Blockchain Beyond Bitcoin. Mark O Connell

Size: px
Start display at page:

Download "Blockchain Beyond Bitcoin. Mark O Connell"

Transcription

1 Mark O Connell mark@mkoconnell.com

2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 2

3 Abstract Blockchain is the name of a new class of distributed application which can coordinate independent operations across multiple machines in an untrusted network and produce a consensus result on both the correctness of the individual operations as well as the order in which the operations were executed. While the most well known use case for blockchain is Bitcoin, the technology itself has many other applications and implementations and use cases are arising in areas as diverse as international finance, B2B transactions, identity management, domain name registration, and many more. This tutorial will introduce the blockchain family of technologies, will discuss the technical aspects of the implementations and how consensus is achieved despite the lack of trust amongst the machines, will explore how this basic technology can be applied for non-currency related use cases, and will discuss alternative implementations of the technology and their advantages and disadvantages. Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 3

4 Definitions: Bitcoin vs Blockchain Digital currency No gov t control Cryptographically secured payments Ordered list of records Distributed ledger Decentralized Self-policing Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 4 Reserved.

5 How does the bitcoin blockchain work? New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 5 Reserved. If successful, tell other blockchain nodes about the new block

6 Why does this work? Cryptographically signed (PKI) Sent to multiple nodes Must reference txs where money originated Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

7 Why does this work? Validate signature Validate origin txs Must reference txs where money originated Validated on multiple nodes Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

8 Why does this work? Block hash must match a certain pattern ~10 minutes to generate, by varying nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

9 Why does this work? Other nodes validate: Txs are valid Hash matches pattern Links to final block Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

10 Why all the trouble? Validate multiple times? 10 minute Proof of Work? Designed for a no-trust environment Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved.

11 There s more to life than money Property deeds Artwork provenance Car title / ownership Medical history Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 11Reserved.

12 There s more than one way Po-tay-to? Po-tah-to? Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 12Reserved.

13 What makes a distributed ledger? Forgery protection Information distribution Redundant network Decentralized network Internal fraud protection Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 13Reserved.

14 An example + Forgery protection - PKI Information distribution nodes chatter Redundant network mining rewards Decentralized network mining rewards Internal fraud protection Proof of Work Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 14Reserved.

15 An example Forgery protection - PKI Information distribution nodes chatter whitelist Redundant network Interested participants Decentralized network Interested participants Internal fraud protection Whitelisted nodes Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 15Reserved.

16 An example Forgery protection - PKI Information distribution Known node membership Redundant network Specific named nodes Decentralized network Specific named nodes Internal fraud protection Round robin mining Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 16Reserved.

17 Proof of Work alternatives Once there is some trust: Round robin Proof of Stake Proportional to previously mined blocks Practical Byzantine Fault Tolerance 2/3rds of participants agree Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 17Reserved.

18 A world of possibilities Identity B2B Smart Contracts DRM Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 18Reserved.

19 Attribution & Feedback The SNIA Education Committee thanks the following Individuals for their contributions to this Tutorial. Authorship History Mark O Connell Updates: Additional Contributors Please send any questions or comments regarding this SNIA Tutorial to tracktutorials@snia.org Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 19

20 How does the Bitcoin blockchain work? 1. Send transaction to blockchain node (x bitcoins to Y) 2. Node validates the transaction 3. Node groups (ordered) transactions together 4. Node mines the group Competing against other miners 5. Node broadcasts its results If another miner got here first, go back to step 2 Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 20Reserved.

21 How does the Bitcoin blockchain work? Tx 1 Tx 2 Tx 3 Tx 4 Tx 5 Tx N-1 Tx N Hash of block Hash of prior block Nonce Tx aa Tx ab Tx ac Tx ad Tx ae Tx ay Tx az Hash of block Hash of prior block Nonce Tx zkjdaa Tx zkjdab Tx zkjdac Tx zkjdad Tx zkjdae Tx zkjday Tx zkjdaz Hash of block Hash of prior block Nonce Tx new1 Tx new2 Tx new3 Tx new4 Tx new5 Tx new N-1 Tx new N TBD hash of block Hash of prior block TBD Nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 21Reserved.

