Intro to R3. R3 Engineering 05/12/16.
|
|
- Rosalind Caldwell
- 5 years ago
- Views:
Transcription
1 Intro to R3 R3 Engineering 05/12/16.
2 How is R3 enabling collaboration? Most Start-ups: Create a Product Market it and sell it Refine it (maybe) R3: Create a Consortium 70+ global institutions Collaborate on requirements; open source passionate people Build it together
3 R3 Global Members
4 Bridging the gap towards mainstream adoption Tipping Point We are here Hype Talk POCs Collaboration Early Adoptions Building Value Blocks Definition Collaboration Governance Technology Regulation Standards Early Scaled Deployments Market Interfaces Main Stream Deployments The Norm
5 Consortium Projects
6 The Empire Strikes Back! December 6 th 2016.
7 Stuff we will cover Interesting features Unusual design decisions Next steps Caveat: will mix implemented vs pending work. Will call out what s not coded with a * p7.
8 That s us! HyperLedger London p8.
9 OK, so how does it work?
10 Basics you must know No block chains, no mining Permissioned networks JVM based Open source reference implementation, unfinished Tech white paper is a design doc HyperLedger London p10.
11 Bitcoin-esque tx structure Ledger is composed of (output) states Execution of code for both inputs and outputs Signatures external to the transaction data Platform checks signatures, contract code only checks presence of pubkeys Commands parameterise transactions Key randomisation with separable identities* HyperLedger London p11.
12 p12.
13 But with extras Transactions can have attachments. Attachments are zip files referred to by hash. Can contain: Contract bytecode Legal documents explaining what it s meant to do Static reference data (e.g. holiday calendars) Identity certificates Anything else Attachments form a per-tx filesystem and files cannot overlap. Attachments are deduplicated on the wire. HyperLedger London p13.
14 But with extras Transactions are structured as a Merkle tree. Can selectively reveal different parts. States (outputs) can contain arbitrary object graphs (at present may restrict this soon) Encumbrances allow you to combine different contract logic. HyperLedger London p14.
15 Unusual design decision 1 No broadcast: transactions resolved lazily Consequence: DoS handling is simpler Consequence: bulk data import is silent Consequence: must specify where data is sent HyperLedger London p15.
16 P2P network structure All communication bidirectional Messages organised into flows A flow is an uber-thread that survives process restarts, stored in the database Uses fibers behind the scenes How? p16.
17 Flows Flows specify the identities to which messages are sent Flows are type safe Corda network is SMTP-like Messages are buffered to disk and delivery is retried up to the event horizon Flows can interact with people* and internal systems Protocol is AMQP/1.0 + TLS, node is services connected to an MQ broker HyperLedger London p17.
18 Flows Flows have progress tracking Flows can read/write to the node s relational database Flows can invoke sub-flows Corda provides a standard library of flows for common tasks HyperLedger London p18.
19 <show flow code>
20 SQL support Pity the fool who tries to build a block chain app! New databases are hip but: How to analyse data in them? How to combine with private data? Don t even think about migrating existing apps or data Most platforms give you REST and then you re alone HyperLedger London p20.
21 SQL support Corda built on the JVM Embeds the H2 relational database. JDBC access. Support for other external DBs in future* State schemas can be JPA annotated with conversion code in the smart contract Relevant states written to DB tables State schemas commonly contain slots for join keys HyperLedger London p21.
22 p22.
23 Notaries and consensus Pluggable consensus algorithms Notaries can be/should be distributed Notary implementations: Onebox: for local testing/dev work Raft: robust against node failure, not malice Above x2 for non-validating modes In future, BFT-SMaRT* HyperLedger London p23.
24 Deterministic JVM Corda contracts defined using restricted, cut down bytecode Most features are gone, e.g. No threading or finalisers No access to external data (files, networks, RNGs, clocks) Object.hashCode modified to be derived from tx hash* No native code Bytecode instrumented to do cost accounting Exception handlers adjusted to prevent thread termination strictfp enforced everywhere No invokedynamic Class libraries bytecode rewritten as well (+more!) HyperLedger London p24.
