Blockchain can improve business processes by functioning as a shared system of record that eliminates the need for reconciling disparate ledgers. Each member has access rights so confidential information is selectively shared. Consensus from all members is required, and validated transactions cannot be deleted, providing an immutable record. The document provides examples of how blockchain could track high-resolution photos and product details for diamonds throughout the supply chain and maintain real-time payment records.
Prepared by Helene Andre on June 2015
The impact of the Internet of things on the automotive sector.
How will it change business models, broaden business opportunities and bring new services to consumers
What are the next challenges from security to customer relationships
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...Liu Jen Hao
https://youtu.be/HjUV6nKITi8
In this SDChain Video, David Pan, CEO of SDChain, introduces the following:
I. SDChain Introduction,
II. SDChain Technology Architecture,
III. SDChain Industrial Applications, and
IV. Execution Plan.
The video covers IoT Six-Domain Model's
User Domain,
Application Service Domain,
Sensing & Actuating Domain,
Physical Entity Domain,
Resource Interchange Domain, and
Operation Management Domain.
A brief introduction of SDChain's SDFT Consensus Algorithm is also included.
4 Example SDChain Industrial Applications are introduced:
Agriculture,
Healthcare,
Manufacturing, and
Energy.
At the end,
the 5-year community development plan and the 2018 product development are briefly discussed, as well as SDChain's business model, utilizing SDA token for crediting IoT data transactions.
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
Learn how to achieve holistic operational visibility into IIoT business environments by correlating the data from Operational Technology and IT, and organizing it as a single pane of glass in accordance with business processes.
Feature by Feature comparison of IoT Platform is no sufficient. This presentation talks about why leveraging IOT Platforms is important to accelerate innovation and focus on creating true differentiation. This presentation also provides a reference architecture and technical and business evaluation criteria.
Oracle Blockchain Cloud Service gives you a pre-assembled
platform for building and running smart contracts and
maintaining a tamper-proof distributed ledger.
Prepared by Helene Andre on June 2015
The impact of the Internet of things on the automotive sector.
How will it change business models, broaden business opportunities and bring new services to consumers
What are the next challenges from security to customer relationships
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...Liu Jen Hao
https://youtu.be/HjUV6nKITi8
In this SDChain Video, David Pan, CEO of SDChain, introduces the following:
I. SDChain Introduction,
II. SDChain Technology Architecture,
III. SDChain Industrial Applications, and
IV. Execution Plan.
The video covers IoT Six-Domain Model's
User Domain,
Application Service Domain,
Sensing & Actuating Domain,
Physical Entity Domain,
Resource Interchange Domain, and
Operation Management Domain.
A brief introduction of SDChain's SDFT Consensus Algorithm is also included.
4 Example SDChain Industrial Applications are introduced:
Agriculture,
Healthcare,
Manufacturing, and
Energy.
At the end,
the 5-year community development plan and the 2018 product development are briefly discussed, as well as SDChain's business model, utilizing SDA token for crediting IoT data transactions.
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
Learn how to achieve holistic operational visibility into IIoT business environments by correlating the data from Operational Technology and IT, and organizing it as a single pane of glass in accordance with business processes.
Feature by Feature comparison of IoT Platform is no sufficient. This presentation talks about why leveraging IOT Platforms is important to accelerate innovation and focus on creating true differentiation. This presentation also provides a reference architecture and technical and business evaluation criteria.
Oracle Blockchain Cloud Service gives you a pre-assembled
platform for building and running smart contracts and
maintaining a tamper-proof distributed ledger.
Webinar - IoT - Business Transformation LaunchpadJK Tech
Recorded webinar covers how to develop IoT solutions using robust platforms and will also throw light on what are the best business strategies and applications to add direct value to business. Watch our recording and identify right toolset for building IoT solutions.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your BusinessJK Tech
The COVID-19 pandemic has unleashed chaos across the globe and as most of the organizations plan to reopen their office premises and start business operations, they would require a system that can monitor the user's movements and identify overcrowded places within the premises.
Social Distancing Radar (SDR) aims to help organizations reboot their business operations using a monitoring system that guarantees a safe and protected environment through an easy plug and play system that can extract data from sources like CCTV camera feeds to continuously monitor users movements, the number of people present at places like conference rooms, common areas like canteen, office cubicles, contact tracing, etc. and raise the alarm if needed.
