Distributed Ledger Security Primer

Distributed Ledger Security Primer

The distributed ledger technology (DLT) that underlies cryptocurrencies like Bitcoin and Ethereum is a promising new technology. But as with any new system, it comes with unique security considerations—ones that have received less attention than they deserve. As with many other technologies in the past, attackers will likely start small before attempting more sophisticated attacks; this post will help you understand what these attacks might look like on a blockchain-based network and how to defend against them.

The Digital Ledger

The digital ledger is a record of all transactions that have occurred on the network. It’s distributed across many nodes, which means that no one person or entity can control it. The ledger is immutable: once information has been added to it, it cannot be changed or deleted without being noticed by other participants in the network. In addition to these features making a blockchain tamper-proof, they also make it …

Distributed Ledger Security Primer Read More
Industry-Defining Infrastructure As A Service

Industry-Defining Infrastructure As A Service

The IaaS model is the most popular cloud computing model in the market today. It provides virtualized computing resources over the internet, allowing end users to use them on a pay-per-use basis. In other words, you only pay for what you use rather than buying costly hardware and software licenses outright.

IaaS is a cloud computing model that provides virtualized computing resources over the internet.

IaaS is a cloud computing model that provides virtualized computing resources over the internet. These resources can be used to build and run applications, or they can simply be consumed as-is by users.

IaaS providers offer virtual machines (VMs) with varying amounts of memory, CPU cores and storage space for lease on demand. Customers pay only for what they use, whether it’s a few hours at night or 24/7 access during peak business hours with no downtime in between shifts–and without having to purchase any …

Industry-Defining Infrastructure As A Service Read More
A Comparison of Consensus Algorithms

A Comparison of Consensus Algorithms

In the world of blockchain technology, there are numerous different consensus algorithms. Some of these are better suited to short-term considerations and others are better suited for long-term use. This article will cover each of the most popular consensus algorithms in detail, and help you decide which one best fits your needs.

Proof of Work

Proof of work is a system that requires a computer to find a solution to a mathematical problem before it can add its block to the blockchain. The difficulty of this task varies depending on how much effort is being put into mining across the network. In proof-of-work systems, miners must compete with one another in order to be awarded new bitcoins or transaction fees paid by users sending transactions across the network.

In addition, proof-of-work systems make it more difficult for someone (or some entity) who does not own any computing power themselves but …

A Comparison of Consensus Algorithms Read More
How Multi-Tenancy Works In The Data Center

How Multi-Tenancy Works In The Data Center

Multi-tenancy is a way to separate tenants in the same data center. It creates a virtualized layer between tenants and service providers, so they don’t have to share anything. Tenants are assigned a dedicated compute environment. They create their own OS images, select their own software applications, configure their own network settings and manage their own security policies. Multi-tenancy saves money for both providers and tenants by enabling each party to scale their infrastructure independently. For example, if one tenant needs more computing power, they can make that change without affecting other tenants. This provides flexibility in terms of scaling up or down an environment as needed by the tenant. Each tenant’s workloads are isolated from other tenants’ workloads at all layers of the datacenter–from compute to storage to networking–which eliminates any potential conflicts.”

Multi-tenancy is a way to separate tenants in the same data center. It creates a virtualized

How Multi-Tenancy Works In The Data Center Read More
Blockchain Smart Contract Development

Blockchain Smart Contract Development

The blockchain is a decentralized ledger that records digital transactions. It’s like a huge accounting book where transactions between two parties are recorded. The blockchain is shared among many users and it can only be updated by consensus of the network members. Because there’s no central authority (like a bank), blockchain technology has gained popularity as an alternative way to do business.

Smart contracts are self-executed with no need for human intervention.

Smart contracts are self-executed with no need for human intervention. They are software code that can be executed on a blockchain, where they automatically implement their terms when certain conditions are met.

Smart contracts are used to facilitate, verify and enforce many types of contractual clauses. For example:

  • Escrow services — A third party holds funds in escrow until both parties agree it’s appropriate to release them (e.g., after delivery). This reduces the risk that either party will
Blockchain Smart Contract Development Read More