25 Client RPC Primary comms is via Client RPC Small (~800 loc) RPC stack that operates over MQ Can marshal Rx observables: streaming of results is natural Can handle temporary connection problems, backpressure management*, buffering etc Thin client library exposes reactive collections that can be directly bound to JavaFX UI and mapped/filtered/sorted Functional, pipeline oriented programming. HyperLedger London p25.
26 Experimental universal contract val one_touch = arrange { actions { highstreetbank may { "expire".giventhat(after(" ")) { zero } } acmecorp may { "knock in".giventhat(eur / USD gt 1.3) { highstreetbank.owes(acmecorp, 1.M, USD) } } } } HyperLedger London p26.
27 Lots more! Novel design for client-side signing devices (e.g. TREZOR)* Identity management* Event scheduling Type system for modelling nettable obligations, assets, fungibility Network permissioning infrastructure Data distribution groups* HyperLedger London p27.
28 Corda: Next steps
29 The 4 s s Until now: experimentation and design Starting now: the road to production Security Serialisation Scalability Finishing the features HyperLedger London p29.
30 Privacy and scalability Start random key usage once identity cert management is done Novel privacy research in prototype phase that we will talk about more if/when it s more mature Implement vault soft-locks and start load testing, eliminating bugs HyperLedger London p30.
31 Goal API and protocol stability by EOQ p31.
Blockchain Frameworks
TechWatch Report Blockchain Frameworks Date: March 2018 Contributors: Hemant Sachdeva, Subhrojit Nag Contents 1 Objective... 3 2 Capabilities... 3 2.1 Consensus and Incentive Mechanism... 3 2.2 Limitation
More informationCorda Performance To infinity and beyond! James Carlyle Chief Engineer, R3 7 March 2018
Corda Performance To infinity and beyond! James Carlyle Chief Engineer, R3 7 March 2018 Performance Matters! Why does it matter? Ultimate capacity of network Efficiency and costs of infrastructure But.
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationCords and gumballs. Mike Hearn.
Cords and gumballs Mike Hearn mike@r3.com Who what why huh?! Who am I? Kotlin early adopter: first patch to Kotlin website Sept 2014, introduced to my first product Feb 2015. Lead Platform Engineer on
More informationDistributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017
Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently
More informationTechnical White Paper of. MOAC Mother of All Chains. June 8 th, 2017
Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationCorda: A Distributed Ledger
Corda: A Distributed Ledger Technical Whitepaper Mike Hearn 1 Corda: A distributed ledger Mike Hearn November 29, 2016 Version 0.5 Abstract A decentralised database with minimal trust between nodes would
More informationLecture 44 Blockchain Security I (Overview)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain
More informationISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM. Find us at
ISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM Find us at www.chainfrog.com Licenses Most blockchains are open-source (and you should not select a closed source one) If you are going
More informationHyperledger Fabric v1:
Marko Vukolić, IBM Research - Zurich May 4, 2017 Hyperledger Fabric v1: Rethinking Permissioned Blockchains Blockchain: du Bitcoin au Smart Contract 4 Mai 2017 2017 IBM Corporation What is a Blockchain?
More information2013 Cisco and/or its affiliates. All rights reserved. 1
2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System
More informationSOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits
SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship
More informationA Public Database for the Planet
A Public Database for the Planet Trent McConaghy @trentmc0 Motivation Here s your personal data My conclusion is that whatever you put on the internet you lose it. Maybe keep the rights, but lose the
More informationCOMP390 (Design &) Implementation
COMP390 (Design &) Implementation Phil (& Dave s) rough guide Consisting of some ideas to assist the development of large and small projects in Computer Science (and a chance for me to try out some features
More informationFabric Development Update & Discussion. Binh Nguyen
Fabric Development Update & Discussion Binh Nguyen New Inspiration: Simple but Effective 2 And can make $ 3 Background: Architecture membership No SPoF No SPoT peer Endorser application SDK Keys 1 Endorse
More informationCOMP390 (Design &) Implementation
COMP390 (Design &) Implementation Phil (& Dave s) rough guide Consisting of some ideas to assist the development of large and small projects in Computer Science (and a chance for me to try out some features
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationEnhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network
Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned
More informationDesign and Implementation of Modern Programming Languages (Seminar)
Design and Implementation of Modern Programming Languages (Seminar) Outline Administrivia Intro Schedule Topics GENERAL INFORMATION Intro Introduce students to the core techniques of scientific work Give
More informationAbstraction: Distributed Ledger
Bitcoin 2 Abstraction: Distributed Ledger 3 Implementation: Blockchain this happened this happened this happen hashes & signatures hashes & signatures hashes signatu 4 Implementation: Blockchain this happened
More informationTowards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley
Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity
More informationConnect with Remedy: SmartIT: Social Event Manager Webinar Q&A
Connect with Remedy: SmartIT: Social Event Manager Webinar Q&A Q: Will Desktop/browser alerts be added to notification capabilities on SmartIT? A: In general we don't provide guidance on future capabilities.