22 How does the Bitcoin blockchain work? Tx 1 Tx aa Tx zkjdaa Tx 2 Tx ab Tx zkjdab Tx 3 Tx ac Tx zkjdac Tx 4 Tx ad Tx zkjdad Tx 5 Tx ae Tx zkjdae Tx N-1 Tx ay Tx zkjday Tx N Hash of block Tx az Hash of block Tx zkjdaz Hash of block Hash of prior block Hash of prior block Hash of prior block Nonce Nonce Nonce Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 22Reserved.

23 New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 23Reserved.

24 How does the bitcoin blockchain work? New tx Is it valid? Create a new block with this and other txs Try to add it to the chain Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights 24Reserved. If successful, tell other blockchain nodes about the new block

25 Tutorial Preparation Guidelines Large size slide page number is deliberate Easier for audience to follow from handouts Keep slide-count to amount you can cover in time allotted Maximum slides for 60-minute session Maximum slides for 45-minute session Title, boilerplate (e.g. legal, Attribution & Feedback contents, and separator slides don t count against limit You may have extra slides in an Appendix (max. of ~30% extra) 3 levels of bullets maximum 4 to 6 Bullets: use 2 column text slide Use scheme colors for hyperlinks AVOID Moving or resizing the text area Changing fonts, point sizes or spacing Use color, bold and italics for emphasis Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 26

26 Tutorial Preparation Guidelines (cont.) Title Slide: List the presentation title, presenter name/company name; if a co -presenter, list name/company name (no addresses). Always include: Legal, Abstract, and Attribution & Feedback slides (do not delete these slides) Legal slide is #2 slide Abstract Slide is #3: View the sample abstract in SNIA Tutorial Preparation Guidelines presentation and modify your abstract to fit that format. Attribution & Feedback (authorship history & contributors) is the final slide before any appendix Please try to stay with template colors in case re-coloration is necessary. For information on approved colors, view Run spell check when done Choose Tools, Spelling in Powerpoint Choose Review, Spelling in Powerpoint 2007 Save your presentation as a Powerpoint 2007.pptx presentation file Refer to the FAQ for SNIA Tutorials General Information at Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 27

27 Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 28

28 Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 29

29 Graphics Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 30

30 Refer to Other Tutorials Use this icon to refer to other SNIA Tutorials where applicable Check out SNIA Tutorial: Enter Tutorial Title Here Approved SNIA Tutorial 2017 Storage Networking Industry Association. All Rights Reserved. 31

WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage

WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Virtualization Practices:

Virtualization Practices: Virtualization Practices: Providing a Complete Virtual Solution in a Box Jyh-shing Chen, NetApp Author: Jyh-shing Chen, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

Analysis and Optimization. Carl Waldspurger Irfan Ahmad CloudPhysics, Inc.

Analysis and Optimization. Carl Waldspurger Irfan Ahmad CloudPhysics, Inc. PRESENTATION Practical Online TITLE GOES Cache HERE Analysis and Optimization Carl Waldspurger Irfan Ahmad CloudPhysics, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

How to create a synthetic workload test. Eden Kim, CEO Calypso Systems, Inc.

How to create a synthetic workload test. Eden Kim, CEO Calypso Systems, Inc. PRESENTATION Enterprise TITLE Applications GOES HERE How to create a synthetic workload test Eden Kim, CEO Calypso Systems, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Virtualization Practices: Providing a Complete Virtual Solution in a Box PRESENTATION TITLE GOES HERE Virtualization Practices: Providing a Complete Virtual Solution in a Box Jyh-shing Chen / NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

Tutorial. A New Standard for IP Based Drive Management. Mark Carlson SNIA Technical Council Co-Chair

Tutorial. A New Standard for IP Based Drive Management. Mark Carlson SNIA Technical Council Co-Chair Tutorial A New Standard for IP Based Drive Management Mark Carlson SNIA Technical Council Co-Chair About the Instructor Mark A. Carlson, Principal Engineer, Industry Standards at Toshiba, has more than

More information

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation PRESENTATION TITLE GOES HERE January 28, 206 SNIA Presenters Alex McDonald Chair - SNIA Cloud Storage NetApp Martin Rosner

More information

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company PRESENTATION Data Protection TITLE GOES HERE in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc.

