Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Dating back to Babylonian era, the ledger appears to be a bedrock of civilization as the exchange of value always required two unknown people to trust each other's claims. Even today, we need a common system, which can provide order to the society, keep track of our transactions, establish public trust in it, and maintain it forever.
A blockchain is fundamentally a digital ledger that carries a list of transactions, that could, in principle, represent almost anything - money, digital stocks, cryptocurrencies, or any other asset. Blockchain can follow instructions to buy or sell these assets and implement inclusive set of terms and conditions through so-called smart contracts.
Blockchain differs from a simple ledger in that all transactions are stored in multiple copies on independent computers, individually within a decentralized network, rather than managed by a centralized institution, such as a bank or government agency. Once a consensus is reached, all computers on the network update their copies of the ledger simultaneously. If a node attempts to retroactively add or subtract an entry without consensus, the rest of the network automatically invalidates the entry.
Unlike a traditional ledger, it is governed by complex mathematical algorithms and impregnable cryptography that adds a layer of integrity to the ledger, what Ian Grigg (2005) referred to as triple-entry accounting - one entry on the debit side, another on the credit side, and a third on an immutable, undisputed, shared ledger.
Thus, Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. Blockchain is one of its many forms - Directed Acyclic Graph (DAG), Hashgraph, Holochain, or Tempo (Radix). It is a sequence of blocks containing a complete list of transactions in the form of a digital public ledger that is replicated and distributed throughout the network. The blockchain ecosystem includes blocks - the data structure used to keep records of transactions, which are distributed among all nodes in the network, and nodes - a user or computer that holds a complete copy of the record or ledger.
The blockchain technology was first mentioned by Stuart Haber and W. Scott Stornetta in 1991. However, Satoshi Nakamoto, a person who goes by the alias, popularized it in 2008 to operate as the public transaction ledger of Bitcoin. Over the past one decade and a half, there have been innovations around blockchain consensus mechanisms, constitutional design, programmable smart contracts, and tokens. Blockchain 1.0 applications were mainly limited to digital currencies, which were used in commercial transactions, foreign exchange, gambling, and money laundering. The expansion of Blockchain 2.0 applications enabled smart-contracts, decentralized applications (dApps), and Decentralized Autonomous Organizations (DAO). Blockchain 3.0 was able to register its presence in areas, such as education, health, science, transportation, and logistics in addition to currency and finance, and now Blockchain 4.0 is evolving as a business-friendly ecosystem for the world of commons. The integration of blockchain with emerging technologies like Internet of Things, cloud, artificial intelligence, and robotics is one of the biggest promises of the times to come.
Blockchain is typically classified into public, private, and consortium blockchain. A public blockchain is a permissionless blockchain in which any user, whosoever wishes to transact with the network, can participate and write on the blockchain. A private blockchain only allows nodes coming from a specific organization to participate in the consensus process. That's why it is also called permissioned blockchain. A consortium blockchain is a semi-private system in which a group of like-minded companies leverage cross-company solutions to improve workflow, accountability, and transparency.
Blockchain, irrespective of its type, uses an asymmetric cryptography mechanism to validate the authenticity of transactions. It is basically a network of participants that share nodes for common business purpose and process. Each block of the blockchain contains about 1 MB of data. This block stores the information chronologically until its 1 MB data capacity is occupied, and then the second block repeats the same process. All these blocks join in a sequence, and to do this, each block gets a unique hash that exactly matches the string of data in that block. If anything inside a block changes, even to a little extent, the block gets a new hash.
In a blockchain, this hash is created by a cryptographic hash function. A cryptographic hash function is a complex algorithm that takes any string of input and turns it into a 64-digit string of output. A hash is not always qualified. A block on the blockchain will only be accepted if its hash starts with at least ten consecutive zeros. A small, specific piece of data is added to each block called a nonce. The process of repeatedly altering and hashing a block's data to find a suitable hash is called mining, and this is what miners do. Miners spend a lot of electricity in the form of computational power by constantly changing the block structure (nonce) and hashing it until a qualified signature (output) is found. The more computational power they have, the faster they can hash different block compositions to find a qualified hash.
The process (hash function) used here that converts any information into a string of alphanumeric values (hash), is called encryption. There are mainly two types of encryption - asymmetric encryption and symmetric encryption, depending on whether the same or different keys are used for encryption and decryption. Cryptocurrencies use blockchain to achieve the benefits of a public ledger as well as an advanced cryptographic security system so that online transactions are always chronicled and secure. Transactions are simply data that indicate the flow of cryptocurrency from one wallet to another.
In order to record the flow of currency or data from one wallet to another in an immutable form, nodes communicate with one another to reach consensus on the records of the ledger. However, the transaction is accepted only if majority of the nodes agree on its validity. When all nodes reach a consensus, transactions are recorded on a new block and added to the existing chain. While Bitcoin focused on decentralized payments, Vitalik Buterin and his collaborators introduced arbitrary computer code into the blockchain using transactions. Thus, Ethereum came into being as a peer-to-peer network where each node runs an operating system called the Ethereum Virtual Machine. This securely executes and verifies application code, hitherto called smart contracts, and allows participants on the blockchain to transact with each other without a trusted central authority.
Smart contracts are used for the automation of common centralized processes, such as conditional transfer of digital assets, multisig asset exchange, or waiting for a specific amount of time to execute a transaction. It allows the creation of decentralized applications for B2C trades whereas B2B transactions, which need to keep their data secure and confidential, can adopt Hyperledger. Hyperledger offers a modular architecture that delivers a high degree of privacy, resilience, and scalability. It is an enterprise-level private blockchain network that enables several business entities - such as banks, corporate institutions or trade establishments - to transact with each other.
Thus, digital transactions can be decentralized, encrypted, and held securely on a distributed ledger. It has the potential to cut millions of hours spent on administrative processes every year and bring efficiency through smart contracts in all walks of life. The present book explicates the unrestrained functionality of blockchain and its application in the real world.
It's a well-known fact that identity is the nucleus of all the activities in the world. In a civilized society, identity entitles the individual to discharge his rights and responsibilities. Over the centuries, governments around the world issued a variety of identity documents to enable citizens to make access to education, health care, business activities, pensions, banking, social benefits, and state welfare schemes.
Many countries issued identity numbers for a singular purpose, but in due course of time, they became a de facto national identification number. In order to provide an official identity to every citizen of India, the Department of Information Technology, Government of India, introduced a biometric-enabled, unique identification number (UID). This project has listed over a billion users with an estimated expenditure of 130 billion INR, till date (UIDAI, 2022). India's Unique Identification System, called Aadhaar, has been taken as a case study to deliberate over the advantages and disadvantages of a centralized identity model in light of privacy issues, unconstitutional access, absence of data-protection laws, involvement of private partners, etc.
The UID project was expected to portray a more accurate picture of Indian residents and enable them to have hassle-free access to government schemes and public services, but the ground reality has been far from such claims. First of all, the technological framework for such a large database is not available in the country; and second, the Indian bureaucracy is not technically smart enough to handle such big data with burgeoning privacy and data-security...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.