More informationRemote Procedure Call (RPC) and Transparency
Remote Procedure Call (RPC) and Transparency Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2014 Transparency in Distributed Systems Programmers accustomed to writing code for a single box
More informationCOMP390 (Design &) Implementation
COMP390 (Design &) Implementation A rough guide Consisting of some ideas to assist the development of large and small projects in Computer Science (With thanks to Dave Shield) Design & Implementation What
More informationMSMQ-MQSeries Bridge Configuration Guide White Paper
MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...
More informationIBM Software and POWER7: Powering performance for Smarter Planet Solutions
Branislav Hudec WebSphere Technical Sales Filip Slánička DB2 Technical Sales IBM Software and POWER7: Powering performance for Smarter Planet Solutions WebSphere on POWER7 Delivering benefits for your
More informationEthereum in Enterprise Context
Ethereum in Enterprise Context Blockchain Innovation Week Djuri Baars May 25th, 2018 Introduction Djuri Baars Lead Blockchain Team Djuri.Baars@rabobank.nl Blockchain Acceleration Lab Support organization
More informationNext Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4
Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4
More informationSESSION TITLE GOES HERE Second Cosmos for Line the Goes Business Here Intelligence Professional
Azure Cosmos DB with Power BI SESSION TITLE GOES HERE Second Cosmos for Line the Goes Business Here Intelligence Professional Cosmos for the Business Intelligence Professional Speaker Name Speaker Title
More informationPerformance Benchmarking & Optimizing Hyperledger Fabric Blockchain Platform
Performance Benchmarking & Optimizing Hyperledger Fabric Blockchain Platform Parth Thakkar, Senthil Nathan N, Balaji Vishwanathan IBM Research, India 1 Outline Background Blockchain & Hyperledger Fabric
More informationCATCH ERRORS BEFORE THEY HAPPEN. Lessons for a mature data governance practice
CATCH ERRORS BEFORE THEY HAPPEN Lessons for a mature data governance practice A guide to working with cross-departmental teams to establish proactive data governance for your website or mobile app. 2 Robust
More informationMaking Blockchain Real for Business IBM Blockchain Offering
Making Blockchain Real for Business IBM Blockchain Offering Guillaume Hoareau Certified IT Architect Blockchain on IBM z Systems SME V3.5, November 24th Page 1 Linux Foundation s Hyperledger Project Linux
More informationArcot Universal Client SAFE-Compliant Digital Signatures
Arcot Universal Client SAFE-Compliant Digital Signatures Scott Kern Solutions Architect Arcot, Inc. Company logo here Arcot Overview Authentication & Digital Signing Company Authentication 2-party and
More informationNVMe over Fabrics support in Linux Christoph Hellwig Sagi Grimberg
NVMe over Fabrics support in Linux Christoph Hellwig Sagi Grimberg 2016 Storage Developer Conference. Insert Your Company Name. All Rights Reserved. NVMe over Fabrics: the beginning Early 2014 demo apparently
More informationBBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -
BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationFailure models. Byzantine Fault Tolerance. What can go wrong? Paxos is fail-stop tolerant. BFT model. BFT replication 5/25/18
Failure models Byzantine Fault Tolerance Fail-stop: nodes either execute the protocol correctly or just stop Byzantine failures: nodes can behave in any arbitrary way Send illegal messages, try to trick
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationDetecting Insider Attacks on Databases using Blockchains
Detecting Insider Attacks on Databases using Blockchains Shubham Sharma, Rahul Gupta, Shubham Sahai Srivastava and Sandeep K. Shukla Department of Computer Science and Engineering Indian Institute of Technology,
