Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Discuss hash functions 
  2. Symmetric and Asymmetric Cryptography, 
  3. Systems View and Vulnerabilities
  4. Ursa and why reusable libraries are important
  5. Demo of block structure through unbounded.

The Goals

Attendees learn to look at DLTs from a systems perspective , figuring out what unites them and why changes in underpinnings cause differences in functional behavior. Why are they the same yet different. Why do we need shared libraries, ursa. 

...

Power, Projector and screen, Internet (WiFI or hardwired), laptop connectivity to projector. Can provide slides that drive the session.

Slides are here

Link to editable slides


References


Notes for in a box.

...