In this webinar, we will discuss how our Social Distancing Radar, an AI-based solution, acts as an intelligent monitoring system and empowers your business to re-start the operations and provides a safe and secure environment to your workforce.
KEY TAKEAWAYS:
- How should a business plan their jump-start through the Artificial Intelligence revolution?
- What is JKT’s Social Distancing Radar solution?
- What value add SDR will bring to your business?
- How can any organization make use of the Social Distancing Radar to integrate with the existing surveillance system for a safe and secure workplace?
- How IT Admin and Security Teams can take advantage of the user-friendly analytical dashboard of Social Distancing Radar?
- How can any organization install Social Distancing Radar with minimum investment and customization in the existing infrastructure?
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
When considering Interoperability in a Smart City, there seems to be an apparent contradiction between the requirement of Openness and Security. The choice seems to be between allowing others (anyone?) access to your devices, opening the solution to endless attacks and vulnerabilities, or hermetically sealing off your devices from the outside world, protecting your solution, but making it difficult, or practically impossible, to interoperate with others. The lecture presents a solution to this apparent contradiction. Strong global identities can be used to protect access to things and their data. They can also be used to allow others to discover discoverable devices. A method of defining ownership of information is presented.
By utilizing an infrastructure that provides things with decision support across their entire lifecycles, as well as knowledge about ownership, it becomes possible to model owner consent and provision access to devices and data in realtime, based on the desires of their corresponding owners, without impacting operation of the infrastructure. Thus, an Open and Secure Smart City can be built.When considering Interoperability in a Smart City, there seems to be an apparent contradiction between the requirement of Openness and Security. The choice seems to be between allowing others (anyone?) access to your devices, opening the solution to endless attacks and vulnerabilities, or hermetically sealing off your devices from the outside world, protecting your solution, but making it difficult, or practically impossible, to interoperate with others. The lecture presents a solution to this apparent contradiction. Strong global identities can be used to protect access to things and their data. They can also be used to allow others to discover discoverable devices. A method of defining ownership of information is presented.
By utilizing an infrastructure that provides things with decision support across their entire lifecycles, as well as knowledge about ownership, it becomes possible to model owner consent and provision access to devices and data in realtime, based on the desires of their corresponding owners, without impacting operation of the infrastructure. Thus, an Open and Secure Smart City can be built.
2015-09-16 IoT in Oil and Gas ConferenceMark Reynolds
The IoT is a game-changer opening the Systems Engineer and the Data Scientist to the O&G Development teams. Upstream, mid-stream, and downstream segments of the market are confronted by the big question “Now what?”
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric workshop in Barecelona on July 10th, 2019.
This introduces blockchain for business and describes in details the Hyperledger Fabric design principles, overall architecture, its components, and the transaction flow.
Blockchain is a technology for a new generation of transactional applications that establishes trust,
accountability and transparency while streamlining processes in business networks. Think of it as
an operating system for interactions between participants in a business network. It has the potential
to vastly reduce the cost and complexity of getting things done
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Webinar - IoT - Business Transformation LaunchpadJK Tech
Recorded webinar covers how to develop IoT solutions using robust platforms and will also throw light on what are the best business strategies and applications to add direct value to business. Watch our recording and identify right toolset for building IoT solutions.
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your BusinessJK Tech
The COVID-19 pandemic has unleashed chaos across the globe and as most of the organizations plan to reopen their office premises and start business operations, they would require a system that can monitor the user's movements and identify overcrowded places within the premises.
Social Distancing Radar (SDR) aims to help organizations reboot their business operations using a monitoring system that guarantees a safe and protected environment through an easy plug and play system that can extract data from sources like CCTV camera feeds to continuously monitor users movements, the number of people present at places like conference rooms, common areas like canteen, office cubicles, contact tracing, etc. and raise the alarm if needed.
In this webinar, we will discuss how our Social Distancing Radar, an AI-based solution, acts as an intelligent monitoring system and empowers your business to re-start the operations and provides a safe and secure environment to your workforce.