More informationBlockhead Open Service Broker Jonathan Berkhahn Swetha Repakula IBM
Blockhead Open Service Broker Jonathan Berkhahn Swetha Repakula IBM The Blockhead Open Service Broker Jonathan Berkhahn: jaberkha@us.ibm.com Swetha Repakula: srepaku@us.ibm.com IBM Blockchain 3 1. Deploy
More information<Insert Picture Here> MySQL Cluster What are we working on
MySQL Cluster What are we working on Mario Beck Principal Consultant The following is intended to outline our general product direction. It is intended for information purposes only,
More informationEverything You Need to Know About MySQL Group Replication
Everything You Need to Know About MySQL Group Replication Luís Soares (luis.soares@oracle.com) Principal Software Engineer, MySQL Replication Lead Copyright 2017, Oracle and/or its affiliates. All rights
More informationIntroduction to WebSphere Platform Messaging (WPM)
Introduction to WebSphere Platform Messaging (WPM) Unit Objectives This unit will discuss: WAS 5 and Messaging Overview of New WebSphere Messaging System Service Integration Bus Architecture and Components
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationAvailability versus consistency. Eventual Consistency: Bayou. Eventual consistency. Bayou: A Weakly Connected Replicated Storage System
Eventual Consistency: Bayou Availability versus consistency Totally-Ordered Multicast kept replicas consistent but had single points of failure Not available under failures COS 418: Distributed Systems
More informationJaguar: Enabling Efficient Communication and I/O in Java
Jaguar: Enabling Efficient Communication and I/O in Java Matt Welsh and David Culler UC Berkeley Presented by David Hovemeyer Outline ' Motivation ' How it works ' Code mappings ' External objects ' Pre
More informationBuilding Applications on the Ethereum Blockchain
Building Applications on the Ethereum Blockchain Eoin Woods Endava @eoinwoodz licensed under a Creative Commons Attribution-ShareAlike 4.0 International License 1 Agenda Blockchain Recap Ethereum Application
More informationHow to Break Software by James Whittaker
How to Break Software by James Whittaker CS 470 Practical Guide to Testing Consider the system as a whole and their interactions File System, Operating System API Application Under Test UI Human invokes
More informationA Blockchain-based Mapping System
A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain
More informationExecutive Summary. It is important for a Java Programmer to understand the power and limitations of concurrent programming in Java using threads.
Executive Summary. It is important for a Java Programmer to understand the power and limitations of concurrent programming in Java using threads. Poor co-ordination that exists in threads on JVM is bottleneck
More informationGNU Radio Technical Update
GNU Radio Technical Update Johnathan Corgan GRCON17 GRCON17 GNU GNU Radio Radio Technical Technical Update Update September September 2017 2017 Topics Release 3.8 Features and capabilities Milestones and
More informationLINUX KERNEL UPDATES FOR AUTOMOTIVE: LESSONS LEARNED
LINUX KERNEL UPDATES FOR AUTOMOTIVE: LESSONS LEARNED TOM MCREYNOLDS, VLAD BUZOV AUTOMOTIVE SOFTWARE OCTOBER 15TH, 2013 Why kernel upgrades : the problem Linux Kernel cadence doesn t match Automotive s
More informationVlad Vinogradsky
Vlad Vinogradsky vladvino@microsoft.com http://twitter.com/vladvino Commercially available cloud platform offering Billing starts on 02/01/2010 A set of cloud computing services Services can be used together
More informationA Scalable Smart Contracts Platform
A Scalable Smart Contracts Platform! Shehar Bano! Postdoc, InfoSec group! University College London!! s.bano@ucl.ac.uk! @thatbano https://github.com/chainspace The Team Mustafa Al-Bassam! (UCL) Alberto
More informationVitheia IoT Services
