The document discusses blockchain technology. It begins by explaining how blockchains solve the Byzantine General's Problem and the double spend problem. It then describes how blockchains work at a high level, including transaction creation, broadcasting, validation, and linking to previous blocks. The document outlines different types of blockchains and provides examples of use cases across various industries. It also summarizes key challenges for blockchains like scalability, privacy, and regulation. Finally, it envisions blockchain integration with storage solutions as part of a growing ecosystem.
The distributed ledger technology that started with bitcoin is rapidly becoming a crowdsourced system for all types of verification. Could it replace notary publics, manual vote recounts, and the way banks manage transactions?
The document discusses blockchain technology and its potential to disrupt traditional financial services through decentralization and the removal of intermediaries. It provides background on blockchain, describing it as a distributed ledger that allows for peer-to-peer transactions without third party involvement. This enables real-time settlement, lower costs, greater transparency, and other benefits. The document outlines several use cases for blockchain technology within financial services and other industries, and notes that major banks are beginning to embrace the technology despite the potential disruption it poses to existing banking models.
Blockchain technology and applications from a financial perspectiveVittorio Zinetti
This article aims at explaining the blockchain opportunity for the financial industry. First the fundamentals of technology is introduced, then possible application of blockchain to three financial use cases are presented.
Blockchain is a new technology that allows for more secure and transparent transactions by recording them in distributed ledgers known as blockchains. Encrypted Labs is a blockchain consulting company that helps clients identify problems that can be solved using blockchain applications. They work with clients to design customized blockchain solutions and have expertise in a variety of industries. Some potential use cases discussed include supply chain management, cybersecurity, healthcare records, and intellectual property tracking.
Visa moves to allow payment settlements using cryptocurrency.Blockchain Council
If we have to name the most revolutionary change in the world of technology in recent years, then you have to count cryptocurrency and Blockchain in the list. Bitcoin is the pioneering cryptocurrency in this domain. It highlighted the fact that transactions can take place without third-party intervention, and you can have faster transactions using a decentralized platform that guarantees complete security of data. Although cryptocurrency exchange does have its set of apprehensions surrounding its sustenance, in the long run, we have to agree to the fact that it has opened a new gateway of opportunities for a new phase of the digital financial revolution.
Blockchain can be used across the whole manufacturing industry to address all different types of projects and stakeholders. Its value to the manufacturing vertical is promising as Industry 4.0 continues to grow.
This document summarizes key points about Bitcoin, blockchain technology, and cryptocurrencies. It discusses how Bitcoin works through a peer-to-peer network and cryptography to validate transactions. It also outlines companies working in the Bitcoin ecosystem that have received over $475 million in funding. Both benefits and drawbacks of Bitcoin are presented. The document concludes by suggesting the blockchain technology underlying Bitcoin could transform how property rights are transferred through ledgers in a fast, transparent, and secure manner.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
Evaluating the potential of blockchain technology to radically transform business
[Feel free to download the presentation if you'd like to view it offline]
Toward Money-over-IP? From Bitcoin to M2M MoneyGeorge Giaglis
How will Bitcoin and Blockchains disrupt industries, such as banking, and create a wave of new machine-to-machine applications on nano-payments and autonomous digital corporations.
5 companies using blockchain to revolutionize insuranceBlockchain Council
Blockchain is one of the most revolutionary technologies that has paved the way for transformational changes across the different industry segments. Among the different businesses that benefit from Blockchain, the focus of this blog will be on the insurance segment. Claim settlement, KYCs, paperwork and other issues consume a lot of time and money.
A fascinating set of slides from Ovum consulting offering a beginners view to blockchain. Distributed ledger technology for the non-expert.
Please note that these slides are not my own but are distributed by Ovum (Informa plc)
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014Ldger, Inc
Principals from Tillit explore the business and legal implications of advanced blockchain technologies, including smart contracts, digital stored value and the concepts of "code as law"
Blockchain Use Cases: Think of a "Public" Pub/Sub QueueAltoros
The document discusses several perspectives on blockchain use cases from SWIFT Institute, Accenture, and potential adoption scenarios. SWIFT Institute found little short-term payoff for securities transactions due to challenges like regulatory support. Accenture saw opportunities but said the technology is not mature enough. The document then presents a simple use case of blockchain as a public pub/sub message queue and discusses the technical advantages and challenges. It concludes by considering which industries and organizations may be early blockchain adopters.
