Blockchain Stories, ideas and recipes
The following is the list of 37 known smart contract weaknesses, each of which is registered under Smart Contract Weakness Classification (or SWC) with a specific code. Blockchain cybersecurity specialists will use them for auditing a blockchain smart contract before it goes to the production.
As companies are catching up in adopting blockchain technology, the choice of a private blockchain platform becomes very vital. Hyperledger, whose open source projects provide more enterprise blockchain use cases than others, is currently leading the race of private Distributed Ledger Technology
There is an ongoing interest in the business world to move towards a paperless business environment to gain efficiency and reduce error, and while some of it has taken place, there is always risk surrounding data integrity and authentication. Along with ease of use for electronic documents come the question of source validity, data integrity, and a host of other security issues. Blockchain technology is able to provide a platform that provides the security that the business world needs to integrate trust into an electronic document environment.
Given that you have several business partners who want to transact on the Hyperledger Fabric platform, you as the administrator would need to translate these actors into corresponding entities within the Hyperledger Fabric environment along with all the necessary supporting components.
In this article, we discuss ways in which you can create fractional asset ownership models using blockchain technology while explaining how the new formation of asset liquidity models via Blockchain Tokenization works.
Ethereum is a general-purpose blockchain that is more suited to describing business logic, through advanced scripts, also known as smart contracts.
IBM Cloud provides an enterprise blockchain platform as a flexible blockchain-as-a-service, which is based on Hyperledger Fabric. In this recipe, we show you how to create, deploy, and manage a secure enterprise blockchain application on IBM Cloud.
In this recipe, we will look at ways that data can be stored in a distributed manner by way of two different platforms: IPFS and Swarm. For introducing both platforms, we will create a small project to help us become familiar with how IPFS can be used programmatically in a website frontend.
Hyperledger is a set of open source tools and blockchain subprojects resulting from cross- industry collaboration. We will present two main components in this recipe – Hyperledger Fabric and Hyperledger Composer.
In this recipe, blockchain developers can quickly learn and setup Composer Playground for deploying business networks via implementing models, transaction logic, access control, and query definitions in Hyperledger Composer.
This recipe shows you how integrate Hyperledger Composer with a client application using a front-end framework like Angular.JS. In doing so, you learn how to work with Hyperledger Composer RESTful API.
In this recipe, we will go through a step-by-step guide to implement a transaction processor or a smart contract, in our transaction family example using the Sawtooth Python SDK.
In this recipe, we explore Hyperledger Indy Command Line Interface by creating and listing the wallet, importing and using decentralized identifier and creating and listing hyperledger indy node pool.
In this recipe, we will deploy and run the sample Ethereum smart contract that is built by Solidity programming language on Hyperledger Burrow. It shows you how to build and deploy Ethereum DApps in Hyperledger.
Lian Everett Stevens
In this recipe,we show you how to build chaincode or smart contracts step-by-step in Hyperledger Fabric using Golang.
This recipe shows you how to setup Web3.JS API for Ethereum blockchain applications step-by-step by building a peer-to-peer auction app. Along the way, you learn how to use JSON, Truffle and Golang for deploying and managing Ethereum smart contracts.
In spite of lots of contents and technical documentations available online for learning blockchain development, many developers get confused by number of platforms, terminologies and concepts. To make the learning of blockchain development easier, we have written a few hands-on tutorials that help beginners to find their feet in blockchain development.
Django is a Python-based free and open-source web framework, which follows the model-template-view architectural pattern. Django's primary goal is to ease the creation of complex, database-driven websites. With Django, you can take web applications from concept to launch in a matter of hours. Django takes care of much of the hassle of Web development, so you can focus on writing your App without needing to reinvent the wheel.
It is very important to scale and secure your applications. Scaling and securing are not one-time tasks. You need to keep making changes to your code as you add new features to increase application security, and as your application traffic and data increases, you need to scale your servers.
