All Things Techie With Huge, Unstructured, Intuitive Leaps
Showing posts with label Blockchain. Show all posts
Showing posts with label Blockchain. Show all posts

Hiring Teams Instead of Individuals



HR has it all wrong. They shouldn't be hiring a person -they should be hiring a team.
I was thinking about the future of work & emergent tech. When I visit companies, often I go into an IT shop that has a mix of C# programmers who learned their trade by cracking shrinkwrap, writing "Hello World" tutorials & kiddie scripters who barely know how to write SQL code. These people did an adequate job of filling the IT needs at a good price when the company needed it. When it comes time to stretch the tech muscles, they hire one new guy & expect him to make a silk purse out of a sow's ear. However, in the bunch there're gems who can perform well beyond their pay grade, but they're held back by a majority of folks who are afraid of what they don't know and the prospect of let go or marginalized.

So why don't companies hire an established team? These people are used to working together. They know their stuff. They get a job done. They take a percentage of the profits in lieu of benefits and regular employment and move on. Blockchain and tokenization can help in this paradigm of trusted records keeping.

A team can be productive because they are independent. They don't play politics. They don't take orders from just anyone. This is good, except for a sales team.


(originally appeared as a LinkedIn post: https://www.linkedin.com/in/ken-bodnar-57b635133/ )

Blockchain Development Environments


Your blockchain development environment has a virus. It's called Windows. Of course, if you are a blockchain developer, you already know this.

The first time that I did a Docker installation of a BigchainDB  blockchain, there was a graceful implementation on Mac   & a kludge requiring 3 more pieces of software for Windows and it was problematic. (Docker & its smarter cousin Kubernetes are small, custom-configured server deployment execution environments that run on a laptop & act as a blockchain servers).

Because Mac is Unix based, and if you know Linux, you can actually fix installations that don't work. When a Microsoft Installer does something, everything is opaque & unfixable unless you have a few months to trace things through.

Now don't get me wrong. Mac blockchain installs are weird. You need a pile of stuff like curl, git, brew, node, npm, nvm, lts, as well as a couple of C & C++ compilers. You feel like you are typing in a Bosnian dialect and you would like to buy a vowel.  However, since you are issuing these commands separately, you knows what fails and what needs fixing. It isn't easier, but it is quicker to production.

Blockchains need crypto, hashing, peer networking and a database to make them blockchains. They ain't simple databases.


(originally appeared as a LinkedIn post: https://www.linkedin.com/in/ken-bodnar-57b635133/ )

Transcendence in Blockchain



Blockchain 1.0 is toast. Creating ERC20 tokens today for payments is just another form of butt-scratching. It seems that almost every new offering today is just digital effluvia from a duplicated singleton button that everyone seems to want to press to make magic. Newsflash - only 8% of ICOs ever hit the exchanges.  Why? Because there is no transcendence.

New technology implies a transcendence of the stuff used to comprise it. Bitcoin transcended blockchain and became a crypto currency. Ethereum transcended Bitcoin by introducing smart contracts. Both Bitcoin and Ethereum have value as a crypto-currency arising from their unique transcendence of their constituent elements. If you are making crypto because you have a different way to spend it, you are just like the guy who says that he has invented a new word called 'plagiarism'.

Blockchain is secure, transparent, autonomous & outage resistant. You have to find a way to use those constituent elements in an enchanting way that goes beyond the mere attributes of blockchain, Bitcoin or Ethereum. It has to transcend all of that.

When you use blockchain & tokens in a new way that changes forever the old way, you are truly disruptive.

 If I had a dollar for all ICOs that were truly disruptive, I'd be broke.


(originally appeared as a LinkedIn post: https://www.linkedin.com/in/ken-bodnar-57b635133/ )

Local versus Global Optimality




Neural Nets & Evolutionary Algorithms can be pretty dumb & pretty smart at the same time. How? The same way that quantum physics works where we have local conditions that work for our immediate locale/environment & quantum or global conditions  on a massive scale in the rest of the universe that may be invisible to us.

