Difference between revisions of "Blockchain"

From
Jump to: navigation, search
m (How Does It Work?)
m
 
(6 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
|title=PRIMO.ai
 
|title=PRIMO.ai
 
|titlemode=append
 
|titlemode=append
|keywords=artificial, intelligence, machine, learning, models, algorithms, data, singularity, moonshot, Tensorflow, Google, Nvidia, Microsoft, Azure, Amazon, AWS  
+
|keywords=ChatGPT, artificial, intelligence, machine, learning, GPT-4, GPT-5, NLP, NLG, NLC, NLU, models, data, singularity, moonshot, Sentience, AGI, Emergence, Moonshot, Explainable, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Hugging Face, OpenAI, Tensorflow, OpenAI, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, LLM, metaverse, assistants, agents, digital twin, IoT, Transhumanism, Immersive Reality, Generative AI, Conversational AI, Perplexity, Bing, You, Bard, Ernie, prompt Engineering LangChain, Video/Image, Vision, End-to-End Speech, Synthesize Speech, Speech Recognition, Stanford, MIT |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools  
+
 
 +
<!-- Google tag (gtag.js) -->
 +
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4GCWLBVJ7T"></script>
 +
<script>
 +
  window.dataLayer = window.dataLayer || [];
 +
  function gtag(){dataLayer.push(arguments);}
 +
  gtag('js', new Date());
 +
 
 +
  gtag('config', 'G-4GCWLBVJ7T');
 +
</script>
 
}}
 
}}
[http://www.youtube.com/results?search_query=Federated+Learning+deep+machine+learning+ML+AI+Blockchain Youtube search...]
+
[https://www.youtube.com/results?search_query=Federated+Learning+deep+machine+learning+ML+AI+Blockchain Youtube search...]
[http://www.google.com/search?q=Federated+Learning+deep+machine+learning+ML+AI+Blockchain ...Google search]
+
[https://www.google.com/search?q=Federated+Learning+deep+machine+learning+ML+AI+Blockchain ...Google search]
  
 
* [[Case Studies]]
 
* [[Case Studies]]
Line 17: Line 26:
 
* [[Decentralized: Federated & Distributed]]
 
* [[Decentralized: Federated & Distributed]]
 
* [[Directed Acyclic Graph (DAG)]]
 
* [[Directed Acyclic Graph (DAG)]]
* [[Metaverse]]
+
* [[Immersive Reality]] ... [[Metaverse]] ... [[Omniverse]] ... [[Transhumanism]] ... [[Religion]]
 
* [[Privacy]]
 
* [[Privacy]]
 
* [[OpenMined]]
 
* [[OpenMined]]
 
* [[Non-Fungible Token (NFT)]]
 
* [[Non-Fungible Token (NFT)]]
* [http://101blockchains.com/types-of-blockchain/ 4 Different Types of Blockchain Technology & Networks | 101 Bloackchains]
+
* [[Quantum#Quantum Cryptographic Technology| Quantum Cryptographic Technology]]
* [http://en.wikipedia.org/wiki/Decentralized_autonomous_organization Decentralized Autonomous Organization (DAO) | Wikipedia]
+
* [https://venturebeat.com/2021/12/20/use-of-blockchain-technology-could-increase-human-trust-in-ai/ Use of blockchain technology could increase human trust in AI | Deepak Gupta - VentureBeat]
* [http://en.wikipedia.org/wiki/Fork_(blockchain) Fork (blockchain)]  
+
* [https://101blockchains.com/types-of-blockchain/ 4 Different Types of Blockchain Technology & Networks | 101 Bloackchains]
* [http://www.forbes.com/sites/jonathanponciano/2021/03/09/bill-gates-bitcoin-crypto-climate-change/?sh=7763641a6822 Bill Gates Sounds Alarm On Bitcoin's Energy Consumption–Here's Why Crypto Is Bad For Climate Change | Jonathan Ponciano - Forbes] ... According to Digiconomist, one bitcoin transaction requires about 707.6 kilowatt-hours of electrical energy, the amount of energy the <b>average U.S. household consumes in 24 days</b>.
+
* [https://en.wikipedia.org/wiki/Decentralized_autonomous_organization Decentralized Autonomous Organization (DAO) | Wikipedia]
 +
* [https://en.wikipedia.org/wiki/Fork_(blockchain) Fork (blockchain)]  
 +
* [https://www.forbes.com/sites/jonathanponciano/2021/03/09/bill-gates-bitcoin-crypto-climate-change/?sh=7763641a6822 Bill Gates Sounds Alarm On Bitcoin's Energy Consumption–Here's Why Crypto Is Bad For Climate Change | Jonathan Ponciano - Forbes] ... According to Digiconomist, one bitcoin transaction requires about 707.6 kilowatt-hours of electrical energy, the amount of energy the <b>average U.S. household consumes in 24 days</b>.
  