If we have to pick the most distributed technology in recent years, then it has to be Blockchain. It started as the underlying technology for Bitcoin exchange, but over the years, Blockchain has made a mark for itself as the self-sustaining technology that aids other business processes like healthcare, medical, finance, education and others. But the focus of this article is not on how Blockchain is adding to the different business segments. We are highlighting how Blockchain is helpful in creating safe storage for cryptocurrencies. Yes, we are going to discuss Blockchain wallet.
This is he Hyperledger deck that Brian Behlendorf presented at the meetup in Tokyo, it has many useful links to other Hyperledger resources for you to explore.
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...David Terrar
Blockchain, IoT, and AI are foundational technologies for the fourth industrial revolution. The document discusses each technology and argues they should be factored into business planning. Blockchain allows trust between parties without intermediaries. IoT connects devices that generate large amounts of data. AI is now practical due to advances in machine learning. Real-world examples show the technologies' benefits in industries like shipping, food supply chains, and manufacturing. Adoption is increasing as businesses recognize the opportunities these technologies provide.
This document discusses blockchain technology, its benefits and challenges, and examples of its applications. Blockchain is a decentralized public platform that facilitates financial transactions without intermediaries using encryption. It provides trustless exchanges, transparency, process integrity and lower costs. Challenges include its newness, regulatory uncertainty, energy use, and integration concerns. Blockchain is also being applied beyond banking to industries like supply chains, healthcare, manufacturing and real estate. The document lists companies applying blockchain for non-financial innovation and concludes that blockchain could transform global banking through a traceable currency, reduce bank infrastructure costs, and be used to distribute social welfare.
For over two decades, organizations have struggled with enterprise content management (ECM), both as a technology and as an information management strategy. Now, intelligent content services platforms are on the rise—and so is a different way of thinking about information.
In this webinar, we will explore eight common ECM challenges and how modern content services platforms leverage new capabilities, like AI and machine learning, to help organizations overcome content challenges.
Learn real-life examples of how customers across different industries are leveraging intelligent content services to accelerate products to market, improve decision making, enhance their customer experience, and how custom AI models can intelligently enrich content and add meaningful value to your business.
Blockchain technology is probably the biggest game changer for the Internet. Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial?
Author : Patrick Curry, BBFA
Tokenization on Blockchain is a steady trend. It seems that everything is being tokenized on Blockchain from paintings, diamonds and company stocks to real estate. Thus, we took an asset, tokenized it and created its digital representation that lives on Blockchain. Blockchain guarantees that the ownership information is immutable.
Unfortunately, some problems need to be solved before we can successfully tokenize real-world assets on Blockchain. Main problem stems from the fact that so far, no country has a solid regulation for cryptocurrency. For example, what happens if a company that handles tokenization sells the property? They have no legal rights on the property and thus are not protected by the law. Another problem is that this system brings us back some sort of centralization. The whole idea of Blockchain and especially smart contracts is to create a trustless environment.
Tokenization is a method that converts a digital value into a digital token. Tokenization can be used as a method that converts rights to an asset into a digital token.
The tokenization system can be implemented local to the data that is tokenized or in a centralized model. We will discuss tokenization implementations that can provide scalability across hybrid cloud models. This session will position different data protection techniques, use cases for blockchain, and protecting blockchain.
Tokenization in blockchain involves converting digital values like assets, currencies, and identities into digital tokens that can be securely exchanged on distributed ledgers. Various types of assets can be tokenized, including real estate, art, and company stocks. While tokenization provides liquidity and accessibility of assets, issues around centralization and legal ownership remain challenges. Blockchain trends indicate the technology will become more scalable and support private transactions by 2023. Data protection techniques like differential privacy, tokenization, and homomorphic encryption can help secure sensitive data when used with blockchain and multi-cloud environments.
Keynote presentation at the HUBB Conference.
Adj Prof Mascarella clarifies terms, mechanisms and what is the roadmap to use innovation for new business.
The Initiative for Open Authentication (OATH) is a group working to promote strong authentication solutions without passwords. It has created open standards like HOTP, TOTP, and OCRA, and certifies compatible products. OATH seeks to reduce fraud by establishing interoperable strong authentication methods across devices and networks through its reference architecture and standards.
The Initiative for Open Authentication (OATH) is a group working to drive adoption of open strong authentication technologies. OATH has developed an open reference architecture and standardized authentication algorithms like HOTP and TOTP to provide interoperable strong authentication without passwords. OATH is working to expand certification of products, define risk-based authentication interfaces, and promote authentication and identity sharing across multiple applications and networks through open standards.