KEY TAKEAWAYS:
- How should a business plan their jump-start through the Artificial Intelligence revolution?
- What is JKT’s Social Distancing Radar solution?
- What value add SDR will bring to your business?
- How can any organization make use of the Social Distancing Radar to integrate with the existing surveillance system for a safe and secure workplace?
- How IT Admin and Security Teams can take advantage of the user-friendly analytical dashboard of Social Distancing Radar?
- How can any organization install Social Distancing Radar with minimum investment and customization in the existing infrastructure?
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
When considering Interoperability in a Smart City, there seems to be an apparent contradiction between the requirement of Openness and Security. The choice seems to be between allowing others (anyone?) access to your devices, opening the solution to endless attacks and vulnerabilities, or hermetically sealing off your devices from the outside world, protecting your solution, but making it difficult, or practically impossible, to interoperate with others. The lecture presents a solution to this apparent contradiction. Strong global identities can be used to protect access to things and their data. They can also be used to allow others to discover discoverable devices. A method of defining ownership of information is presented.
By utilizing an infrastructure that provides things with decision support across their entire lifecycles, as well as knowledge about ownership, it becomes possible to model owner consent and provision access to devices and data in realtime, based on the desires of their corresponding owners, without impacting operation of the infrastructure. Thus, an Open and Secure Smart City can be built.When considering Interoperability in a Smart City, there seems to be an apparent contradiction between the requirement of Openness and Security. The choice seems to be between allowing others (anyone?) access to your devices, opening the solution to endless attacks and vulnerabilities, or hermetically sealing off your devices from the outside world, protecting your solution, but making it difficult, or practically impossible, to interoperate with others. The lecture presents a solution to this apparent contradiction. Strong global identities can be used to protect access to things and their data. They can also be used to allow others to discover discoverable devices. A method of defining ownership of information is presented.
By utilizing an infrastructure that provides things with decision support across their entire lifecycles, as well as knowledge about ownership, it becomes possible to model owner consent and provision access to devices and data in realtime, based on the desires of their corresponding owners, without impacting operation of the infrastructure. Thus, an Open and Secure Smart City can be built.
2015-09-16 IoT in Oil and Gas ConferenceMark Reynolds
The IoT is a game-changer opening the Systems Engineer and the Data Scientist to the O&G Development teams. Upstream, mid-stream, and downstream segments of the market are confronted by the big question “Now what?”
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric workshop in Barecelona on July 10th, 2019.
This introduces blockchain for business and describes in details the Hyperledger Fabric design principles, overall architecture, its components, and the transaction flow.
Blockchain is a technology for a new generation of transactional applications that establishes trust,
accountability and transparency while streamlining processes in business networks. Think of it as
an operating system for interactions between participants in a business network. It has the potential
to vastly reduce the cost and complexity of getting things done
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Blockchain IoT Workshop for the Aviation Planning ConferenceJim Gitney
On August 19,2018, Jim Gitney, Group50's CEO, presented a Blockchain and IoT workshop to 60+ executives from the Aviation Industry and discussed current and future applications for that industry.
Session 1908 connecting devices to the IBM IoT CloudPeterNiblett
IBM MessageSight and the IBM Internet of Things cloud enable connectivity across a wide variety of devices - from existing devices in silos and systems through the wide range of new devices that are appearing on a daily basis. This session covers patterns of connectivity, how to make it happen, including sending events like measurements and receiving of commands. The session goes into detail on how to use the industry standard MQ Telemetry Transport protocol to achieve this and encompasses best practices for topics and message format.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. 2
A little personal history
• First job was in consumer electronics – had to come
up with a way to repair surface-mount ICs in VCRs.
• Second job was as a product engineer in a hybrid
microelectronics factory – everything from a simple
reset circuit – literally drawn on a napkin – to a Chip-
on-Substrate controller for one of the first personal
insulin pumps.
8. 8
We can build almost any sort of process with Blockchain
• This example is an e-Kanban process. Whenever a reel of 5000 parts leaves
the stores area, it updates the ledger. When five reels (one box) have been
issued, it issues an eKanban signal to the supplier.
• The supplier’s acknowledgement, as well as its shipping notice and the receipt
into stores, all update the ledger.