DaaS & IoT Transformation: Going from a vendor locked system centric approach to an open user controlled citizen centric approach By Eugen Rotariu and Hans Aanesen EPR-forum (www.tgov.no) Vitheia AS(www.vitheia.com)
More informationIndirect Communication
Indirect Communication To do q Today q q Space and time (un)coupling Common techniques q Next time: Overlay networks xkdc Direct coupling communication With R-R, RPC, RMI Space coupled Sender knows the
More informationDistributed Ledger With Secure Data Deletion
Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the
More informationAsynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC
Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC The Business Objective Automated Business Collaboration Facilitating exchange of information
More informationJenkins: A complete solution. From Continuous Integration to Continuous Delivery For HSBC
Jenkins: A complete solution From Integration to Delivery For HSBC Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz Agenda Why Jenkins? Introduction and some facts about Jenkins Supported
More informationBlockchain & Distributed Internet Infrastructure
Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the
More informationThe Role and Contribution of OMA in Service Delivery Platform Standardization
The Role and Contribution of OMA in Service Delivery Platform Standardization ITU-T SDP Workshop 17 October 2011 Musa Unmehopa Technical Plenary Chairman, OMA Senior Manager, Alcatel-Lucent What I ll be
More informationScalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments *
Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments * Joesph JaJa joseph@ Mike Smorul toaster@ Fritz McCall fmccall@ Yang Wang wpwy@ Institute
More informationThe World s first Public Chain for Decentralized NaaS (Network-as-a-Service)
The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with
More informationHow to Pick the Right PI Developer Technology for your Project
How to Pick the Right PI Developer Technology for your Project Presented by Ray Verhoeff Product Manager Topics What Problems are you trying to solve? Where are you solving them? About PI Developer Technologies
More informationEssential Features of an Integration Solution
Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety
More informationIoPT Consulting, LLC 2 June 2015
NY/NJ IBM MQ & Application Integration User Group 1 NY/NJ IBM MQ & Application Integration User Group 2 NY/NJ IBM MQ & Application Integration User Group 3 NY/NJ IBM MQ & Application Integration User Group
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationECE 551 System on Chip Design
ECE 551 System on Chip Design Introducing Bus Communications Garrett S. Rose Fall 2018 Emerging Applications Requirements Data Flow vs. Processing µp µp Mem Bus DRAMC Core 2 Core N Main Bus µp Core 1 SoCs
More informationLecture 3: O/S Organization. plan: O/S organization processes isolation
6.828 2012 Lecture 3: O/S Organization plan: O/S organization processes isolation topic: overall o/s design what should the main components be? what should the interfaces look like? why have an o/s at
More informationToday: Fault Tolerance
Today: Fault Tolerance Agreement in presence of faults Two army problem Byzantine generals problem Reliable communication Distributed commit Two phase commit Three phase commit Paxos Failure recovery Checkpointing
More informationOutline. INF3190:Distributed Systems - Examples. Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles
INF3190:Distributed Systems - Examples Thomas Plagemann & Roman Vitenberg Outline Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles Today: Examples Googel File System (Thomas)
More informationRecalling the definition of design as set of models let's consider the modeling of some real software.
