Blockchain Basics: A Non-Technical Introduction in 25 Steps by Daniel Drescher

By Daniel Drescher

In 25 concise steps, you'll research the fundamentals of blockchain expertise. No mathematical formulation, application code, or computing device technological know-how jargon are used. No past wisdom in computing device technology, arithmetic, programming, or cryptography is needed. Terminology is defined via photographs, analogies, and metaphors.

This booklet bridges the distance that exists among in basic terms technical books concerning the blockchain and in simple terms business-focused books. It does so by means of explaining either the technical innovations that make up the blockchain and their function in business-relevant applications.

What you are going to Learn

  • What the blockchain is
  • Why it really is wanted and what challenge it solves
  • Why there's lots pleasure in regards to the blockchain and its potential
  • Major elements and their purpose
  • How a variety of parts of the blockchain paintings and interact
  • Limitations, why they exist, and what has been performed to beat them
  • Major program scenarios

Who This publication Is For

Everyone who desires to get a common inspiration of what blockchain know-how is, the way it works, and the way it's going to almost certainly swap the economic system as we all know it

Show description

Read Online or Download Blockchain Basics: A Non-Technical Introduction in 25 Steps PDF

Similar banking books

Chinese Stock Markets: A Research Handbook

The exponential development of China’s inventory markets long ago decade has attracted international recognition from lecturers and practitioners. The practitioner’s curiosity in chinese language markets stems from firms; traders and monetary associations foresee huge advantages from making an investment in China ultimately.

Offshore Finance

This publication used to be first released in 2006. it's predicted that as much as sixty percentage of the world's funds might be situated offshore, the place 1/2 all monetary transactions are acknowledged to ensue; despite the fact that, there's a belief that secrecy approximately offshore is inspired to obfuscate tax evasion and funds laundering.

An Introduction to the Mathematics of Financial Derivatives, Third Edition

An creation to the maths of monetary Derivatives is a well-liked, intuitive textual content that eases the transition among simple summaries of monetary engineering to extra complex remedies utilizing stochastic calculus. Requiring just a easy wisdom of calculus and likelihood, it takes readers on a journey of complex monetary engineering.

Contemporary Financial Intermediation, Third Edition

In modern monetary Intermediation, 3rd version, Greenbaum, Thakor and Boot provide a particular method of monetary markets and associations, providing an built-in portrait that places details on the middle. rather than easily naming and describing markets, rules, and associations as competing books do, the authors discover the unending subtlety and plasticity of monetary associations and credits markets.

Extra info for Blockchain Basics: A Non-Technical Introduction in 25 Steps

Sample text

However, there are two reasons why the management of ownership of digital goods is the most discussed application of the blockchain. 1 Nakamoto, Satoshi. Bitcoin: a peer-to-peer electronic cash system. 2008. pdf. 35 36 Step 5 | Disambiguating the Term First, it is the easiest to understand and to explain. Second, it is the use case with the most impact on the economy. The concept of ownership and the enforcement of ownership rights are core elements of almost every human society (even some animals have the concept of ownership and fight over its enforcement).

As a result, this step will deepen your understanding of the importance of integrity and uncovers the major problem to be solved by the blockchain. Finally, this step describes the environment in which the blockchain is expected to provide the most value. The Metaphor Many languages have a pictorial saying for describing the situation when someone tries to organize a chaotic group of individuals. For example, in English one would describe such a situation as trying to herd cats, as it illustrates the challenges of herding a group of obstinate and intractable animals that do not accept or even recognize a central authority.

This situation is comparable to running a private club that adheres to high moral standards and utilizes a rigorous on-boarding process for new members. However, the worst circumstances for achieving integrity in a distributed peer-to-peer system are given when the number of nodes and their trustworthiness is unknown. This is the case when running a purely distributed peer-to-peer system on the Internet that is open to everyone. Integrity Threats in Peer-to-Peer Systems For simplicity, one can consider two major integrity threats in peer-to-peer systems: • Technical failures • Malicious peers Blockchain Basics Technical Failures Peer-to-peer systems are comprised of the individual computers of its users who communicate via a network.

Download PDF sample

Rated 4.17 of 5 – based on 10 votes