How blockchain can change the world and transform society?

How Blockchain Can Change World and Transform Society?


As of now we are not thinking about security and protecting data, but in the future data protection and encryption is must where block chain can help to resolve all the real life things. If we see bitcoin or cryptocurrency at a different angle instead of currency just say how if it’s blockchain only.

As many CIOs dig in to their digital business transformation strategies, they may wonder whether, and where, blockchain technology fits into their platforms.
Sure, CIOs at major banks and financial services companies have already launched into frenzied adoption analysis to exploit potential savings or thwart potential disrupters. Yet CIOs across industries should understand how blockchain works, and why its limitations will spawn future distributed ledger platforms for the programmable economy.

What is the blockchain?

The primary instance of blockchain technology is found in the Bitcoin stack — measured in terms of longevity, market share and ecosystem. Bitcoin is both a digital currency (when used in lowercase, by convention) and a technology/protocol stack (when the first letter B is capitalized) that has gained a lot of visibility in mass media. While the currency has fluctuated in value and represents an infinitesimal portion of global payment activity, the technology that creates the distributed ledger — the authoritative open record of currency transactions — has captured the imagination of many in financial services and other industries, as well as the public sector.

Blockchain technology entails the following core components:

  • A data structure that promotes the identification and sharing of transactions between entities (unknown and/or untrusted in the Bitcoin context) on a network of distributed computers.
  • Cryptography that provides security and immutability of the transactions.
  • Independent entities, known as “miners,” who verify the history of each transaction when it is traded and record the new transaction.
  • Transactions that are grouped into blocks and recorded on the distributed ledger — with each block being chained to the prior blocks.
  • No central authority (such as a bank) validates the transaction or the counterparties to the transaction. The crowd, using consensus mechanisms, verifies the authenticity of a transaction and its exchange between two parties.
  • The miners require significant computational power to compute each block of new transactions, and are compensated for their work with bitcoins for each added block.

The shortcomings of the Bitcoin technical architecture have led others to propose and create alternative versions that differ in important ways, such as how transactions are confirmed using different consensus mechanisms or algorithms (e.g., proof of work, proof of stake, etc.), the speed of transaction confirmation, the nature of the value/asset being exchanged, the confidentiality of transaction data, trusted nature of the participating entities (i.e., permissioned — or private — ledgers, and permissionless — or public — ledgers), customizability for business/market use cases, and so on.

We prefer the term "distributed ledger" to "blockchain," because it affords architectural flexibility and supports the formation of businesses as "platforms." It is this evolution beyond the current blockchain technology to alternative types of digital value exchange that will enable future scenarios in digital business.

Think of cars that can not only negotiate parking space availability, but also receive bids on spots, calculate appropriate costs and make the necessary payments; or landowners who can indisputably verify their deeds; systems that track education history and credentials by the individual; personal healthcare records storage linked to insurance, test results, prescriptions and more; or new political voting systems.

Blockchain's near flawless history

One key strength of the Bitcoin blockchain over newer alternative digital currency technologies is that the Bitcoin technology stack has been in production, live on the internet, since January 2009, functioning almost flawlessly and without any security-related hacks.

This value of assets managed by the blockchain fluctuates but has been as much as $10* billion. This sum represents a huge bounty or reward for any party that would seek to capture this by "hacking" the blockchain. However, over many years, the Bitcoin blockchain itself has never been compromised. Because of the near-flawless track record of the Bitcoin blockchain and core stack, developers of competing architectures, platforms and technology stacks will have significant work to prove their operational risk capabilities to support mission-critical contexts in this regard.

Blockchain’s limitations

Although the Bitcoin blockchain represents a significant step forward in the enablement of digital business, this 1.0 version of distributed ledger technologies has significant limitations, to the point where some of these can be considered severe design flaws, such as:
  • Scalability (a theoretical maximum of seven transactions per second for the entire system, plus the need to replicate the entire ledger in every node in the network).
  • Speed (a minimum delay of 10 minutes in confirming transactions).
  • Confidentiality/transparency (all transactions amounts are public).
  • Governance (no clear structure for decision making, heavily dependent on individual personalities).
  • Manageability (no built-in mechanisms).
  • Transaction finality (transactions are probabilistic rather than absolute).
  • Lack of resistance to centralization (80% of bitcoin mining power is controlled by just four organizations, all based in China).
  • Contradiction with respect to existing legal, accounting and taxation frameworks and rules and industry operating structures.
The Future of the Bitcoin blockchain

It appears that the era of blockchain proliferation has just begun, and organizations are now developing proof of concepts to address related, but distinct goals. Some vendors and organizations see the limitations and shortcomings of the Bitcoin technology stack, and are either trying to address those or instead seeking a wholesale replacement of the Bitcoin stack. Some have implemented a demonstrable or beta-stage system, while others are still assembling components or considering the best architecture.