A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks.  Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.[http://en.wikipedia.org/wiki/Blockchain Wikipedia]
+
A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks.  Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.[https://en.wikipedia.org/wiki/Blockchain Wikipedia]
  
 
===== How Does It Work? =====
 
===== How Does It Work? =====
Line 46: Line 57:
 
<youtube>bBC-nXj3Ng4</youtube>
 
<youtube>bBC-nXj3Ng4</youtube>
 
<b>But how does bitcoin actually work?
 
<b>But how does bitcoin actually work?
</b><br>The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of support is to simply share some of the videos. Special thanks to these supporters: http://3b1b.co/btc-thanks This video was also funded with help from Protocol Labs: https://protocol.ai/join/ Some people have asked if this channel accepts contributions in cryptocurrency form.  As a matter of fact, it does:
+
</b><br>The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of support is to simply share some of the videos. Special thanks to these supporters: https://3b1b.co/btc-thanks This video was also funded with help from Protocol Labs: https://protocol.ai/join/ Some people have asked if this channel accepts contributions in cryptocurrency form.  As a matter of fact, it does:
http://3b1b.co/crypto
+
https://3b1b.co/crypto
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->
  
* [http://andersbrownworth.com/blockchain/public-private-keys/  If you are interested in playing with this on your own | Anders Brownworth]
+
* [https://andersbrownworth.com/blockchain/public-private-keys/  If you are interested in playing with this on your own | Anders Brownworth]
* [http://github.com/anders94/public-private-key-demo The code that runs this demo is also on GitHub | Anders Brownworth]
+
* [https://github.com/anders94/public-private-key-demo The code that runs this demo is also on GitHub | Anders Brownworth]
  
 
{|<!-- T -->
 
{|<!-- T -->
Line 72: Line 83:
 
|}<!-- B -->
 
|}<!-- B -->
  
[http://en.wikipedia.org/wiki/SHA-2 <b>SHA-2 (Secure Hash Algorithm 2)</b>] is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the [https://en.wikipedia.org/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction Merkle–Damgård] construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. ..The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits... .SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license. | Wikipedia
+
[https://en.wikipedia.org/wiki/SHA-2 <b>SHA-2 (Secure Hash Algorithm 2)</b>] is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the [https://en.wikipedia.org/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction Merkle–Damgård] construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. ..The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits... .SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license. | Wikipedia
  
 
=== Introduction ===
 
=== Introduction ===
  
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. [http://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto] - [http://bitcoin.org/en/ bitcoin.org]
+
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. [https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto] - [https://bitcoin.org/en/ bitcoin.org]
 +
 
  
 
<youtube>qOVAbKKSH10</youtube>
 
<youtube>qOVAbKKSH10</youtube>
Line 90: Line 102:
 
<youtube>-c2xqVSz378</youtube>
 
<youtube>-c2xqVSz378</youtube>
 
<youtube>5Tr13l0O1Ws</youtube>
 
<youtube>5Tr13l0O1Ws</youtube>
 
+
<youtube>v2xdB9FXPcI</youtube>
  
 
=== Programming ===
 
=== Programming ===
Line 97: Line 109:
  
