Position: Home page » Blockchain » Decision analysis based on blockchain
Decision analysis based on blockchain
Publish: 2021-03-27 22:13:34
1. There are two kinds of blockchain analysis reports, one is the rating report, the other is the tracking report. The basic sections include four parts: basic project information, team situation, social media situation, technology progress and market trend. The only difference is that the evaluation report will give the project score, such as cannon rating, and the tracking report will take the long-term tracking method for continuous attention. For example, the first-class position will be analyzed by two shifts a week.
2. Several successful ones are block chain housing rental platform in xiong'an New District, SMIC block chain public service platform in Changsha high tech Zone, and block chain Real Estate Registration Platform in Loudi. Hunan has done a good job in the application of block chain technology in the whole country. There are mature and successful application cases in provincial capitals and prefecture level cities.
3. Chongqing jinwowo analyzes the impact of blockchain technology on the instry: blockchain will determine the relationship between people and all the Internet including artificial intelligence. The change of this relationship will have a subversive impact on the mainstream Internet business model and create a new era of decentralization.
4. According to the analysis of jinwowo group, the problems faced by the smart contract based on blockchain are as follows:
1-security problem: one of the key problems is security and trust. The smart contract system is designed to be an environment without trust, which means that the mistakes can not be corrected
2 - Privacy: one of the challenges of effective use of blockchain is to provide thorough transparency
3 - unexpected scenario problem: smart contract sounds very good, but how to correctly and appropriately handle the contract execution in unexpected scenarios is a problem.
1-security problem: one of the key problems is security and trust. The smart contract system is designed to be an environment without trust, which means that the mistakes can not be corrected
2 - Privacy: one of the challenges of effective use of blockchain is to provide thorough transparency
3 - unexpected scenario problem: smart contract sounds very good, but how to correctly and appropriately handle the contract execution in unexpected scenarios is a problem.
5. "Fire coin blockchain big data" includes "data on the chain", "social media data" and "market data". For example, according to the recent market performance, six conclusions can be drawn. Metcalfe's law in bitcoin: the logarithm of bitcoin price and the logarithm of the square of the number of active addresses are highly positively correlated; The two-level emotional differentiation of community participants is serious, which is quite different from 71% of investors in the questionnaire survey; The longest consecutive decline cycle of bitcoin price in history is 8 days, and 97% of the consecutive decline cycles are within 6 days; Among several common digital assets, the correlation coefficient of iota and BCH is the highest, which is 0.97, while the correlation coefficient of LTC and EOS is the lowest, which is only 0.1.
6. The upgrading of blockchain technology enables blockchain applications to achieve regulatory
in the Internet era, computers have proposed many ways of trusted computing for a long time, that is, any blockchain technology node adopts the mole of trusted computing. Therefore, trusted computing can make it easier to upgrade and iterate technologies in distributed networks
in terms of the real name system of blockchain technology, there is a blockchain Technology Laboratory in the United States, and they have put forward many technical solutions for the real name system. For example, the current blockchain technology is point-to-point. In many countries, such as South Korea, each of them has an e-Certificate, and they need to use the real name e-Certificate for signature in the transaction. Of course, there is a simpler solution. We can store the IP address of the whole device as part of the transaction in the blockchain application
in this way, the transaction of the whole blockchain technology can realize the real name system of technology. So this is an optional real name system. We can build a real name blockchain application network or an anonymous blockchain application network
Super key is also a significant progress in the development of blockchain technology. Because it is a distributed network, how can we supervise and control it? Cryptography, we call it multi signature
we (yunbokeji) design different blockchain application networks. If it is a blockchain application network used by a bank, we can design a super key. The keys of all nodes must be combined with the super key to generate wallets
then, the super key should be in the hands of regulators or some institutions, who can have limited control over blockchain applications. For example, the data on the current blockchain application can not be deleted, so the super key actually allows the authority to modify the distributed network
so what kind of technology is blockchain:
(1) distributed decentralization,
(2) no need to trust the system,
(3) tamper proof and encryption security. I know these words separately, but what do they mean together
1. Distributed and decentralized. It's all about this on the Internet. There's no need to say more. In short, there's no need for a central server. Everyone's data is obtained from this server. Instead, the data is put on N networked devices, and everyone can download and store it
2. There is no need to trust the system. Do you believe in banks? Because the bank is recognized by the state, the blockchain realizes a trust mode without the need of a third party. It uses n devices on the Internet to store data, which can be verified by everyone. As long as more than half of the people think you're right, you're right. No one or organization can modify more than half of the content on the Internet. If you don't believe in yourself, congratulations. You are a great philosopher
3. Tamper proof and encryption security
the blockchain adopts a series of technologies, such as sha256 and ripemd160, to ensure tamper proof and encryption security. For example, 01011000111110 represents a character. The algorithm requires four bits to be shifted to the left, supplemented by zeros, four bits to the left, and four zeros to the right, How to dece the original number according to the result? Of course, this is just a simple example.