Through the next five years, there will be multiple distributed ledger platforms powering digital business and laying the foundation for the programmable economy. The road to the programmable economy is a long one, and will take decades, just as the internet and web each took decades to reach their full potential. In the short- to mid-term, executives should concentrate on provability of business use case and, critically, the underlying technologies — pushing back on “blockchain washing” (the process of relabeling or rebranding unrelated technology as blockchain, when they are not). Additionally, CIOs should consider the relative merits (return on capital employed) of blockchain investments against existing technologies and capabilities, until productivity outweighs hype.

Financial Services
  • Asset Management: Trade Processing and Settlement
  • Insurance: Claims processing
  • Payments: Cross-Border Payments
Smart Property
  • Unconventional money lenders/ hard money lending
  • Your car/ smartphone/ daily life things etc.
  • Blockchain Internet-of-Things (IoT)
  • Smart Cities
  • Smart Appliances
  • Smart Cars
  • Supply Chain Sensors
  • Smart Contracts (Use smart contracts for all sort of situations, such as financial derivatives, insurance premiums, property law, and crowd funding agreements, among others.)
Blockchain Healthcare
  • Personal health records could be encoded and stored on the blockchain with a private key which would grant access only to specific individuals.
  • The same strategy could be used to ensure that research is conducted via HIPAA laws (in a secure and confidential way).
  • Receipts of surgeries could be stored on a blockchain and automatically sent to insurance providers as proof-of-delivery.
  • The ledger, too, could be used for general health care management, such as supervising drugs, regulation compliance, testing results, and managing healthcare supplies.
Blockchain Music
  • Key problems in the music industry include ownership rights, royalty distribution, and transparency.
  • The digital music industry focuses on monetizing productions, while ownership rights are often overlooked.
  • The blockchain and smart contracts technology can circuit this problem by creating a comprehensive and accurate decentralized database of music rights.
  • At the same time, the ledger and provide transparent transmission of artist royalties and real time distributions to all involved with the labels.
  • Players would be paid with digital currency according to the specified terms of the contract.
Blockchain Video, Audio, Content Software Piracy

Blockchain Government
  • Election Data
  • Secured Voting System
  • Fast Voting Process
  • Leader Background & Record Check
  • Leader Work Record Check
  • Farming
  • Medicine
  • Secret & Private Mission Data
  • Ammunition
  • Investment Fund & Political Party Funding
  • Reserve Bank Data & Document
  • Ticket System
  • Booking Management
  • Public value/ community (Self-management platform for companies, NGOs, foundations, government agencies, academics, and individual citizens. Parties can interact and exchange information on a global and transparent scale – think of Google Cloud, AWS but larger and less risky.)
  • Vested responsibility (Smart contracts can ensure that electorates can be elected by the people for the people so that government is what it’s meant to be. The contracts specify the electorate’s expectations and electors will get paid only once they do what the electorate demanded rather than what funders desired.)
  • Blockchain Identity (Whether we like it or not, online companies know all about us. Some companies whom we purchase from sell our identity details to advertisers who send you their ads. The blockchain blocks this by creating a protected data point where you encrypt only the information that you want relevant people to know at certain times.  For example, if you’re going to a bar, the bartender simply needs the information that tells him you’re over 21.)
  • Population Counting
Blockchain Identity
  • Passports
  • Birth, wedding, and death certificates
  • Personal Identification
  • Voter Card, Aadhar Card, Social Security No etc.
The blockchain can protects your identity by encrypting it and securing it from spammers and marketing schemes.