When you give an adaptive AI machine a learning set, it self-adjusts until it evolves to solve the problem. If it works perfectly with the data of the training set, it has local optimality. If it works universally beyond the training data, it has global optimality.

The normal algorithm of AI is to climb the closest hill it encounters, which is the best solution locally. That may not be the highest hill and the machine may be trapped at the top of a low hill. Once it reaches the summit, it doesn't know enough that it may have to climb down the hill to get to a higher better place.

This is true also in technical architecture. An application may be built that performs well locally, but fails when an attempt to scale it is made. The same is true for blockchain solutions. Some may have an ideal local application but won't fit for a variety or reasons on a global scale, and some of the factors may not be technical.

(originally appeared as a Linked In post: https://www.linkedin.com/in/ken-bodnar-57b635133/ )

Blockchain Confusion



If confusion is the first step to knowledge, the world is full of geniuses. I am still regularly confused by many things, including supporters of the US President & why a round pizza comes in a square box with triangular slices.
There are still people out there who understand the basic tenets, benefits, disadvantages & potentials of blockchain without an intrinsic understanding of blockchain transactions. For simplicity, lets define transactions as an entry to the blockchain.
Do transactions get pooped out in neat, little, synchronous, linear blocks? Yes, No & Maybe.  How's that for a quantum answer?
In many blockchains, there are blockweights or block size. Transactions go into a transaction pool & nodes start to pack them in blocks. Once the limit is reached, a block is emitted. When you expand the 2nd pic below, you will see that a Bitcoin block has between 750-2,700 transactions. Transactions may not be in order. If a transaction is stalled because of validity or any other reason, or arrives after the packing process starts & other later transactions in the pool get picked up first, then the transactions aren't in order. But there are also blockchains where a single transaction is a block. It depends on the guts of the blockchain.


(originally appeared as a Linked In post: https://www.linkedin.com/in/ken-bodnar-57b635133/ )

Report ICO, Crypto and Other Scams





In the past few days, I have had LinkedIn connections report people who have conducted ICO scams, or shady characters on LinkedIn.  Some of them connect with me just to spam me.  I've had a connection and immediate request to process anonymous money transfers to the Cayman Islands.    A couple of us have  decided to create a reputation blockchain with query of scams, ICO fakes, charlatans, shady characters, pirates of the Caribbean, swindlers, carpetbaggers etc. If you come across egregious characters, ICOs or anything that gives our blockchain/crypto  industry a bad name, drop an email with particulars to DataPrivacy@mail.com.  Eventually there will be a website with a query input.  If there are no reputation issues, you will get a thumbs-up emoji (with the disclaimer that there are no adverse reports), and if there are reputation issues you will get up to 5 thumbs-down emojis.  Thanks in advance.  (If you would like to contribute a bit of Bitcoin to help the effort along, a wallet address is:   1NfcRwZac5XrYQLkNQtBa8WBpemYpqEiwU  )

The Future of Things: Tokenization and Blockchain


I was an early adopter of the internet. It was put on my desk when I worked in a communications research lab. At the time, there were usegroups (electronic bulletin boards) and scientific papers.  It was neat but it didn't seem like much. There was no Google. There was no search.  The way to discover sites was with a spider written by a guy name Bob who had a Cool Sites that he spidered (web crawled).  A little while later, the very coolest and neatest thing on the internet, was a picture of a coffe pot in an English University that refreshed every 15 minutes.   I thought that it was neat, but at that point in time, I could not even envision how dramatically the Internet would change life.

Blockchain is at the same point as the nascent internet.  People will say "Remember the good old days of Bitcoin?" like they reminisce about Blockbuster Videos and America Online CDs.  The way that #Blockchain will revolutionize life, is through its ability to organize, monetize and revolutionize human activity and assets (actual and virtual) through TOKENIZATION.  Life will be almost completely tokenized with an astonishing interoperability of all things digital.  I intend to contribute to that tokenization effort. The best way to predict the future is to invent it.