Date Time Plant ID
Part Number /
Material Code
Starting
Inventory
Level (Stores) Transaction
Transaction
Quantity
Ending
Inventory
Level
Cum
Issue to
WIP SPLRID
5-Jun-18 13:00NJ POLY - NKG01 1098753-01 185,000 Issue to WIP -5000 180,000 -5000 n/a
5-Jun-18 15:05NJ POLY - NKG01 1098753-01 180,000 Issue to WIP -5000 175,000 -10000 n/a
5-Jun-18 17:15NJ POLY - NKG01 1098753-01 175,000 Issue to WIP -10000 165,000 -20000 n/a
6-Jun-18 7:20NJ POLY - NKG01 1098753-01 165,000 Issue to WIP -5000 160,000 -25000 n/a
6-Jun-18 7:21NJ POLY - NKG01 1098753-01 n/a Issue eKanban to SPLR 25000 n/a n/a Panshiba
6-Jun-18 7:22NJ POLY - NKG01 1098753-01 n/a Acknowledge eKanban 25000 n/a n/a Panshiba
6-Jun-18 16:05NJ POLY - NKG01 1098753-01 n/a Shipping Notice 25000 n/a n/a Panshiba
7-Jun-18 10:05NJ POLY - NKG01 1098753-01 160,000 Receipt to Stores 25000 185,000 n/a Panshiba
GMT+ 8
22. Thank you!
22
Contact for further info:
Quentin Samelson
+1 224 407 7812
qbsamels@us.ibm.com
LinkedIn:
(Blogs on Blockchain & other topics)
https://www.linkedin.com/in/qsamelson/
23. 23
For more information:
Some useful videos:
https://youtu.be/lD9KAnkZUjU (diamond
example)
https://youtu.be/tdhpYQCWnCw (Maersk)
https://youtu.be/pee0kixUN2Q (Power Grid)
https://youtu.be/ZKscEx2lO-4 (Blockchain +
IoT)
A more comprehensive foundational
presentation:
https://www.slideshare.net/EsraUfacik/blockch
• “Fast Forward” white paper is at
https://www-935.ibm.com/services/us/gbs/thoughtlea
• Blockchain in Electronics white paper is at
www.ibm.biz/blockchainelectronics
• Additional info at
https://www.ibm.com/blockchain/
• Helpful paper on selecting a blockchain
framework: https
://developer.ibm.com/blockchain/2017/05/11/guidelin
Contact Quentin Samelson for links to “Blockchain for Dummies,”
the Quick-Start Guide for Developers, or the Founder’s Handbook.
This has been simplified, of course! In real life, the issues to WIP wouldn’t stop when the eKanban signal is issued… but the math would be hard to follow on one screen in that case.
Optional slide to explain why it’s called Block – Chain …
Slight changes to an input will produce a completely different hash. It is close to impossible to figure out what input data created a particular hash; but hashing the same value twice will result in the same hash.
This slide looks at the block in more detail and how it achieves immutability.
The crucial aspect is the hash function. Each block contains a hash of the previous block, which itself is used to calculate the next block’s hash. This means that if any block were to be tampered with (e.g. a transaction added, deleted or modified) then the hash values would change and the blockchain would no longer be integral.
The first block is known as the “genesis” block.The genesis block usually contains an arbitrary key value that is used to initialize the hash function.
This is a simplification of the block detail. Generally, each block contains a Merkel root that links off to a tree of transactions. There is also other metadata, depending on the blockchain implementation (e.g. nonces and timestamps).
Blockchain architecture give participants the ability to share a ledger, which is updated every time a transaction occurs. This happens through peer to peer replication – meaning that each participant’s ledger is updated and synchronized.
Cryptography is used to ensure that network participants see only the parts of the ledger that are relevant to them, and that transactions are secure, authenticated and verifiable.
Blockchain also allows a contract to be embedded in the transaction database determining the conditions under which the transaction can occur.
Network participants agree how transactions are verified through consensus or similar mechanisms. Government oversight, compliance & audit can be part of the same network.
To restate:
Shared: both (or all) parties to the business relationship have a complete copy of the ledger, showing all transactions made.
Secure: only the parties to the business relationship have access to the ledger. Security can be set up so that some parties only see part of a transaction, or don’t see some transactions at all.