There are other questions as well what blockchain can solve
  • What can companies do to protect their systems from being invaded?
  • How can inventors shield their ideas?
  • How should governments protect their secret information from spies and potential terrorists?
  • How to protect data from the hackers?
Please let me know what your thoughts are on this and anything else you would like to suggest to make it more informative for all of us.

Blockchain Revolution Summery - By Prince Bhalani

COMMENTS

Name

©2012 Oceninfo.co.cc,2,10:29 IST,1,2012,1,Adfly Bot,2,AFCEH,1,Ajax security,1,all posts for education purpose only...www.facebook.com/princebhalani,1,Android,1,android developer,1,android phone,1,android phone-1,1,anonymous email,1,Anti-Trojan software,8,Antivirus,1,Apple,1,article marketing,1,at risk,1,attacks,1,australian federal police,1,Auto Clicker,1,Auto surfer,1,backtrack link,2,Bank Hacking,2,BCMSN,2,BIOS Update,1,Blockchain,1,Blog and tagged Ransomware,1,boot fast...,1,boot xp faster,1,Business Deals,1,Bypass Antivirus and Hack Window Systems,1,CCIE,2,CCNA,2,CCNP,2,CEH,2,challenge-response system,1,Changing Root Bridge Election Results,2,code,2,commands,1,company deals,1,Computer Hacking,3,Connect,1,cookie stealing,3,Country,1,Crack,1,Credit Card Fraud,2,credit cards,1,Cryptography,1,cyber cell updated,1,cyber security,1,DATA CARD TRICK,1,delhi,1,Digital Marketing,1,direct admission in any colleges,2,Direct Link,3,Directory Traversal Attacks,1,Dos and Ddos,1,DotNetNuke Remote File Upload Vulnerability,1,Earn Lots of money,3,EARN MONEY PART2,1,earnings in$,1,email hacking,4,email spoofing,2,Er Prince Bhalani jobs,1,Ethical Hacker job,1,ethical hacking,8,exploit,1,facebook autoliker,1,Facebook tricks,3,Fake Mail,1,fake sms,1,FB hackz,1,FBI,1,FBI HACKERS,2,FBI Jobs,2,featured,6,Finger scan,1,fingerprint Hacking,1,format without pain,1,Free Download,1,Free Flash Templates,1,free hacking book,5,Free Recharge,1,free sms,2,Freebeacon,1,friendship day,2,friendship day image,2,friendship image,1,Future Computer,2,future of hacking,1,Gadgets,1,good clean fun,1,google,3,Google Ads,1,google adsense account,1,Google hacking,3,google hacks,1,google search,1,hack,2,hack the world,2,HACK WEBSITES USING SQL INJECTION,2,hacker,1,hacker uni,1,hacker/LPT/etc,1,hackers,2,Hackerz info,1,hacking,4,hacking games,1,hacking matterial,1,HACKING OFER,1,hacking softwares,1,hacking tools,2,Hacking with Mobile phones,1,HackingTeacher Security Solutions,1,hacks,1,hijack,1,history of hacking,1,How to,8,How to Hack,37,how to play,1,How to sniff,1,html,1,HTTPS/SSL secured sites,1,I LOVE YOU VIRUS,1,i-phone hacking,1,ICITAM 2012,1,iCloud Era,1,In Flow,1,indian cyber cell,4,information security,1,interesting,1,inurl:fcklinkgallery.as,1,IP hacks,1,iphone,1,IT Act,1,IT Decision Maker,1,IT Implem_App/LOB Spec,1,IT Implem_Desktop/EndUser Spec,1,IT Implem_Infrastructure Spec,1,IT Implem_IT Generalist and IT Manager.,1,it security,1,java,1,jobs for ethical hacker,3,jobs in hacking,5,Joe job,1,Just for education purpose only,1,Kaspersky,1,kaspersky crack 2013,1,keyboard hacking,1,keyloggers,1,keywords,1,Laptop Tracking,1,Laws of computer crime,1,Learn Cracking,1,Learn Website Hacking,7,Linkbucks Bot,1,Macromedia Flash,1,make some rules...