The document describes a blockchain solution called DigiChain for product recalls and supply chain management. DigiChain is built on Hyperledger Fabric and uses smart contracts, digital passports and predictive analytics to enable targeted, proactive product recalls. It aims to improve traceability, transparency and efficiency while reducing costs for manufacturers. The solution is demonstrated through a use case of helping Tesla to track raw materials and automate the recall process.
This webinar from RiskScout discusses cryptocurrency and its implications for risk management. It will cover the basics of crypto including what it is, how it works, and trends in adoption. It will also address managing risks related to crypto for financial institutions, identifying crypto transactions, and revenue opportunities in the crypto space. The live webinar will include a Q&A with the presenter, Ryan McInerny, and moderator Tara Dwyer.
A presentation on Self Sovereign Identify - jointly presented with D&B. The topic explores the concept of SSI and the evolving W3C Community proposals around DID (Digital Identity), DID Doc, DID Auth and Verifiable Credentials. Please email me if you would like more information about SSI or wish to chat with me: mohan@chainyard.com
Blockchain, IoT and the GxP lab technology helping compliance?
This webinar discusses how distributed ledger technology like blockchain and IOTA could help enhance compliance in GxP laboratories. It explores how DLT could be used to track devices, materials, and data in a more transparent, trusted and auditable way. Specifically, it presents a vision of an internet-connected "laboratory of the future" where all devices share data using DLT. This could improve integrity, security and access to data while reducing costs. While DLT cannot directly increase compliance, it may help build trust in GxP systems and processes by making components more transparent to regulators.
Technology can help combat procurement corruption through integrated purchasing portals, cloud computing, data analytics, artificial intelligence, and blockchain. Traditional methods are prone to human manipulation, while mainstream technology still allows some corruption. Advanced technology provides more transparency and accountability. Data analytics and AI applied to procurement data consolidated in the cloud can identify irregular patterns, achieve significant cost savings, and enhance forecasting. Blockchain technology makes document tampering virtually impossible and is well-suited for industries vulnerable to counterfeiting or where supply chain integrity is critical. Early adopters are already seeing benefits by focusing blockchain on high-risk business areas.
2020 Tehnology Mega Trends - Nov. 2019 I Nouamane CherkaouiNouamane Cherkaoui
The 4th industrial revolution is certainly technological. Here are the 10 most striking trends that we will have to prepare for in 2020, CIOs and Business Lines.
Gartner and Forrester are aligned with these trends. But let's not forget the human factor, the relationship, the interest of the client and the support of our employees. We could also add the 5G network, autonomous driving or predictive medicine, but I will come back in detail on these technologies later this year.
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
This document discusses privacy and security considerations for financial institutions using cloud services. It begins with an introduction of the speaker, Ulf Mattsson, and his background working with standards bodies. The rest of the document discusses opportunities and challenges around analytics, machine learning, and complying with privacy laws in the cloud. It provides examples of how techniques like homomorphic encryption, differential privacy, and secure multi-party computation can be applied to use cases in areas like payments, risk assessment, and secondary data usage. The document concludes with a discussion of hybrid cloud environments and maintaining consistent security policies across on-premises and cloud platforms.
Big Data Monetisation
PSD were pleased to host a breakfast at the Royal Horseguards Hotel discussing the subject of what companies can do with their data to monetise it and bring the debate to the CEO's office.
Leading the discussion, and presenting his portfolio of work in this area was Mike Fishwick.
Mike has recently led the Business Insights programme at Telefonica Digital, and has an almost unique viewpoint on the application of data science in this area.
Attending were technology leaders from a broad range of sectors all of whom are investigating what they do with the ever increasing torrent of data that they are managing.