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc. Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance Ray Lucchesi Silverton Consulting, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Cloud Archive and Long Term Preservation Challenges and Best Practices

Cloud Archive and Long Term Preservation Challenges and Best Practices Cloud Archive and Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe Inc. SNIA Legal Notice The material contained

More information

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation Planning For Persistent Memory In The Data Center Sarah Jelinek/Intel Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Application Recovery. Andreas Schwegmann / HP

Application Recovery. Andreas Schwegmann / HP Intelligent PRESENTATION Architecture TITLE GOES HERE for Application Recovery Andreas Schwegmann / HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise

More information

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability Multi-Cloud Storage: Addressing the Need for Portability and Interoperability Live Webcast December 12, 2017 12:00 pm PT Today s Presenters John Webster Senior Partner Evaluator Group Mark Carlson SNIA

More information

High Availability Using Fault Tolerance in the SAN. Wendy Betts, IBM Mark Fleming, IBM

High Availability Using Fault Tolerance in the SAN. Wendy Betts, IBM Mark Fleming, IBM High Availability Using Fault Tolerance in the SAN Wendy Betts, IBM Mark Fleming, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual

More information

Ron Emerick, Oracle Corporation

Ron Emerick, Oracle Corporation PCI Express PRESENTATION Virtualization TITLE GOES HERE Overview Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.

More information

SAS: Today s Fast and Flexible Storage Fabric. Rick Kutcipal President, SCSI Trade Association Product Planning and Architecture, Broadcom Limited

SAS: Today s Fast and Flexible Storage Fabric. Rick Kutcipal President, SCSI Trade Association Product Planning and Architecture, Broadcom Limited SAS: Today s Fast and Flexible Storage Fabric Rick Kutcipal President, SCSI Trade Association Product Planning and Architecture, Broadcom Limited SNIA Legal Notice The material contained in this tutorial

More information

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc.

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc. Overview Brett Allison, IntelliMagic, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this

More information

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata John Webster Principal IT Advisor, Illuminata SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations

More information

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular Apples to Apples, Pears to Pears in SSS performance Benchmarking Esther Spanjer, SMART Modular SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and

More information

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft Notes & Lessons Learned from a Field Engineer Robert M. Smith, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

SAS: Today s Fast and Flexible Storage Fabric

SAS: Today s Fast and Flexible Storage Fabric SAS: Today s Fast and Flexible Storage Fabric Cameron T Brett SCSI Trade Association Product Marketing Director, Toshiba America Electronic Components, Inc Rick Kutcipal President, SCSI Trade Association

More information

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation Mark Kaufman, Iron Mountain SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Tiered File System without Tiers. Laura Shepard, Isilon

Tiered File System without Tiers. Laura Shepard, Isilon Laura Shepard, Isilon SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE LTFS Bulk Standard PRESENTATION TITLE GOES HERE February 10, 2015 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual

More information

SRM: Can You Get What You Want? John Webster, Evaluator Group.

SRM: Can You Get What You Want? John Webster, Evaluator Group. SRM: Can You Get What You Want? John Webster, Evaluator Group. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

Adrian Proctor Vice President, Marketing Viking Technology

Adrian Proctor Vice President, Marketing Viking Technology Storage PRESENTATION in the TITLE DIMM GOES HERE Socket Adrian Proctor Vice President, Marketing Viking Technology SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

ADVANCED DATA REDUCTION CONCEPTS

ADVANCED DATA REDUCTION CONCEPTS ADVANCED DATA REDUCTION CONCEPTS Thomas Rivera, Hitachi Data Systems Gene Nagle, BridgeSTOR Author: Thomas Rivera, Hitachi Data Systems Author: Gene Nagle, BridgeSTOR SNIA Legal Notice The material contained

More information

Jeff Dodson / Avago Technologies

Jeff Dodson / Avago Technologies SNIA PRESENTATION Tutorial: TITLE PCIe GOES Shared HERE I/O Jeff Dodson / Avago Technologies SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Use Cases for iscsi and FCoE: Where Each Makes Sense

Use Cases for iscsi and FCoE: Where Each Makes Sense Use Cases for iscsi and FCoE: Where Each Makes Sense PRESENTATION TITLE GOES HERE February 18, 2014 Today s Presenters David Fair, SNIA ESF Business Development Chair - Intel Sameh Boujelbene - Director,

More information

Felix Xavier CloudByte Inc.

