Blockchain for Business. Группа авторов

Читать онлайн книгу.

Blockchain for Business - Группа авторов


Скачать книгу
href="#ulink_ce57b369-974d-5975-8bb9-a992adb771dc">15.1 Community Supercomputing 15.2 Blockchain Genomics 15.3 Blockchain Learning 15.4 Community Coin 15.5 Demurrage Currencies Reading List

      20  Index

      21  End User License Agreement

      List of Table

      1 Chapter 1Table 1.1 A novel comparison among public, consortium, private blockchain.

      2 Chapter 6Table 6.1 Some Blockchain solutions for managing governance.

      3 Chapter 8Table 8.1 Supply Chain actors, current limitations faced and blockchain impact.

      4 Chapter 9Table 9.1 Supply Chain actors, current limitations faced and blockchain impact.

      5 Chapter 13Table 13.1 Difference between blockchain and IoT.

      6 Chapter 15Table 15.1 Comparison of Monetary assets and Non-Monetary assets.

      List of Illustrations

      1 Chapter 1Figure 1.1 Demonstrating the pictorial impression of blockchain [2].Figure 1.2 The diagrammatic representation of the types of blockchain architectu...Figure 1.3 Figure states the types of blockchains in trend. Figure 1.4 The figure states the internal working paradigm of a blockchain.Figure 1.5 Basic architecture of mixing services [1].Figure 1.6 Different types of Networks in blockchain [5]. (a) Centralized. (b) D...Figure 1.7 Demonstrating the properties of the model [23].

      2 Chapter 3Figure 3.1 A chain of bitcoin transactions.Figure 3.2 Validating transactions [1].Figure 3.3 Timestamping block of transactions using hash.Figure 3.4 ICO process.Figure 3.5 Best performing currency of 2015 [9].

      3 Chapter 4Figure 4.1 Transaction of block [Ref:https://masterthecrypto.com].Figure 4.2 Transaction for buying Ethernet [Ref:https://www.coingecko.com/en/coi...

      4 Chapter 7Figure 7.1 Identity controlling factors, authentication, and authorization, dire...Figure 7.2 Pictorial representation of centralized, decentralized and distribute...Figure 7.3 Pictorial presentation of ‘key-data’ concept.Figure 7.4 Analytical view of blockchain identity management system. Ref: Self-S...Figure 7.5 Process of authorization in blockchain systems.Figure 7.6 Features of self-sovereign systems. Ref: consensys.net.Figure 7.7 Advantages of using blockchain systems. Ref: Blockchain Council.Figure 7.8 Process flow of blockchain identity management systems.Figure 7.9 Process of revocation in blockchain identity management systems. Ref:...Figure 7.10 Statistics of people lacking ID by region. Ref: ourworldindata.org.Figure 7.11 Advantages of blockchain identity management systems. Ref: nec.com.Figure 7.12 Traditional versus blockchain identity management systems. Ref: food...

      5 Chapter 8Figure 8.1 The parties in a Supply Chain.Figure 8.2 The five drivers of a supply chain.Figure 8.3 Different network structures. Figure 8.4 The four key concepts of blockchain.

      6 Chapter 9Figure 9.1 Sustainable supply chain management.Figure 9.2 Example of Applications of Blockchain.Figure 9.3 Transaction management in blockchain enabled supply chain.

      7 Chapter 12Figure 12.1 Types of privacy protection.Figure 12.2 (a) Centralized and (b) decentralized systems represented by nodes a...Figure 12.3 The three aspects of decentralization.Figure 12.4 Steps of wait-and-see approach.Figure 12.5 Different features of sandboxing.Figure 12.6 Scandals related to Blockchain. Figure 12.7 The two different public perception on Blockchain.Figure 12.8 The different uses of Blockchain in Cybersecurity.

      8 Chapter 13Figure 13.1 Hype cycle for emerging technologies, 2019.Figure 13.2 Market of IoT by 2025. Figure 13.3 Futuristic IoT devices.Figure 13.4 Examples where sensors and actuators are used (source: https://s3.am...Figure 13.5 Ways of connecting through web for data sharing.Figure 13.6 People and processes.Figure 13.7 Sensor to actuator flow.Figure 13.8 Architecture of IoT systems.Figure 13.9 Haze architecture for smart IoT gateway.Figure 13.10 Smart watches and fitness trackers (source: https://www.pebble.com/...Figure 13.11 Embedded skin patches (source: MC10 electronics).Figure 13.12 Brain sensing headband with embedded neuro sensors (source: http://...Figure 13.13 Relationship of cloud computing and IoT (source: https://innovation...Figure 13.14 Three tier edge computing model.Figure 13.15 Golden state food disrupting supply chain and logistics.Figure 13.16 Smartlog.Figure 13.17 Reshaping of the automotive industry using NetObjex.Figure 13.18 Transformation of Sharing Economy business-slock it.Figure 13.19 Game changer of pharmacy industry—Mediledger.Figure 13.20 Transformation of agriculture—Pavo.

      9 Chapter 14Figure 14.1 Diagram of Blockchain.

      10 Chapter 15Figure 15.1 Community Super Computing (Courtesy of Getty Images).Figure 15.2 Contagious disease and humans.Figure 15.3 Block chain provides a seamless secured information exchange between...Figure 15.4 Genome sequencing.Figure 15.5 Smart Learning (Courtesy: Manav Rachna).Figure 15.6 Blockchain-based Bitcoin.Figure 15.7 Gold.Figure 15.8 Company Shares.Figure 15.9 Indian Currency and US Currency.

      Guide

      1  Cover

      2 Table of Contents

      3  Title Page

      4  Copyright

      5  Preface

      6  Begin Reading

      7  Index

      8  End User License Agreement

      Pages

      1  v

      2  ii

      3  iii

      4  iv

      5  xv

      6  xvi

      7  xvii

      8  xviii

      9  1

      10  2

      11  3


Скачать книгу