in the Internet era, computers have proposed many ways of trusted computing for a long time, that is, any blockchain technology node adopts the mole of trusted computing. Therefore, trusted computing can make it easier to upgrade and iterate technologies in distributed networks
in terms of the real name system of blockchain technology, there is a blockchain Technology Laboratory in the United States, and they have put forward many technical solutions for the real name system. For example, the current blockchain technology is point-to-point. In many countries, such as South Korea, each of them has an e-Certificate, and they need to use the real name e-Certificate for signature in the transaction. Of course, there is a simpler solution. We can store the IP address of the whole device as part of the transaction in the blockchain application
in this way, the transaction of the whole blockchain technology can realize the real name system of technology. So this is an optional real name system. We can build a real name blockchain application network or an anonymous blockchain application network
Super key is also a significant progress in the development of blockchain technology. Because it is a distributed network, how can we supervise and control it? Cryptography, we call it multi signature
we (yunbokeji) design different blockchain application networks. If it is a blockchain application network used by a bank, we can design a super key. The keys of all nodes must be combined with the super key to generate wallets
then, the super key should be in the hands of regulators or some institutions, who can have limited control over blockchain applications. For example, the data on the current blockchain application can not be deleted, so the super key actually allows the authority to modify the distributed network
so what kind of technology is blockchain:
(1) distributed decentralization,
(2) no need to trust the system,
(3) tamper proof and encryption security. I know these words separately, but what do they mean together
1. Distributed and decentralized. It's all about this on the Internet. There's no need to say more. In short, there's no need for a central server. Everyone's data is obtained from this server. Instead, the data is put on N networked devices, and everyone can download and store it
2. There is no need to trust the system. Do you believe in banks? Because the bank is recognized by the state, the blockchain realizes a trust mode without the need of a third party. It uses n devices on the Internet to store data, which can be verified by everyone. As long as more than half of the people think you're right, you're right. No one or organization can modify more than half of the content on the Internet. If you don't believe in yourself, congratulations. You are a great philosopher
3. Tamper proof and encryption security
the blockchain adopts a series of technologies, such as sha256 and ripemd160, to ensure tamper proof and encryption security. For example, 01011000111110 represents a character. The algorithm requires four bits to be shifted to the left, supplemented by zeros, four bits to the left, and four zeros to the right, How to dece the original number according to the result? Of course, this is just a simple example.
7. Whether Yingtai tb250-btc D + motherboard uses AMD rx560d or rx580 graphics card mainly depends on the performance of CPU, which has little to do with motherboard
if it's I3 or below, it can only be equipped with rx560d graphics card, and this kind of CPU can't carry rx580 graphics card. If it is an i5 or i5 or above level CPU, of course, it should be equipped with rx580 graphics card.
if it's I3 or below, it can only be equipped with rx560d graphics card, and this kind of CPU can't carry rx580 graphics card. If it is an i5 or i5 or above level CPU, of course, it should be equipped with rx580 graphics card.
8. The people's Congress should formulate relevant laws and regulations to protect blockchain technology and use it to govern the country< The party should strengthen its leadership. Improve the party's ruling ability and govern scientifically. Using blockchain technology to govern the country
the government administers according to law and makes decisions scientifically and democratically. Perform related functions, and carry out network politics and other activities
please take it.
the government administers according to law and makes decisions scientifically and democratically. Perform related functions, and carry out network politics and other activities
please take it.
Hot content