Felix Xavier CloudByte Inc. Storage PRESENTATION Grid TITLE using GOES HERE issi Felix Xavier loudbyte Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies Object Storage 201 PRESENTATION TITLE GOES HERE Understanding Architectural Trade-offs in Object Storage Technologies SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

Storage in combined service/product data infrastructures. Craig Dunwoody CTO, GraphStream Incorporated

Storage in combined service/product data infrastructures. Craig Dunwoody CTO, GraphStream Incorporated Storage in combined service/product data infrastructures Craig Dunwoody CTO, GraphStream Incorporated SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise

More information

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar ADVANCED DEDUPLICATION CONCEPTS Thomas Rivera, BlueArc Gene Nagle, Exar SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee Advanced PRESENTATION Data Reduction TITLE GOES HERE Concepts Tom Sas HP Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice The material contained in this tutorial

More information

Felix Xavier CloudByte Inc.

Felix Xavier CloudByte Inc. Storage PRESENTATION Grid TITLE using GOES HERE issi Felix Xavier loudbyte Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Architectural Principles for Networked Solid State Storage Access

Architectural Principles for Networked Solid State Storage Access Architectural Principles for Networked Solid State Storage Access SNIA Legal Notice! The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.! Member companies and individual

More information

Evolution of Fibre Channel. Mark Jones FCIA / Emulex Corporation

Evolution of Fibre Channel. Mark Jones FCIA / Emulex Corporation SNIA PRESENTATION Tutorial: TITLE The GOES Continued HERE Evolution of Fibre Channel Mark Jones FCIA / Emulex Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the

More information

Restoration Technologies

Restoration Technologies Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Gideon Senderov / NEC Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice The material

More information

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG Interoperable Cloud Storage with the CDMI Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Alternatives to Blockchains. Sarah Meiklejohn (University College London) Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

Deploying Public, Private, and Hybrid. Storage Cloud Environments

Deploying Public, Private, and Hybrid. Storage Cloud Environments Deploying Public, Private, and Hybrid PRESENTATION TITLE GOES HERE Storage Cloud Environments Marty Stogsdill, Oracle Greg Kleiman, NetApp SNIA Legal Notice! The material contained in this tutorial is

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Mark Rogov, Dell EMC Chris Conniff, Dell EMC. Feb 14, 2018

Mark Rogov, Dell EMC Chris Conniff, Dell EMC. Feb 14, 2018 Mark Rogov, Dell EMC Chris Conniff, Dell EMC Feb 14, 2018 SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA unless otherwise noted. Member companies and individual

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG Interoperable Cloud Storage with the CDMI Standard Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Testing. Michael Ault, IBM Oracle FlashSystem Consulting Manager

Testing. Michael Ault, IBM Oracle FlashSystem Consulting Manager Utilizing PRESENTATION VDBench TITLE to Perform GOES HERE IDC AFA Testing Michael Ault, IBM Oracle FlashSystem Consulting Manager SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS Dejan Kocic, NetApp Flash Memory Storage 2018 Welcome to SNIA Education Afternoon at Flash Memory Summit 2018

More information

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE Luanne Dauber, Pure Storage Author: Matt Kixmoeller, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

Ramin Elahi, Adjunct Faculty UC Santa Cruz Silicon Valley

Ramin Elahi, Adjunct Faculty UC Santa Cruz Silicon Valley Fog Computing PRESENTATION TITLE and GOES its Ecosystem HERE Ramin Elahi, Adjunct Faculty UC Santa Cruz Silicon Valley 2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

The Benefits of Solid State in Enterprise Storage Systems. David Dale, NetApp

The Benefits of Solid State in Enterprise Storage Systems. David Dale, NetApp The Benefits of Solid State in Enterprise Storage Systems David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Expert Insights: Expanding the Data Center with FCoE