For the latest IT & Business Change jobs & salary survey information, go to:
http://www.psdgroup.com/information_technology.aspx
Chris Eldridge - MD
Similar to Joaquín Moreno - Blockchain Practice Lead de Globant - semanainformatica.com (20)
Carlos Garcia, ICC - Fe de vida con biometria y blockchainCOIICV
El documento describe una solución propuesta para transformar el proceso actual de verificación anual de beneficiarios de pensiones de 24 organizaciones de la ONU, reemplazando el envío por correo de documentos firmados con una aplicación móvil que utiliza biometría facial y almacenamiento de transacciones en blockchain. Actualmente el proceso es lento y propenso a errores, pero la nueva solución proporcionaría verificación más segura y flexible al capturar la biometría facial del beneficiario y almacenar de forma segura la emisión del certificado en
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...COIICV
Ponencia: Seguridad as a service: Como proteger el activo más crítico, la información - XV Congreso de Ingeniería Informática de la Comunitat Valenciana – #SI2020
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...COIICV
El documento describe la falta de diversidad de género en los estudios de tecnología de la información y la comunicación (TIC). Señala que solo el 7% de los estudiantes cursan una carrera tecnológica, de los cuales solo el 28% son mujeres. Analiza los factores que influyen en la participación de niñas y mujeres en las carreras STEM, como los estereotipos de género. También explora las consecuencias de este sesgo de género y propone líneas de acción como la difusión
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...COIICV
Jeff aims to create the first omnichannel ecosystem of services to help customers live good, look good, and feel good. This ecosystem will deliver a unique, customized experience for each customer across all channels in a consistent brand with seamless integration. The ecosystem is supported by controlled suppliers to provide services and experiences that improve quality of life, such as physical, mental, and social well-being. An example journey shows how a customer named Olivia interacts with various Jeff services in an integrated, customized way through different channels over days.
Ruben Ruiz, UPV - Mesa: El valor del CIO PúblicoCOIICV
El documento describe el proyecto de virtualización de escritorios e implementación de una plataforma de administración as a service en la Universitat Politècnica de València. Anteriormente, la UPV tenía miles de equipos informáticos descentralizados que requerían altos costos de mantenimiento. El nuevo sistema virtualiza los escritorios y aplicaciones en servidores centralizados, logrando ahorros del 80% en hardware y reduciendo drásticamente los costos de mantenimiento, a la vez que mejora la seguridad, flexibilidad y disponibil
Amparo Cabo - Mesa: El valor del CIO PúblicoCOIICV
El documento describe el valor que aporta un Director de Tecnologías de la Información (CIO) en las administraciones locales. Un CIO es responsable de la gestión completa de los sistemas de información para garantizar que funcionen correctamente y se alineen con las estrategias de la organización para lograr sus objetivos. Sin embargo, muchas administraciones locales carecen de planes estratégicos a largo plazo más allá del presupuesto anual y tienen dificultades para incorporar perfiles de CIO.
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...COIICV
Ponencia: Internet of Things (IoT): el arte de conectar cualquier cosa a Internet - XIV Congreso de Ingeniería Informática de la Comunitat Valenciana – SI2019
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TICCOIICV
Presentación de Silvia Rueda en la mesa: Cómo superar la brecha de género en el sector tecnológico - XIV Congreso de Ingeniería Informática de la Comunitat Valenciana – SI2019
Rubén Antón - Como ser ágil sin enterrarse en deuda técnicaCOIICV
Este documento describe cómo las organizaciones pueden adoptar un enfoque ágil para el desarrollo de software sin acumular deuda técnica. Recomienda tres prácticas clave: 1) implementar pruebas automatizadas, 2) utilizar un diseño incremental y 3) lograr la integración y entrega continua. Estas prácticas eliminan cuellos de botella, mantienen una velocidad de desarrollo estable y recuperan la confianza perdida al automatizar las pruebas y entregar código de forma continua.
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...COIICV
Ponencia: Estructuras de gestión de las TI en un contexto de Gobierno Digital - Jornada "Herramientas útiles para el desarrollo TI de empresas y organizaciones" – SI2019
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...COIICV
El documento describe 10 tecnologías disruptivas que cambiarán la abogacía, incluyendo la inteligencia artificial, robótica, criptomonedas, impresión 3D, vehículos autónomos, drones, realidad virtual, biotecnología, internet de las cosas, y ciberdelitos. Estas tecnologías generarán nuevos retos y desafíos jurídicos que requerirán regulaciones, y abogados especializados para garantizar la transparencia, seguridad y legalidad en estas áreas emergentes. Los primeros en adaptarse a
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...COIICV
Ponencia de Joaquín Garrido en la mesa: Tecnologías emergentes aplicadas al entorno empresarial alicantino - Jornada "Herramientas útiles para el desarrollo TI de empresas y organizaciones" – SI2019
Ponencia de Borja Izquierdo en la mesa: Líneas de financiación para proyectos empresariales innovadores - Jornada "Herramientas útiles para el desarrollo TI de empresas y organizaciones" – SI2019
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...COIICV
Ponencia de Javier Mínguez en la mesa: Líneas de financiación para proyectos empresariales innovadores - Jornada "Herramientas útiles para el desarrollo TI de empresas y organizaciones" – SI2019
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Best Programming Language for Civil EngineersAwais Yaseen
The integration of programming into civil engineering is transforming the industry. We can design complex infrastructure projects and analyse large datasets. Imagine revolutionizing the way we build our cities and infrastructure, all by the power of coding. Programming skills are no longer just a bonus—they’re a game changer in this era.