How Blockchain Can Put Professional Project Managers Out Of A Job


At one point in my career, there was a Gartner report out saying that about 72% of IT projects were in "Recovery". It means that they were either late, over-budget or missing milestones altogether. I saw evidence of that everywhere I looked, in the large organization where I worked at the time. Huge multi-million dollar projects came to nothing. KPIs (Key Performance Indicators) were not met and things stalled -- sometimes because major stakeholders bickered over specifications after the project was started.

The band-aid fixes entailed adopting Agile methods where the scrum master was to remove impediments, or hire more consultants to speed things up. All of these actions rarely made any difference in the long run.

I have always believed that project management was merely applied common sense. I still believe it. However, I believe that common sense ain't so common. The failure of many projects hinges on missed details because the project manager operated at the 30,000 foot level, while the linchpin that caused the delay or failure was down in the weeds of project execution -- usually by a person not even on the radar of a project manager.

There has to be a better way, and to my mind, there is - blockchain. Here is the vision. Blockchain is a transparent, immutable, autonomous, outage-resistant true ledger that can have built-in intelligence with smart contracts. Suppose that instead of a Gantt chart, you had a series of smart contracts. The KPIs and milestones were all smart contracts. Having smart contracts forces one to think on an extremely granular level -- one not normally reached by a human project manager.

Each smart contract would assign a number of tokens to the project, based on activity completion. As each person in the project completed their tasks, they record their activity in the blockchain, and the blockchain itself keeps track of completion percentage by transferring tokens to the completion account. All of the tokens for that task or milestone are accounted for when complete. The sum total of all possible tokens represents a completed project meeting all goals. The blockchain is linked to an executive dashboard which does extensive drill-down reporting.

But wait, don't send money yet. There is more. Each entry in the blockchain feeds an AI engine that Map-Reduces and learns about the company's projects. This is the methodology of taking all process data (event logs and everything), integrating it into information and transforming it by abstraction into knowledge. This knowledge will be stored in a master blockchain which will have data to assist in the creation of smart contracts and the parameters necessary for future projects.

Such a system could not only out-perform a human project manager, but in the long run it would be cheaper. The most expensive part of most projects are usually the people costs and that area is usually the weakest link. The project management discipline is ripe for an AI/Blockchain disruption.

When The Customer Isn't King - Account & Data Security Breaches That Can Be Prevented



The news for two major retailer giants in Canada has not been good for them or their customers in the past few days. Loblaws, a grocer and dry goods retailer, had their PC Points loyalty system breached. One customer had 110 points worth $110 spent in the province of Quebec, and she has never even visited that province. Another customer who is a system administrator, said that he had a different password for every account, had his points stolen as well. News link: http://globalnews.ca/news/3237876/ps-plus-points-stolen-security-breach/

As well, Canadian Tire, a retail giant that sells everything from automobile accessories to sporting goods to snack foods, has been hacked, compromising both loyalty points and credit card balances online. News link: http://globalnews.ca/news/3236903/exclusive-canadian-tire-website-breached-consumer-accounts-in-question/

The financial losses of hacks such as these, are tremendous. When Target was breached in 2014, they estimated the losses to be $148 million dollars according to an article in Time Magazine. In that same year, job losses due to customer data breaches were estimated at 150,000 people in Europe. The global picture is frightening. McAfee, the Intel security company estimates monetary losses of $160 billion per year for data breaches.

Hacking isn't exactly a new phenomena. In 1979, infamous convicted hacker, Kevin Mitnick broke into his first major computer system, the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. The most embarrassing privacy breach came when Ashley Madison, the website for having extra-marital affairs, was hacked and over 30 million names and credit card numbers were exposed, causing at least two suicides.

So in this day and age, why does this happen? Can it be prevented?