Software Design and Architectures SE-2 / SE426 / CS446 / ECE426 Lecture 3 : Modeling Software Software uniquely combines abstract, purely mathematical stuff with physical representation. There are numerous
More informationIBM Rational Software
IBM Rational Software Development Conference 2008 Introduction to the Jazz Technology Platform: Architecture Overview and Extensibility Scott Rich Distinguished Engineer, Jazz Architect IBM Rational SDP21
More informationHyperledger Fabric v1.0 Deep Dive. Binh Nguyen, IBM
Hyperledger Fabric v1.0 Deep Dive inh Nguyen, IM Contents > What How When 2 Reference rchitecture PIs, Events, SDKs IDENTITY Pluggable, Membership, Privacy and uditability of transactions. IDENTITY Membership
More informationDistributed Consensus Protocols
Distributed Consensus Protocols ABSTRACT In this paper, I compare Paxos, the most popular and influential of distributed consensus protocols, and Raft, a fairly new protocol that is considered to be a
More informationExtensibility, Componentization, and Infrastructure
Extensibility, Componentization, and Infrastructure Ted Slupesky (slupesky@us.ibm.com) Copyright 2006 IBM Corp. Available under terms of the Eclipse Public License http://www.eclipse.org/legal/epl-v10.html
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationA Comparison of Unified Parallel C, Titanium and Co-Array Fortran. The purpose of this paper is to compare Unified Parallel C, Titanium and Co-
Shaun Lindsay CS425 A Comparison of Unified Parallel C, Titanium and Co-Array Fortran The purpose of this paper is to compare Unified Parallel C, Titanium and Co- Array Fortran s methods of parallelism
More informationB2B Marketplace Platform
TeleTrusT-Informationstag "Blockchain" Frankfurt a.m., 13.07.2017 B2B Marketplace Platform Steffen Ortolf, DB Systel GmbH Dr. Michael Kuperberg, DB Systel GmbH Bertalan Vecsei, DB Systel GmbH 13.07.2017
More informationBLOCKCHAIN ARCHITECT Certification. Blockchain Architect
BLOCKCHAIN ARCHITECT Certification Blockchain Architect The Next-Gen IT Academy from Arcitura is dedicated to providing an ever-growing variety of training courses and accreditations in contemporary technologies
More informationGriddable.io architecture
Griddable.io architecture Executive summary This whitepaper presents the architecture of griddable.io s smart grids for synchronized data integration. Smart transaction grids are a novel concept aimed
More informationPAPER ON ANDROID ESWAR COLLEGE OF ENGINEERING SUBMITTED BY:
PAPER ON ANDROID ESWAR COLLEGE OF ENGINEERING SUBMITTED BY: K.VENU 10JE1A0555 Venu0555@gmail.com B.POTHURAJU 10JE1A0428 eswr10je1a0410@gmail.com ABSTRACT early prototypes, basic building blocks of an android
More informationTransaction & Bundle
IOTA TUTORIAL 10 Transaction & Bundle v1.0.0 INTRO In this video I will explain how an IOTA transaction looks like and what a transaction bundle is. TANGLE The squares in the Tangle represents transactions
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More informationMethodHandle implemention tips and tricks
MethodHandle implemention tips and tricks Dan Heidinga J9 VM Software Developer daniel_heidinga@ca.ibm.com J9 Virtual Machine 2011 IBM Corporation MethodHandles: a 30 sec introduction A method handle is
More informationBaFin-Tech 2018 BlockChain & Security (from #developerview)
BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain
More informationUpdate for TF-Storage. TF-Storage September 22nd, 2014
Update for TF-Storage TF-Storage meeting @Uppsala, September 22nd, 2014 National Data Storage 2 Short reminder what is this about: Security in Cloud? April 1, 2014 The Heartbleed bug Feb 26, 2014 Is catastrophic
More informationA Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum
A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users
More informationWhat's New in MySQL 5.7?
What's New in MySQL 5.7? Norvald H. Ryeng Software Engineer norvald.ryeng@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationCICS TS V4.2 - Connectivity
CICS TS V4.2 - Connectivity Ian J Mitchell IBM Hursley Wednesday August 10 th 2011 Session Number 9599 Disclaimer IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal
More informationPrivacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology
2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar
More informationBLOCKCHAIN CADEC Pär Wenåker & Peter Larsson
BLOCKCHAIN CADEC 2018 - Pär Wenåker & Peter Larsson BITCOIN BITCOIN PAPER Posted 31/10 2008 Bitcoin v0.1 released Satoshi Nakamoto satoshi at vistomail.com Thu Jan 8 14:27:40 EST 2009 Previous message:
More information416 Distributed Systems. RPC Day 2 Jan 11, 2017
416 Distributed Systems RPC Day 2 Jan 11, 2017 1 Last class Finish networks review Fate sharing End-to-end principle UDP versus TCP; blocking sockets IP thin waist, smart end-hosts, dumb (stateless) network
More informationMiddleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004
Middleware Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Outline Web Services Goals Where do they come from? Understanding middleware Middleware as infrastructure Communication
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationMonitor your containers with the Elastic Stack. Monica Sarbu
Monitor your containers with the Elastic Stack Monica Sarbu Monica Sarbu Team lead, Beats team monica@elastic.co 3 Monitor your containers with the Elastic Stack Elastic Stack 5 Beats are lightweight shippers
More information