fast.
• This method was obviously costly and had a single point of failure.
Using the blockchain, they can instead use a decentralized network
of over 170,000 computers to produce 40,000 teraflops of
computing power.
• This example will grab the attention of other industries that utilize
expensive supercomputers. This could even make its way into the
analytical space by utilizing a broad base of data for predictive
analytics.
15. The challenge when defining block chain technologies is how to position it
for the future. This use case explores patient identity and the delivery of
EMR and other patient information necessary to deliver healthcare.
• In the world that we live in and increasing over time is that each
human or patient is actually a conglomerate of a huge variety of data.
• In the past have had EMR’s and maybe that was adequate.
• The patient of the future is a composite of EMR data and the data
from other provider EMR’s be it a hospital, ambulatory or urgent care,
pharmacies, genomic data, huge data set from our wearables,
survey’s, implants and IoT.
Block Chain – Healthcare example
16. • The patient of the future is a vast collection of data.
• Currently when someone comes into a healthcare institution, all we
have today is a small database of data, and has some file that is
separated and might be faxed or in stacks of paper.
• With that requires a form of identity that connects that patient to the
data they are carrying or in a variety of databases where MR numbers
are different and patient information can be inconsistent.
• The potential of block chain utilized by the payer and provider can
streamline this process.
• The healthcare entities would join a block chain to have access to a
large network of verified and secure data.
Block Chain – Healthcare example
17. • When a patient comes to the hospital and wants care, the provider has
a method to see all the imaging data, EMR information.
• In additional all the wearable data, pharma data, genomic data, the
past claims data, because that provider is part of this block chain
network we have access to this information where the validity of the
data and identity is immutable and easy to access.
• The advantages of block chain enabled solution is that healthcare
providers will have a greater ability to treat patients, with a better
picture and understanding of the patient’s health.
• It will also save in costs, today in a fixed fee based healthcare system
when you run a redundant test the system makes money, in the future
value based model that will not be the case and that redundant
procedure will not be reimbursed, access via block chain can eliminate
that redundant test and reduce cost.
Block Chain – Healthcare example
18. • Block chain has the potential to improve treatment.
• This is the core mission for healthcare providers, to improve quality
and reduce the cost of healthcare by enabling the secure delivery of
data across multiple providers and modalities.
• Improve safety by providing a more reliable identity management
process and reduce the stress on patient’s when communicating
health information as they inherent more responsibility in their own
care.
Block Chain – Healthcare example
19. Enterprise Block chains need more
‒ How to work with existing systems
‒ Operations and management
‒ Privacy understanding
‒ Identity and Key Management
‒ Be great to have some analytics
‒ Tools need to improve
What’s missing?
20. How can CISO’s address the blockchain challenge?
“Blockchain has the potential to become a significant trust enabler in the CISO’s arsenal.
However, solutions are unclear, standards have yet to coalesce and regulation is far on the
horizon. CISOs must make informed technology decisions that align with the organization’s
risk appetite and tolerance.”
Block chain is not widely adopted in any industry, not in the least in
healthcare.
• So why should we sign up for an unproven technology?
• I do not discount the concept, just that when the broader market has not adopted it
begs the question. Now when I wake up tomorrow & see headlines that Microsoft is
using Blockchain to drive their new security software and their stock is up 25%, then
that will settle my skepticism….but until then…
From my perspective we still need to firm the problems we want to
solve…so I don’t much worry about the solution yet.
We now have the hammer and now we are looking for a nail.
Questions
Start – 2 types of things – Unique and Non-Unique that need to be represented digitally.
Unique like a person – typically represented digitally with user name and password – moving to bio metrics and multi authorization techniques, fingerprint, face scan, pin number from a specific cell phone.
Non-unique like a cell phone – typically represented by a serial number assigned by the manufacturer. A SKU refers to its “type” which is not unique. Establishing this is called provenance.
Enter a Cryptographic One-Way Hash – there are lots of these SHA-1, 2, MDA…etc Not important, but the concept is the same regardless of the function. The Cryptographic One-Way Hash creates a Deterministic Digest of its inputs. Meaning, if the values you put in are the same you will always get the same output or hash digest allowing you to use this identifier (also a public key)
Unique items do not can be hashed as is, because they are unique...but how they are represented are the weak link here. Unique items usually “own” things that are non-unique.
A non-unique thing represented as a serial number is a problem, because its identifier is only unique to its creator another product could have the same serial number from a different creator. Non-unique items also take multiple inputs to create a digest, public key of manufacturer, sku and mayby a nonce or most often a salt value.
Anyway a Hash function produces a hash Digest that is often refered to as a public key, where the inputs that created the disgest are the private key. There is no way to determine the private key values from the public key...thus one-way.
Basics in establishing a Digital Bearer Instrument. Establishing provenance, assigning ownership, transfering ownership, tracking modiftication and determining lineage across systems.
So a person can create a public key with a combination of identifiers where a non-unique item requires similar inputs. This creates a public/private key pair which is the foundation for blockchain technology.
A composite is a collection of public keys as inputs to create a digest for an item containing other items.
Introduce a ledger to record these public keys and you can do all sorts of things. Record the provenance of things, assign ownership and transfer ownership.
Cryptographically authentic shared distributed ledger
Cryptographically authentic – each transaction recorded in the database is digitally signed and mathematically guaranteed to be authentic and impervious to fraud. The transaction was signed by the entity that has the private key. No question. The truth
Shared – the database’s main value is that it is shared between separate entities, like companies. The more entities shared the greater the value
Distributed – many copies of the database exist and they are replicas of each other in relative time
Ledger – a write-once, thus immutable, ledger that records every transaction. The entire history of all transactions is available; math doesn’t lie and there is nowhere to hide
Value – a shared ledger of truth between separate entities that may be competitors and/or partners with each other
The rest is just how it is implemented
So, logically there is a single ledger that is replicated to as many copies as possible. All copies are write once and read copies (immutable) and the synchronize transactions using something called a consensus algorithm.
Transactions are written to a block, like a bucket. They stack on top of each other. Once the block is full, it gets capped (mined for proof of work consensus), capping is essentially hashing all the transactions in the block and starting a new block with the digest of the completed one thus linking the blocks in a chain.
Mathematically, this creates a stronger truth the longer the chain.
Start with someone creating a SmartContract to Sell a Stock
That gets recorded as an address (PK) on the blockchain along with its code
Enter in Mary
Who has an Alt Coin on the chain that she can spend
Mary wants to buy the stock offered in the smart contract
Mary creates a transaction to the SmartContract to Buy the Stock with the Alt Coin as payment
The Transaction gets sent to the SmartContract.
The SmartContract receives the message, then executes the code to sell the SmartContract buy running the code in the Virtual Machine that:
Executes the transfer of ownership of the stock from the Seller to the Buyer
Transfers the Alt-Coin or a portion of its value for the stock to the Seller, pays any transaction fees out of the ALT-Coin as well
Does any other logic it needs to perform in order to complete the transaction.