Aside from an inside job, one of the reasons that hacking is successful, is the antiquated way that servers, databases and accounts are accessed. To connect to a server, one usually must have a username and a password. This is true to gain access to a server as an administrator. However one doesn't need administrator access to hack into data and accounts. Customer account information is stored in what is known as a 4GL database (4th Generation Language). This table-driven database is usually clustered on it own server and is exposed to the outside world so that its data can be accessed by platforms, analytics, and web interfaces. Again, with a user name and password, once can gain entrance to the data store and exploit the data. Many many databases still have "root" as the username to gain God-like access, and all that you have to do is either guess, derive, or gain access to the password. Many administrators commit the cardinal sin of using the same password on all accounts, and it may be gotten from such things as the name of their pet, which is information on social media. For years, the huge database company Oracle shipped their databases with a default account name of "Scott" and a password of "Tiger", left over from one of the original developers, that were never removed. I walked into many data centers as a consultant, and typed in Scott/Tiger and got access to the crown jewels.

No matter how much security that is built into any system, it is still vulnerable to the shaky access of system of a username and password. There is a better way. It is inexpensive, fairly autonomous, easy to use, and orders of magnitude more secure than a conventional database approach to storing customer data. It is a blockchain.

People know blockchain from the digital crypto-currency Bitcoin, and that fact alone has poisoned the well for quick adoption of blockchain technology. Blockchain is a technology & methodology for the digital recording of any transactions, events, ancillary derived meta-data & chronological logging of any business transaction that requires security, integrity, transparency, efficiency, audit & resistance to outages. It is the acme of trusted data. It also stores values like crypto-currency, digital cash and loyalty points, but its main selling point is that it is a true, autonomous ledger. Period.

When a technology evangelist mentions blockchain to the C-Suite level, several things happen. If they have heard of blockchain and its association with Bitcoin, there is pushback, because of how crypto-currencies have been exploited in the press. If they haven't heard of blockchain or have heard of it, but do not understand it, there is a fear of committing to the unknown. There are only about 2,000 blockchain developers worldwide, and most of them are still building proofs of concept. C-Level tech officers in corporations do not have the tech talent to immediately go to this technology, and it is perceived as untested bleeding edge stuff (not true). The other fly in the ointment, is that there is a blockchain consortium built around the Ethereum platform. That may all be well and good, but Fortune 500 is more suited to a private blockchain, controlled by themselves as they are responsible for their data.

So why is a blockchain more secure? For starters, any responsible blockchain incarnation does away with username and passwords. Authentication is done with a private encryption key right on the device. No amount of keylogging or password trapping will allow the breach. On top of it, conscientious construction of the authentication should be done with a tandem collection of MAC address or MDID of the mobile device. A MAC address is the embedded serial number of the network card in the computer that can easily be collected by any web page and MDID is the hardware serial number of a mobile phone or tablet that can be externally queried. Thus, any machine making changes to the data can be identified by device and encryption key.

On top of all of that, each blockchain query agent needs an encryption key just to read the blockchain. No amount of brute force hacking can get you into the blockchain, unless you are authorized to do so, and have a key created for you.

Blockchains can not only hold digital values like money or loyalty points, but they also can contain bits of code that enable smart contracts. In fact, they can store a digital anything. In other words, when certain conditions are met, actions can happen securely because of code embedded in the blockchain. Blockchains are impervious to data being fraudulently altered, because each transaction is linked to a previous transaction using encryption and hashing. You would have to change the entire transaction history to perpetrate a fraud.

The last benefit of blockchains is not that obvious, but highly desirable. You can write any information to the payload of a blockchain. So if you store transactions with a semantic, machine-readable identifiers, one can perform stream analytics in real time on the transactions. This can be coupled to machine learning, not only to identify fraud, but also to enable wallet-stretch to sell the consumer more things that they really need.

Does a beast such as a private semantic blockchain exist? You bet. Ping me.

Process Mining From Event Logs -- An Untapped Resource And Wave of The Future


A couple of years ago, I was searching for untapped horizons in data mining, and I came across a course given by Professor Wil van der Aalst where he pioneered the technology of business process mining from server event logs. Naturally I signed up for the course. It is and was a fascinating course, not only due to its in-depth and non-trivial treatment of gleaning knowledge from data, but for me, it got the creative juices flowing to think of where it could be applied elsewhere. I was so intrigued with the possibilities, that I created a Google Scholar Alert for Professor van der Aalst's publication. The latest Google alert was on January 31rst, and it was a paper entitled "Connecting databases with process mining". The link is here: http://repository.tue.nl/858271 It was this paper that triggered this article.