Angular 1 was based on the MVC architecture whereas Angular 2 is based on a components-and-services architecture. Angular 1 and Angular 2 are completely different in terms of architecture and APIs
Cards are a new component in Bootstrap 4 that replaces wells, panels, and thumbnails. A card is a flexible and extensible content container. It includes options for headers and footers, a wide variety of content, contextual background colors, and powerful display options.
The architecture of server-side application development for complex and large applications (applications with huge number of users and large volume of data) shouldn't just involve faster response and providing web services for wide variety of platforms. It should be easy to scale, upgrade, update, test, and deploy.
Bootstrap 4 is the latest version of Bootstrap at the time of writing. This version makes Bootstrap more powerful and easy to customize and use. In this article, you will learn about the new features of Bootstrap 4 with examples.
Browsers that support WebRTC provide APIs to exchange data in real time directly between browsers and also retrieve stream from physical media sources without the use of plugins. In this article, we will discuss WebRTC and also the PeerJS library that wraps the WebRTC APIs to provide an easy to use API to work with WebRTC.
We have been using COMET techniques to implement bidirectional communication between a web browser and web server. Long polling is the most popular technique of achieving bidirectional communication between a web browser and web server...
In this article, we first talk about popular blockchain use cases across industries, including financial, civil services, supply chain, IoT, and healthcare, at a high level. We will then proceed to a discussion of factors for consideration, before determining proper use cases and developing a successful DApp.
In this article, we look at one blockchain use case in more detail and talk about steps leading to the implementation of a Decentralized Application or DApp. The use case of healthcare data sharing will be examined further.
In this tutorial, we run an example Decentralized Application or DApp that uses Corda R3. This sample project comes with default Corda library, so it is great place for starting and learning Codra blockchain development.
Here is the complete list of all secure Linux distributions that are developed for protecting systems against security attacks. If you are a cybersecurity professional, you need to review and bookmark this page as you will need it in your future projects.
The memory management subsystem is one of the most important parts of the operating system. Since the early days of computing, there has been a need for more memory than exists physically in a system. This article reviews how Linux OS manages its memory.
This article describes what a process is and how the Linux kernel creates, manages and deletes the processes in the system. Processes carry out tasks within the operating system. A program is a set of machine code instructions and data stored in an executable image on disk and is, as such, a passive entity; a process can be thought of as a computer program in action.
This article describes how the Linux kernel maintains the files in the file systems that it supports. It describes the Virtual File System (VFS) and explains how the Linux kernel's real file systems are supported.
This article describes some of the general tasks and mechanisms that the Linux kernel needs to supply so that other parts of the kernel work effectively together.
This article describes where in the Linux kernel sources you should start looking for particular kernel functions.
Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available. In this article, we review 9 advance topics that all junior to senior Kubernetes system admin must know.
This article lists the major data structures that Linux uses. It is a definite guide for those interesting in learning Linux kernel in depth or those interesting in doing advance Linux OS troubleshooting.
In this article, we discuss United States rules and regulations around security token issued and managed via blockchain technology. The key question is how do we know whether a token is a security token? To answer this question, we need to have an overview of the US securities laws and know what will be covered under such laws. We start off reviewing Security Token Offering or STO, followed by comprehensive coverage of federal and state regulations around security token.
SEC issued a report of investigation, the so-called Decentralized Autonomous Organization (DAO) report that provided an analysis on whether a digital token could be considered as a security. This report has signification ramification for fundraising implementation via a distributed ledger or blockchain technology.
We can use grep command line to do word and phrase searches. Also, you can use grep to search for complex text patterns called regular expressions. A regular expression is a text string of special characters that specifies a set of patterns to match...
A database is a place to save information, like the customer's first names or passwords for the future uses. If your website has a login form, you are probably using a database. For example, when a user logins to your website, your system will process whether the database saved username and password are the same as the one supplied by the user...
Ethereum is a general-purpose blockchain that is geared toward describing business logic, through advanced scripts, also known as smart contracts. Ethereum was designed with a broader vision, as a decentralized or world computer that attempts to marry the power of the blockchain, as a trust machine, with a Turing-complete contract engine. Although Ethereum borrows many ideas that were initially introduced by bitcoin, there are many divergences between the two.