|||_|||,1,malicious code,1,Malware,1,malware analysis,1,man in the middle attack (LAN),1,master,1,master list,1,metasploit,3,Microsoft scams,1,mobile,1,mobile recharge,1,moblie phone hacking,1,munging,1,network hack,1,Network Sniffers,1,new command set,1,new projects,1,nmap,1,No Survey,1,not infrequent,1,online scanners,1,paisa live hack,1,panetration for educational purpose only,1,Parental Controls,1,password hacking,4,Password sniffing with arp poisoning,1,PC TIPS,1,PE_PARITE (Trend Micro),1,penetration testing,1,pharming,1,phishing,1,phone hacking charged,1,PHP,1,pin ball,1,Play WMV Files,1,Press Trust of India / New Delhi Aug 15,1,Prime minister,1,prince bhalani,1,princebhalani,1,Professional job in FBI,1,Professional Penetration Testing,1,Programming,1,Programming of virus,2,protect my pc against hackin,1,proxy list by http,1,Proxy SOCKS Port,1,R-Admin With Key,1,Radmin,1,RAW Jobs,1,Real Hackers vs fake ethical hackers. ..:),1,Register of Known Spam Operations (ROKSO),1,repair corrupt hard disk,1,RFT,1,Robbery,1,Rupert Murdoch,1,SAMPLE,1,Sample dynamic flash template from TM website,1,Scams,2,Scanned Vulnerabilities,1,SEA,2,search engine hacking,1,Search Operators,1,Security,2,Security breach,1,security code brack,1,SEM,4,SEO,112,SEO Mistakes,1,SEO TOOLS,1,SEO Tricks,3,SERM,1,SERP,1,Session Hijacking,4,SET,1,shell commands...,1,shell list with download,1,SITES,1,Smart Home,1,Smartphones,1,SMM,1,SMO,2,sms spoofing,1,SMTP Servers,1,Sniffing passwords,1,Sothink SWF Decompiler,1,spam cocktail (or anti-spam cocktail),1,spam trap,1,spear phishing,2,SQL hacking,2,SQL Injection Attacks by Example,2,SSL,1,SSL Analysis,1,starting of help,1,System Information,1,System Restore,1,Tablet in 1000,1,Tablets,1,Temporary Email Service,1,time need,1,timer,1,tracing,1,Traffic,3,tricks,5,Tricks and Tips,1,Trojan,1,Trojan tools,1,Trojans and Backdoors,2,trojon,7,Turbo C++,1,UK phone hacking,1,UK phone hacking arrest,1,USA JOBS,4,Virus,2,virus writing,2,VPN,1,vulnerabilities,1,vulnerability assessment,1,W32/Pate (McAfee),1,W32/Pinfi (Symantec),1,Washington,2,web hacking,6,web security,1,Website Development,1,Website Hacking,3,White House,1,wifi hacking,3,Win32 : parite (Avast),1,Win32.Parite (Kaspersky),1,Win32/Parite,1,windows,2,Windows 8 event for IT Professionals,1,wirless hack,1,WordPress,1,WordPress hacking,1,working with Virus and worm,9,XP Hacking,1,xp hacking-1,1,XP part 3,1,xss hacking,1,
ltr
item
Group Of Oceninfo: How blockchain can change the world and transform society?
How blockchain can change the world and transform society?
How blockchain can change the world and transform society?
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihXkCKJHDGvyBMEJ631DKDFmKaB1rOly6FeoPq0bwqQsITbpp2yv2aSdDiA3O2Vy8hZiMcn-oBZRVK1DuGWs_A_xlUMs7onEfRmOWsb-IxO7EEaSbRP-SQRd5wquTIy7NZoGdZOeJdBW8Q/s640/blockchainis.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihXkCKJHDGvyBMEJ631DKDFmKaB1rOly6FeoPq0bwqQsITbpp2yv2aSdDiA3O2Vy8hZiMcn-oBZRVK1DuGWs_A_xlUMs7onEfRmOWsb-IxO7EEaSbRP-SQRd5wquTIy7NZoGdZOeJdBW8Q/s72-c/blockchainis.jpg
Group Of Oceninfo
https://oceninfo.blogspot.com/2018/01/how-blockchain-can-change-world-and.html
https://oceninfo.blogspot.com/
https://oceninfo.blogspot.com/
https://oceninfo.blogspot.com/2018/01/how-blockchain-can-change-world-and.html
true
6415817773321450103
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy