SlideShare a Scribd company logo
Towards a
Practice of
Token Engineering
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
Early
iterations
Early iterations:
Flailing
Can we
structure this
better?
Realization: Tokenized Ecosystems
Are a Lot Like Evolutionary Algorithms!
What Tokenized ecosystem Evolutionary Algorithm
Goals Block reward function
E.g. “Maximize hash rate”
Objective function
E.g. “Minimize error”
Measurement
& test
Proof
E.g. “Proof of Work”
Evaluate fitness
E.g. “Simulate circuit”
System agents Miners & token holders (humans)
In a network
Individuals (computer agents)
In a population
System clock Block reward interval Generation
Incentives &
Disincentives
You can’t control human,
Just reward: give tokens
And punish: slash stake
You can’t control individual,
Just reward: reproduce
And punish: kill
We can approach token design
as optimization design.
Optimization Design
Steps in Optimization Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing solver. If needed, try different
problem formulations or solvers.
3. Design new solver?
1. Formulation of an optimization problem
Objectives & constraints in a design space
2. Try an existing solver. Does it converge?
3. Design new solver
Example of a Successful Outcome
Token Design
as Optimization
Design
Steps in Token Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
1. Formulate the Problem
(a) Ask
•Who are my potential stakeholders?
•And what do each of them want?
•What are possible attack vectors?
(b) Translate those into objectives and constraints.
2. Try Existing Patterns
1. Curation
2. Proofs of human or compute work
3. Identity
4. Reputation
5. Governance / software updates
6. Third-party arbitration
7. …
2.1 Patterns for Curation
•Binary membership: Token Curated Registry (TCR)
•Discrete-valued membership: Stake Machines
•Continuous-valued membership: Curation Markets
characterized by bonding curve
•Hierarchical membership: each label gets a TCR
•Work tied to membership: Proofed Curation Market
•Non-fungible tokens: Re-Fungible Tokens
2.2 Patterns for Proofs of Compute Work
Case Study:
Analysis of Bitcoin
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
E(Ri) α Hi * T
E() = expected
value
# tokens (BTC)
dispensed each
block
block
rewards
hash power of actor
= contribution to
“security”
Result of Bitcoin’s objective function:
People are maximizing security! = Maximizing electricity
More power than USA by mid 2019
Case Study:
Design of Ocean
1. Formulate the Problem:
(a) Who are stakeholders? What do they want?
Objective function: maximize supply of relevant data
Token rewards if: supply relevant data
Token rewards if: supply data, and curate it
1. Formulate the problem:
(b) Translate into objectives and constraints
Constraints = checklist:
• For priced data, is there incentive for supplying more? Referring?
• For priced data, good spam prevention?
• For free data, is there incentive for supplying more? Referring?
• For free data, good spam prevention?
• Does the token give higher marginal value to users of the network versus external
investors? Eg Does return on capital increase as stake increases?
• Are people incentivized to run keepers?
• Is it simple? Is onboarding low-friction?
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints – values too!
2. Try Existing Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market.
Curation: Pay tokens to listen.
Key Question 1 2 3 4 5
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔
2. Try existing patterns: evaluate on objectives &
constraints. None passed…
3. Try New Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market. Curation:
Pay tokens to listen.
5. Data registry + free data curation market. Curation: Stake
tokens as belief in reputation. Auto CDN.
6. Actor registry + free&priced data curation market. Curation:
Stake tokens as belief in reputation. Auto CDN. “Proofed
Curation Market”
Key Question 1 2 3 4 5 6
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔ ✔
3. Try new patterns: evaluate on objectives &
constraints
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: Proofed Curation Market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
#TokenEngineering
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Engineering theory,
practice and tools
+ responsibility
Token Engineering for Analysis & Synthesis
Conclusion
Trent McConaghy
@trentmc0
• Token design ≈ optimization design
• So, approach token design as optimization design!
1. Formulate problem. Objectives, constraints.
2. Try existing patterns. Iterate.
3. If needed, try new design.
• This process helped a lot for designing Ocean (so far)
• Token Engineering = Theory + practice + tools + responsibility
Conclusion:
Towards a Practice of #TokenEngineering

More Related Content

What's hot

The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
Alessandro Sanino
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
Jongseung Kim
 
On Engineering Economic Systems
On Engineering Economic SystemsOn Engineering Economic Systems
On Engineering Economic Systems
Michael Zargham
 