Synchronized: when one party performs a transaction, everyone in the business relationship will see that transaction. (When the buyer acknowledges receipt of the vehicle, for instance, the seller’s copy, and the finance company’s copy, of the ledger would also be updated.)
Stable: The Ledger is “immutable” – it can’t be changed after the fact.
CONSENSUS– means all participants agree that a transaction is valid
PROVENANCE– means participants know where the asset came from and how it’s ownership has changed over time
IMMUTABILITY– means no participant can tamper with a transaction once it’s agreed. If a transaction was in error then a NEW transaction must be used to reverse the error, with both visible
FINALITY– means that there is ONE place to determine the ownership of an asset or completion of a transaction. This is the role of the SHARED LEDGER.
.
This and the next slide are optional, in case you need to address the difference between bitcoin & blockchain for business.
Note that the key characteristics of bitcoin above – unpermissioned and public – create the situation people have heard of, where ”mining” bitcoin requires a LOT of computing power. This is because bitcoin requires “proof of work” – which is achieved through solving massive mathematics problems. In contrast, Hyperledger (blockchain for business) is permissioned and private. Proof of work is achieved through consensus – sometimes by having two parties agree to a transaction, for instance. So the need for massive amounts of computing power isn’t there (unless, of course, your business process is going to handle huge amounts of data and thousands of transactions per minute). The key is that the technology itself doesn’t create a need for computing power, in the case of blockchain for business. With cryptocurrencies, that’s not true.
Blockchain technology enables the Bitcoin crypto currency and is best known for this usage.
However, the shared ledger technology is separate & separable – applicable to a whole range of business challenges that cross all industries.
IBM is not interested in crypto currency, but is missioned to help our customers make the most from Blockchain technologies. We see this as a major transformation opportunity for many of our customers.
Digital currencies (i.e. the representation of FIAT currency as an asset on a blockchain) are auditable and permissioned, hence excellent Blockchain use case
You either do blockchain:
“because you have to”
“because you want to save time or money or both”
Or because it opens up a new opportunity.
Hyperlinks are built into the pictures, but you can also use these links (all of which are public):
“Fast Forward” report is at https://www-935.ibm.com/services/us/gbs/thoughtleadership/blockchain/
Blockchain in Electronics report is at www.ibm.biz/blockchainelectronics
Additional info at https://www.ibm.com/blockchain/
More videos: IBM Global Finance: https://youtu.be/0DSNdLDOZ5w
Northern Trust (Private Equity application): https://youtu.be/uXx2vpDngPU
AIG (Insurance): https://youtu.be/mgUK0cPoasw
Supply Chain Visibility/ Inbound supply chain demo: https://youtu.be/mIbAHiOr9ms
IoT, Blockchain combined in inbound supply chain at Kouvola: https://youtu.be/oiLUtBiSTqQ
Walmart Food Safety Video with IBM: https://youtu.be/SV0KXBxSoio
Some good non-IBM resources:
http://www.ozy.com/need-to-know/blockchain-the-new-technology-of-trust/81602
http://www.ozy.com/fast-forward/wtf-is-blockchain-inside-the-most-disruptive-tech-since-the-internet/81567
https://hackernoon.com/wtf-is-the-blockchain-1da89ba19348
Blogs:
And a few blogs that may provide some food for thought:
The problem with Blockchain: https://www.linkedin.com/pulse/problem-blockchain-quentin-samelson/
Finding good Blockchain projects: https://www.linkedin.com/pulse/finding-good-blockchain-projects-quentin-samelson/
Why use Blockchain instead of another technology? https://www.linkedin.com/pulse/why-use-blockchain-instead-another-technology-quentin-samelson/
Blockchain for the EMS Supply Chain: https://www.linkedin.com/pulse/blockchain-ems-supply-chain-quentin-samelson/
Infographics are not available via publicly accessible links; they can be downloaded internally and provided via email.
A second useful infographic is available at https://w3-03.sso.ibm.com/services/lighthouse/documents/I973757M47254S75
Most of the use cases shown in previous slides are available in a single infographic at https://w3-03.sso.ibm.com/services/lighthouse/documents/R470930L14344Q20