Technology is revolutionizing civil engineering by integrating advanced tools and techniques. Programming allows for the automation of repetitive tasks, enhancing the accuracy of designs, simulations, and analyses. With the advent of artificial intelligence and machine learning, engineers can now predict structural behaviors under various conditions, optimize material usage, and improve project planning.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
2. GLOBANT TODAY
From inception, we have benefited from strong organic
growth and have built a blue-chip client base comprised
of leading global companies.
We have built a roster of world class clients, many of
which are at the forefront of emerging technologies.
RECOGNITIONS
5,300+ EMPLOYEES
35 DEVELOPMENT CENTERS
Globant Proprietary | Confidential Information
History
2003 2006 2008 2009 2012 2014 2015 2016
Founded Signed Google
Riverwood Capital and
FTV Capital invested
Studios launch WPP Invested
Listed on NYSE
(1st Latam IT company) Follow on SoP launched
Globant
3. IDC Vendor Assessment
IDC MarketScape Worldwide Digital
Strategy Consulting 2016 Vendor
Assessment
Capacity
EY
Participants
Competences
Major
vendors
Leaders
Roland Berger
Bain
KPMG
A.T. Kearney Capgemini
BCG
Cognizant
BearingPoint
Razorfish
CSC
DigitasLBi
SapientNitro
PWC
Deloitte
GLOBANT
Accenture
IBM McKinsey
Strategy
IDC Report
“Worldwide, Globant is seen as the most capable
of all firms at envisioning, planning, and
designing enterprise wide digital strategy, as well
as the IT road maps required to support such
initiatives. Clients also regard Globant as highly
skilled at meeting project timelines and designing
new or improved business processes.”
Worldwide Leader
Globant Proprietary | Confidential Information
4. Intro
Which problem does it solve?
How does it work?
Blockchains
Applications
Blockchain Problem Funnel
Use cases
Challenges
A glimpse into the future
Heading
14. Transactional Blockchains
Consensus
Algorithm
Logic Optimized Blockchains
X min
Consensus
Algorithm
Only Transactions
X min
<code>
Transactions
+
< code >
(software/logic/smart contract)
Output
(commands, trx,
etc.)
Input
(oracles,
commands, trx,
etc.)
Type of blockchains
States
25. Self-sovereign Digital Identity
Access to Buildings, Banks, any
on-line service.
Passports, etc.
Expensive and time consuming KYC
processes. Leakage risks. Single
P-o-Failure
Problem
Use Cases
Identity
26. Problems
Use Cases Register and selling digital content
Revenue distribution
Pay-per-use
Copyrights
Payments
Content, Media, Marketing
28. Car Insurance Check
Payments Executions
Private Quotations
Mutual Insurance
Problems Counterfeit insurance certificates
Authorities and regulators unable to
control.
Use Cases
Insurance
29. Problem
Use Cases Voting
Records
DAO (Decentralized Auton.
Organiz)
Non-transparent and Centralized
systems. Paper-based/manual filing.
Bureaucracy.
Governance
30. Stamp the certificate/diploma
information on the blockchain.
Verify professional skills in disaster
áreas.
Problem Fake Diplomas/Certifications. Trust
in a 3rd Party database to verify (fee).
Use Cases
Education
31. Problem
Use Cases Share electricity
Pay-per-energy-charged
Optimize Network utilization
Fixed prices
Inefficient network use
Energy
32. Globant Proprietary | Confidential Information
Medical Records
Interoperability
(More control to patients)
Problem Data availability and privacy
Use Cases
Healthcare
35. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) What kind of information will be
available on a public ledger?
2) Do I want that all the members of a
private blockchain be able to see all
the information that I exchange on it?
Challenges
36. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) What if the cryptographics techniques
are broken?
Challenges
37. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) How much information can be stored
on a blockchain?
2) How can I manage to store large
amount of information and keep with
the same level of trust?
Challenges
38. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) Which is the standard to connect
different blockchains?
2) Is OK to have standards today when
the technology is just at its infant
stage?
Challenges
39. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) How should the private keys be
managed?
2) Is it there any process to recover the
password?
Challenges
41. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) Is it possible to get consensus between
competitors?
Challenges
42. 1) Scalability
2) Privacy
3) Security
4) Storage
5) Standards
6) Key Management
7) Industry Consensus
8) Regulation
1) How is going to be regulated?
Challenges