Conference:March 6-8, 2017
Workshops:March 9-10, 2017
Presentation: Blockchain Introduction: Peering Through the Hype
Location:
- Mountbatten, 6th flr.
Duration
Day of week:
- Wednesday
Level:
- Intermediate
Persona:
- Developer
Key Takeaways
- Understand the data structure that makes a blockchain a blockchain
- See whether or not blockchain technology is appropriate for what you are doing or the application that you want
- Learn about the purpose behind bitcoins mining and how all the different aspects of blockchain work together to improve data security
Abstract
Will answer the questions: what is a blockchain, why all the hype, what makes a blockchain secure, what can be built on top of blockchains, what are some real-world use-cases?
Interview
We use smart contracts as computer executable code that performs the tasks and provisions that would be described in a real world legal contract. The intention is that it runs in an auditable place to ensure the integrity of this software contract.
It can run peer to peer but then it requires that the counterparties trust each other not to alter the contract in some way. Smart contracts can be running at thousands of nodes all over the world so you want to be sure that the code that is intended to run is indeed the code that is running.
Blockchains received a lot of hype. They’ve been proposed to solve problems like financial and storing data. The focus of my talk is to explain what blockchain technology is and why the evolved into bitcoin and distributed currency.
I want the audience to understand whether or not this technology is actually appropriate for what they are doing or the application that they want.
Bitcoin is a basic use case where blockchain was invented; it’s a way to record the transaction history of everyone who has ever sent bitcoins from one person to another person. As they are stored on thousands of nodes all over the world there’s a permanent record of the transaction history which makes it a currency.
One bad use case that I’ve seen is trying to track supply chains. For example a manufacturing company might want to track a product through manufacturing, shipping and distribution and they want to make sure that the items location is known at every point in time. It’s a bad application because you are relying on someone accurately transcribing information, on the human sphere onto the blockchain. If you are trusting humans to transcribe information then you might as well have them use their own database.
It will be introductory enough so that anyone with a general understanding of how computer systems work would be able to understand it.
Similar Talks
Tracks
-
Architecting for Failure
Building fault tolerate systems that are truly resilient
-
Architectures You've Always Wondered about
QCon classic track. You know the names. Hear their lessons and challenges.
-
Modern Distributed Architectures
Migrating, deploying, and realizing modern cloud architecture.
-
Fast & Furious: Ad Serving, Finance, & Performance
Learn some of the tips and technicals of high speed, low latency systems in Ad Serving and Finance
-
Java - Performance, Patterns and Predictions
Skills embracing the evolution of Java (multi-core, cloud, modularity) and reenforcing core platform fundamentals (performance, concurrency, ubiquity).
-
Performance Mythbusting
Performance myths that need busting and the tools & techniques to get there
-
Dark Code: The Legacy/Tech Debt Dilemma
How do you evolve your code and modernize your architecture when you're stuck with part legacy code and technical debt? Lessons from the trenches.
-
Modern Learning Systems
Real world use of the latest machine learning technologies in production environments
-
Practical Cryptography & Blockchains: Beyond the Hype
Looking past the hype of blockchain technologies, alternate title: Weaselfree Cryptography & Blockchain
-
Applied JavaScript - Atomic Applications and APIs
Angular, React, Electron, Node: The hottest trends and techniques in the JavaScript space
-
Containers - State Of The Art
What is the state of the art, what's next, & other interesting questions on containers.
-
Observability Done Right: Automating Insight & Software Telemetry
Tools, practices, and methods to know what your system is doing
-
Data Engineering : Where the Rubber meets the Road in Data Science
Science does not imply engineering. Engineering tools and techniques for Data Scientists
-
Modern CS in the Real World
Applied, practical, & real-world dive into industry adoption of modern CS ideas
-
Workhorse Languages, Not Called Java
Workhorse languages not called Java.
-
Security: Lessons Learned From Being Pwned
How Attackers Think. Penetration testing techniques, exploits, toolsets, and skills of software hackers
-
Engineering Culture @{{cool_company}}
Culture, Organization Structure, Modern Agile War Stories
-
Softskills: Essential Skills for Developers
Skills for the developer in the workplace