Expert Insights: Expanding the Data Center with FCoE Expert Insights: Expanding the Data Center with FCoE PRESENTATION TITLE GOES HERE Joe Kastura, Joe Gervais, Jason Blosil August 20, 2014 Today s Presenters Jason Blosil, SNIA ESF Chair Product Marketing

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Alternative Consensus Algorithms. Murat Osmanoglu

Alternative Consensus Algorithms. Murat Osmanoglu Alternative Consensus Algorithms Murat Osmanoglu Bitcoin Block i-1 Block i Block i+1 Hash i-2 Nonce i-1 Hash i-1 Nonce i Hash i Nonce i+1 tx tx tx tx tx tx tx tx tx tx tx tx Do you really need a Blockchain?

More information

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards The blockchain game GAMEMASTER NOTES Time: 10 minutes The game: up to 9 info/question cards + a short test with 7 questions Reward: The game If you listen very carefully during the first 4 cards (or use

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics Today s Presenters Bob Plumridge HDS Chief Technology Officer - EMEA Alex McDonald NetApp CTO Office 2 SNIA Legal Notice

More information

Data Deduplication Methods for Achieving Data Efficiency

Data Deduplication Methods for Achieving Data Efficiency Data Deduplication Methods for Achieving Data Efficiency Matthew Brisse, Quantum Gideon Senderov, NEC... SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed The Role of WAN Optimization in Cloud Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

OpenStack Manila An Overview of Manila Liberty & Mitaka

OpenStack Manila An Overview of Manila Liberty & Mitaka OpenStack Manila An Overview of Manila Liberty & Mitaka PRESENTATION TITLE GOES HERE October 7, 2015 SNIA Legal Notice! The material contained in this tutorial is copyrighted by the SNIA unless otherwise

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Effective Storage Tiering for Databases

Effective Storage Tiering for Databases Effective Storage Tiering for Databases Murthy V Mamidi Raghu Malige Symantec Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

BaFin-Tech 2018 BlockChain & Security (from #developerview)

BaFin-Tech 2018 BlockChain & Security (from #developerview) BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain

More information

I. Introduction. II. Security, Coinage and Attacks

I. Introduction. II. Security, Coinage and Attacks Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain

More information

Performance and Innovation of Storage. Advances through SCSI Express

Performance and Innovation of Storage. Advances through SCSI Express Performance and Innovation of Storage PRESENTATION TITLE GOES HERE Advances through SCSI Express Marty Czekalski President, SCSI Trade Association - Emerging Interface and Architecture Program Manager,

More information

Introduction to Blockchain

Introduction to Blockchain Diogo Trentini e Lauro Gripa Neto Introduction to Blockchain www.magrathealabs.com source: Scott Adams' Dilbert source: Gartner Inc. SUMMARY 1. 2. 3. 4. 5. Introduction Theoretical concepts Applications

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

ASPECTS OF DEDUPLICATION. Dominic Kay, Oracle Mark Maybee, Oracle

ASPECTS OF DEDUPLICATION. Dominic Kay, Oracle Mark Maybee, Oracle ASPECTS OF DEDUPLICATION Dominic Kay, Oracle Mark Maybee, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

SNIA Tutorial 3 EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE: Part Teal Queues, Caches and Buffers

SNIA Tutorial 3 EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE: Part Teal Queues, Caches and Buffers SNIA Tutorial 3 EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE: Part Teal Queues, Caches and Buffers John Kim, Mellanox - @Tier1Storage J Metz, Cisco - @drjmetz 2018 Flash Memory Summit Welcome to SNIA Education

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More Appendix Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More Appendix TrendLabs Security Intelligence Blog Lenart Bermejo, Jordan Pan, and Cedric Pernet July 2017 TREND MICRO LEGAL

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas SCSI Security Nuts and Bolts Ralph Weber, ENDL Texas SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations

More information

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization -

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization - Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization - Rob Peglar Xiotech Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood

More information

Using Chains for what They re Good For

Using Chains for what They re Good For Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language

More information

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin

More information