Tokenomics - Blockchain & Cryptocurrency Tokenomics
Tokenomics - Blockchain & Cryptocurrency TokenomicsTokenomics - Blockchain & Cryptocurrency Tokenomics
Tokenomics - Blockchain & Cryptocurrency Tokenomics
Codezeros
 
Consensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & AnalysisConsensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & Analysis
Zak Cole
 
What is Erc20 token? How it Works/
What is Erc20 token? How it Works/What is Erc20 token? How it Works/
What is Erc20 token? How it Works/
Developcoins
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Edureka!
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
101 Blockchains
 
Token Engineering from an Economic Perspective
Token Engineering from an Economic Perspective Token Engineering from an Economic Perspective
Token Engineering from an Economic Perspective
Token Engineering
 
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Simplilearn
 
Messari Report Crypto Theses for 2022
Messari Report Crypto Theses for 2022Messari Report Crypto Theses for 2022
Messari Report Crypto Theses for 2022
IQbal KHan
 
Tokenomics
TokenomicsTokenomics
blockchain .technology.pptx
blockchain .technology.pptxblockchain .technology.pptx
blockchain .technology.pptx
Amit Kumar
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential Opportunities
QuasarVentures
 
Blockchain
BlockchainBlockchain
Blockchain
ChrisSwanson37
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
Johannes Ahlmann
 
Blockchain Explained
Blockchain ExplainedBlockchain Explained
Blockchain Explained
Shermin Voshmgir
 
Blockchain
BlockchainBlockchain
Blockchain
Mohit Singh
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
Zied GUESMI
 

What's hot (20)

The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
The Ethereum Blockchain - Introduction to Smart Contracts and Decentralized A...
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
 
On Engineering Economic Systems
On Engineering Economic SystemsOn Engineering Economic Systems
On Engineering Economic Systems
 
Tokenomics - Blockchain & Cryptocurrency Tokenomics
Tokenomics - Blockchain & Cryptocurrency TokenomicsTokenomics - Blockchain & Cryptocurrency Tokenomics
Tokenomics - Blockchain & Cryptocurrency Tokenomics
 
Consensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & AnalysisConsensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & Analysis
 
What is Erc20 token? How it Works/
What is Erc20 token? How it Works/What is Erc20 token? How it Works/
What is Erc20 token? How it Works/
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
 
Token Engineering from an Economic Perspective
Token Engineering from an Economic Perspective Token Engineering from an Economic Perspective
Token Engineering from an Economic Perspective
 
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
Blockchain Explained | How Does A Blockchain Work | Blockchain Explained Simp...
 
Messari Report Crypto Theses for 2022
Messari Report Crypto Theses for 2022Messari Report Crypto Theses for 2022
Messari Report Crypto Theses for 2022
 
Tokenomics
TokenomicsTokenomics
Tokenomics
 
blockchain .technology.pptx
blockchain .technology.pptxblockchain .technology.pptx
blockchain .technology.pptx
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential Opportunities
 
Blockchain
BlockchainBlockchain
Blockchain
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Blockchain Explained
Blockchain ExplainedBlockchain Explained
Blockchain Explained
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 

Similar to Towards a Practice of Token Engineering

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Trent McConaghy
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and Nature
Trent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
Trent McConaghy
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
Krishnaram Kenthapadi
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
blockchainexe
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
Amazon Web Services
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
Facultad de Informática UCM
 
900 keynote abbott
900 keynote abbott900 keynote abbott
900 keynote abbott
Rising Media, Inc.
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
MicheleNati
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
Athens Big Data
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
PAPIs.io
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET Journal
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - Reboot
Marion DE SOUSA
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
Dinis Cruz
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Boris Adryan
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Gautam Anand
 
Tokenomics
TokenomicsTokenomics
Tokenomics
Gayan Samarakoon
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid language
q-Maxim
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdf
ssuser3ee399
 

Similar to Towards a Practice of Token Engineering (20)

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and Nature
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
900 keynote abbott
900 keynote abbott900 keynote abbott
900 keynote abbott
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - Reboot
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Tokenomics
TokenomicsTokenomics
Tokenomics
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid language
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdf
 