I am a huge proponent of AI, Machine Learning and Analytics. In Machine Learning, you gather large datasets, clean the data, section the data into smaller sets for training & evaluation, and then train an AI machine with hundreds, perhaps thousands of training epochs until the probability of gaining the sought-after knowledge crosses an appropriate threshold. Machine intelligence is a huge field of endeavor and it is progressing to be a major part of everyday life in all phases of life. However, it is time consuming to teach the machine and get it right. Professor van der Aalst's area of expertise can provide a better way. Let me explain:

My particular interest, is that I am building a semantic blockchain to record all of the data coupled to vehicles, autonomous or not. Blockchain of course, is an immutable data ledger that is true, autonomous itself in operation, disintermediates third parties and is outage-resistant. Autonomous vehicles will by law, be required to log every move, have records of their software revisions, and have records like post-crash behavior etc.

I immediately saw the possibilities of using this data. Suppose that you are in an autonomous vehicle and that vehicle has never been on a tricky roadway that you need to navigate to get to your destination. Your car doesn't know the route parameters, but thousands of other autonomous vehicles have, including many with your kind of operating system and software. With the connected car, your vehicle would know its GPS coordinates and query a system for the driving details for this piece of roadway that is unknown to the computer. Instead of intense computational ability required to navigate, a recipe with driving features could be downloaded.

Rather than garnering those instructions from repeated training epochs in machine learning, one could apply process mining to the logs to extract the knowledge required. There are already semantic methods of communicating processes, from decision trees to Petri nets, and if the general process were already known to the machine, it would reduce the computational load. As a matter of fact, each vehicle could have a process mining module to extract high level algorithms for the roads that it drives regularly. That in itself will reduce the computational load of the vehicles. It would know in advance, where the stop signs are, for example, and you won't have Youtube videos of self-driving cars going through red lights and stop signs.

It goes a lot further than autonomous vehicles. This concept of creating high level machine processes through event logs can be applied to such diverse fields from robotic manufacturing to cloud server monitoring and numerous fields where human operators or real world human judgement is required.

Process mining could either eliminate machine learning in a lot of instances, or it could supplement it, with a mix of technologies. The aim is the same, which is aggregating data into information and integrating information into knowledge, both for humans and machines.

This process mining business reminds me of the history behind Bayesian Inference. The Reverend Thomas Bayes discovered probability and prior belief equations. They sat on a dusty shelf for over 200 years and they were re-purposed for computer inference and machine intelligence. I think that Professor van der Aalst's methodologies will be re-purposed for things yet un-imagined, and it will not take 200 years to come to fruition.



When The Customer Isn't King - Account & Data Security Breaches That Can Be Prevented



The news for two major retailer giants in Canada has not been good for them or their customers in the past few days. Loblaws, a grocer and dry goods retailer, had their PC Points loyalty system breached. One customer had 110 points worth $110 spent in the province of Quebec, and she has never even visited that province. Another customer who is a system administrator, said that he had a different password for every account, had his points stolen as well. News link: http://globalnews.ca/news/3237876/ps-plus-points-stolen-security-breach/

As well, Canadian Tire, a retail giant that sells everything from automobile accessories to sporting goods to snack foods, has been hacked, compromising both loyalty points and credit card balances online. News link: http://globalnews.ca/news/3236903/exclusive-canadian-tire-website-breached-consumer-accounts-in-question/

The financial losses of hacks such as these, are tremendous. When Target was breached in 2014, they estimated the losses to be $148 million dollars according to an article in Time Magazine. In that same year, job losses due to customer data breaches were estimated at 150,000 people in Europe. The global picture is frightening. McAfee, the Intel security company estimates monetary losses of $160 billion per year for data breaches.

Hacking isn't exactly a new phenomena. In 1979, infamous convicted hacker, Kevin Mitnick broke into his first major computer system, the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. The most embarrassing privacy breach came when Ashley Madison, the website for having extra-marital affairs, was hacked and over 30 million names and credit card numbers were exposed, causing at least two suicides.