 
=== Uses ===
 
=== Uses ===
[http://www.youtube.com/results?search_query=Distributed+Ledger Youtube search...]
+
[https://www.youtube.com/results?search_query=Distributed+Ledger Youtube search...]
[http://www.google.com/search?q=Distributed+Ledger ...Google search]
+
[https://www.google.com/search?q=Distributed+Ledger ...Google search]
  
 
* [[Gaming]]
 
* [[Gaming]]
Line 110: Line 122:
 
===== Supply Chain =====
 
===== Supply Chain =====
  
Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. [http://www.r3.com/customers/supply-chain/#:~:text=Blockchain%20use%20cases%20for%20supply,physical%20and%20financial%20supply%20chains. Blockchain for supply chain management: use cases and applications | r3]
+
Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. [https://www.r3.com/customers/supply-chain/#:~:text=Blockchain%20use%20cases%20for%20supply,physical%20and%20financial%20supply%20chains. Blockchain for supply chain management: use cases and applications | r3]
  
 
<youtube>RscsA7uX6WY</youtube>
 
<youtube>RscsA7uX6WY</youtube>
Line 119: Line 131:
 
===== Distributed Ledger =====
 
===== Distributed Ledger =====
  
A distributed ledger is a database that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple people. ... Underlying distributed ledgers is the same technology that is used by blockchain, which is the technology that is used by bitcoin.
+
A distributed ledger is a [[database]] that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple people. ... Underlying distributed ledgers is the same technology that is used by blockchain, which is the technology that is used by bitcoin.
  
 
<youtube>aB3lyxDI6v4</youtube>
 
<youtube>aB3lyxDI6v4</youtube>
Line 126: Line 138:
  
  
<img src="http://101blockchains.com/wp-content/uploads/2020/04/Types-of-Blockchain-Technology-1982x2048.png" width="800">
+
<img src="https://101blockchains.com/wp-content/uploads/2020/04/Types-of-Blockchain-Technology-1982x2048.png" width="800">

Latest revision as of 20:24, 19 March 2024

Youtube search... ...Google search

A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks. Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.Wikipedia

How Does It Work?

Behind blockchains & cryptocurrencies

A Complete Visual Walkthrough into How Blockchains Work, full episode with Anders Brownworth
Real Vision crypto editor Ash Bennington welcomes Anders Brownworth to walk through a step-by-step of how blockchains work. Brownworth explains the basics of hashing, blocks, and then blockchains, demonstrating how each piece builds upon the other to create the underlying technology of cryptocurrencies. Filmed on May 20, 2021. Key Learnings: Those who are unfamiliar with blockchain technology can experience a steep learning curve when trying to understand how it works—Brownworth breaks it down into a simple, easy-to-digest format with visual aids that allow the viewer to conceptualize blockchain technology. Thanks for watching Real Vision Crypto!

But how does bitcoin actually work?
The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of support is to simply share some of the videos. Special thanks to these supporters: https://3b1b.co/btc-thanks This video was also funded with help from Protocol Labs: https://protocol.ai/join/ Some people have asked if this channel accepts contributions in cryptocurrency form. As a matter of fact, it does: https://3b1b.co/crypto

Blockchain 101 - A Visual Demo
This is a very basic visual introduction to the concepts behind a blockchain. We introduce the idea of an immutable ledger using an interactive web demo.

Blockchain 101 - Part 2 - Public / Private Keys and Signing
This is part two in my basic visual introduction to the concepts behind a blockchain. We build on the concepts from the previous video and introduce public / private key pairs and signing using an interactive web demo.

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. ..The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits... .SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license. | Wikipedia

Introduction

A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto - bitcoin.org


Programming

Uses

Youtube search... ...Google search

Supply Chain

Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. Blockchain for supply chain management: use cases and applications | r3

Distributed Ledger

A distributed ledger is a database that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple people. ... Underlying distributed ledgers is the same technology that is used by blockchain, which is the technology that is used by bitcoin.