More from Trent McConaghy

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
Trent McConaghy
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
Trent McConaghy
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
Trent McConaghy
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
Trent McConaghy
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
Trent McConaghy
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real Estate
Trent McConaghy
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
Trent McConaghy
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Trent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
Trent McConaghy
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]
Trent McConaghy
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
Trent McConaghy
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the Planet
Trent McConaghy
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In Python
Trent McConaghy
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Trent McConaghy
 

More from Trent McConaghy (14)

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real Estate
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the Planet
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In Python
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Towards a Practice of Token Engineering

  • 1. Towards a Practice of Token Engineering Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18. Realization: Tokenized Ecosystems Are a Lot Like Evolutionary Algorithms! What Tokenized ecosystem Evolutionary Algorithm Goals Block reward function E.g. “Maximize hash rate” Objective function E.g. “Minimize error” Measurement & test Proof E.g. “Proof of Work” Evaluate fitness E.g. “Simulate circuit” System agents Miners & token holders (humans) In a network Individuals (computer agents) In a population System clock Block reward interval Generation Incentives & Disincentives You can’t control human, Just reward: give tokens And punish: slash stake You can’t control individual, Just reward: reproduce And punish: kill
  • 19. We can approach token design as optimization design.
  • 21. Steps in Optimization Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing solver. If needed, try different problem formulations or solvers. 3. Design new solver?
  • 22. 1. Formulation of an optimization problem Objectives & constraints in a design space
  • 23. 2. Try an existing solver. Does it converge?
  • 24. 3. Design new solver
  • 25. Example of a Successful Outcome
  • 27. Steps in Token Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 28. 1. Formulate the Problem (a) Ask •Who are my potential stakeholders? •And what do each of them want? •What are possible attack vectors? (b) Translate those into objectives and constraints.
  • 29. 2. Try Existing Patterns 1. Curation 2. Proofs of human or compute work 3. Identity 4. Reputation 5. Governance / software updates 6. Third-party arbitration 7. …
  • 30. 2.1 Patterns for Curation •Binary membership: Token Curated Registry (TCR) •Discrete-valued membership: Stake Machines •Continuous-valued membership: Curation Markets characterized by bonding curve •Hierarchical membership: each label gets a TCR •Work tied to membership: Proofed Curation Market •Non-fungible tokens: Re-Fungible Tokens
  • 31. 2.2 Patterns for Proofs of Compute Work
  • 33. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log
  • 34. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log E(Ri) α Hi * T E() = expected value # tokens (BTC) dispensed each block block rewards hash power of actor = contribution to “security”
  • 35. Result of Bitcoin’s objective function: People are maximizing security! = Maximizing electricity More power than USA by mid 2019
  • 37. 1. Formulate the Problem: (a) Who are stakeholders? What do they want?
  • 38. Objective function: maximize supply of relevant data Token rewards if: supply relevant data Token rewards if: supply data, and curate it 1. Formulate the problem: (b) Translate into objectives and constraints
  • 39. Constraints = checklist: • For priced data, is there incentive for supplying more? Referring? • For priced data, good spam prevention? • For free data, is there incentive for supplying more? Referring? • For free data, good spam prevention? • Does the token give higher marginal value to users of the network versus external investors? Eg Does return on capital increase as stake increases? • Are people incentivized to run keepers? • Is it simple? Is onboarding low-friction? 1. Formulate the problem: (b) Translate into objectives & constraints
  • 40. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 41. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 42. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 43. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 44. 1. Formulate the problem: (b) Translate into objectives & constraints – values too!
  • 45. 2. Try Existing Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen.
  • 46. Key Question 1 2 3 4 5 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ 2. Try existing patterns: evaluate on objectives & constraints. None passed…
  • 47. 3. Try New Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen. 5. Data registry + free data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. 6. Actor registry + free&priced data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. “Proofed Curation Market”
  • 48. Key Question 1 2 3 4 5 6 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ ✔ 3. Try new patterns: evaluate on objectives & constraints
  • 49. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: Proofed Curation Market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 50. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 52. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints
  • 53. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints Engineering theory, practice and tools + responsibility Token Engineering for Analysis & Synthesis
  • 55. Trent McConaghy @trentmc0 • Token design ≈ optimization design • So, approach token design as optimization design! 1. Formulate problem. Objectives, constraints. 2. Try existing patterns. Iterate. 3. If needed, try new design. • This process helped a lot for designing Ocean (so far) • Token Engineering = Theory + practice + tools + responsibility Conclusion: Towards a Practice of #TokenEngineering