So in this day and age, why does this happen? Can it be prevented?

Aside from an inside job, one of the reasons that hacking is successful, is the antiquated way that servers, databases and accounts are accessed. To connect to a server, one usually must have a username and a password. This is true to gain access to a server as an administrator. However one doesn't need administrator access to hack into data and accounts. Customer account information is stored in what is known as a 4GL database (4th Generation Language). This table-driven database is usually clustered on it own server and is exposed to the outside world so that its data can be accessed by platforms, analytics, and web interfaces. Again, with a user name and password, once can gain entrance to the data store and exploit the data. Many many databases still have "root" as the username to gain God-like access, and all that you have to do is either guess, derive, or gain access to the password. Many administrators commit the cardinal sin of using the same password on all accounts, and it may be gotten from such things as the name of their pet, which is information on social media. For years, the huge database company Oracle shipped their databases with a default account name of "Scott" and a password of "Tiger", left over from one of the original developers, that were never removed. I walked into many data centers as a consultant, and typed in Scott/Tiger and got access to the crown jewels.

No matter how much security that is built into any system, it is still vulnerable to the shaky access of system of a username and password. There is a better way. It is inexpensive, fairly autonomous, easy to use, and orders of magnitude more secure than a conventional database approach to storing customer data. It is a blockchain.

People know blockchain from the digital crypto-currency Bitcoin, and that fact alone has poisoned the well for quick adoption of blockchain technology. Blockchain is a technology & methodology for the digital recording of any transactions, events, ancillary derived meta-data & chronological logging of any business transaction that requires security, integrity, transparency, efficiency, audit & resistance to outages. It is the acme of trusted data. It also stores values like crypto-currency, digital cash and loyalty points, but its main selling point is that it is a true, autonomous ledger. Period.

When a technology evangelist mentions blockchain to the C-Suite level, several things happen. If they have heard of blockchain and its association with Bitcoin, there is pushback, because of how crypto-currencies have been exploited in the press. If they haven't heard of blockchain or have heard of it, but do not understand it, there is a fear of committing to the unknown. There are only about 2,000 blockchain developers worldwide, and most of them are still building proofs of concept. C-Level tech officers in corporations do not have the tech talent to immediately go to this technology, and it is perceived as untested bleeding edge stuff (not true). The other fly in the ointment, is that there is a blockchain consortium built around the Ethereum platform. That may all be well and good, but Fortune 500 is more suited to a private blockchain, controlled by themselves as they are responsible for their data.

So why is a blockchain more secure? For starters, any responsible blockchain incarnation does away with username and passwords. Authentication is done with a private encryption key right on the device. No amount of keylogging or password trapping will allow the breach. On top of it, conscientious construction of the authentication should be done with a tandem collection of MAC address of MDID of the mobile device. A MAC address is the embedded serial number of the network card in the computer that can easily be collected by any web page and MDID is the hardware serial number of a mobile phone or tablet that can be externally queried. Thus, any machine making changes to the data can be identified by device and encryption key.

On top of all of that, each blockchain query agent needs an encryption key just to read the blockchain. No amount of brute force hacking can get you into the blockchain, unless you are authorized to do so, and have a key created for you.

Blockchains can not only hold digital values like money or loyalty points, but they also can contain bits of code that enable smart contracts. In fact, they can store a digital anything. In other words, when certain conditions are met, actions can happen securely because of code embedded in the blockchain. Blockchains are impervious to data being fraudulently altered, because each transaction is linked to a previous transaction using encryption and hashing. You would have to change the entire transaction history to perpetrate a fraud.

The last benefit of blockchains is not that obvious, but highly desirable. You can write any information to the payload of a blockchain. So if you store transactions with a semantic, machine-readable identifiers, one can perform stream analytics in real time on the transactions. This can be coupled to machine learning, not only to identify fraud, but also to enable wallet-stretch to sell the consumer more things that they really need.

Does a beast such as a private semantic blockchain exist? You bet. Ping me.