Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Discuss hash functions 
  2. Symmetric and Asymmetric Cryptography, 
  3. Systems View and Vulnerabilities
  4. Ursa and why reusable libraries are important
  5. Demo of block structure through unbounded.

The Goals

Attendees learn to look at DLTs from a systems perspective , figuring out what unites them and why changes in underpinnings cause differences in functional behavior. Why are they the same yet different. Why do we need shared libraries, ursa. 

...

Power, Projector and screen, Internet (WiFI or hardwired), laptop connectivity to projector. Can provide slides that drive the session.

Slides are here

Link to editable slides


References


Notes for in a box.

According to introductions we had a diverse group of participants from multiple sectors.

Investors, provenance tracking CEOs , data scientists, ethereum developers, students etc.

What worked: A through line linking all blockchains to basic concepts of cryptography.

What needs to be changed: Have the introductions be pointed and limit to 1 minute.  

The use of unbounded.hacera.com seems to have worked.