The register of packages on Ethereum

Today only the lazy one does not launch another useless project on the blockroom, in this lesson I will tell you how to do something that has practical application. As an example, let's take a package register like npm just using a digital signature, a decentralized Swarm store and smart contracts based on Ethereum.
is used. attack by the message , for this, before the hash sum is taken to the beginning of the data, the length value is added in the form of a 64-bit number with the order of bytes from the lowest to the highest.
 
Algorithm
 
 
The package is registered (by name) by a smart ...
+ 0 -

In addition to crypto-currencies: what else is used for blocking

In addition to crypto-currencies: what else is used for blockingAccording to Research and Markets, the size of the global block-market by 2023 will grow up to $ 6 billion at an average annual growth rate of 48%. Over the past two years, we have seen an increase in investments in companies engaged in the development of blocking applications for the financial sector.
 
 
For example , Chain of San Francisco, which is creating a block-based solution for financial institutions, attracted almost 44 million investments from various ...
+ 0 -

Proof-of-Proof-of-Work on the fingers. On the way to a sensible blockade

Proof-of-Proof-of-Work on the fingers. On the way to a sensible blockadeThe blocking protocols should provide a consensus among the nodes of the decentralized system. Perhaps the most famous consensus algorithm can be considered "braked, but reliable, because the braked" algorithm of Proof-of-Work: each node, having a set of new transactions, sorts through a certain number of nonce, which is the field of the block. A block is considered valid if all the transactions inside it are valid and the hash function of the block header has some common feature (for example, the number of zeros at the beginning, as in Bitcoin):
 
 

Hash (Block {transaction, nonce,}) = 000001001


 
As y...
+ 0 -

Cryptobankomat, contemporary creativity and Russian officials

Recently, crypto-minds and blockbuster enthusiasts gathered in Moscow within the framework of the work of the BlocheinRF-2018 Congress. The sophisticated Moscow public had something to see: a cryptobank, a portrait of Crypto-Mama and more than 200 experts in the crypto industry.
 
 
Contemporary creativity
 
If the crypto currency you are not particularly interested, then it is simply impossible to pass past contemporary creativity. May the author of these masterpieces forgive me, but unfortunately there is no sign in the photo.
 
Crypto-mom
 
Cryptobankomat, contemporary creativity and Russian officials
 
...
+ 0 -

What is EVPN /VXLAN

What is EVPN /VXLANIn this article I will tell you what EVPN /VXLAN is and why the features of this technology seem to me attractive for use in data centers. I will not deeply immerse you in technical details, but I will focus on them only to the extent that it is necessary to get acquainted with the technology. Almost everything I will touch in this article is somehow related to the transmission of OSI second-level traffic between devices in one broadcast domain. There are many tasks of an applied nature that you can comfortably solve, having such an opportunity, one of the most familiar examples of such a task ...
+ 0 -

We write heavenly bees on Cloud Haskell

We write heavenly bees on Cloud Haskell  
Hello, Habr!
 
 
Only 11577635 seconds have passed since the end of the autumn school GoTo in ITMO. The week of Distributed Systems began with the prototyping of a distributed system on Cloud Haskell. We started cheerfully and therefore quickly found out that the existing documentation without PhD is difficult to understand - and decided to write a methodology.
 
 
Under the cut, the introduction to p2p cloud haskell, a slightly functional stack of RS prototyping, motivation and "but why".
 
libp2p !! And he will be right. Partially.
 
 
libp2p solves the transport ...
+ 0 -

Analysis of the market trends of crypto-currencies (for Bitcoin example)

Analysis of the market trends of crypto-currencies (for Bitcoin example)At the moment there is an endless number of publications analyzing the market of crypto currency from experts of all colors and ranks. The topic is so in demand that did not make its review only lazy and not sophisticated. The forecasts of analysts sometimes differ so much that you can not decide what to do next: look for a bank that can be put into an apartment and invest in another "-coin", or train in front of a mirror a corrosive "I said!" And with an infernal laugh the ghost of Loni Golubkov.
 
 
This article does not set itself the goal of persuading the reader in favor of investing in cryptology...
+ 0 -

Why are network engineers programming

Why are network engineers programmingIt is interesting to exchange opinions and experience of using programming languages ​​in solving network engineer tasks, if you use any methods and approaches of automation, write about it in the comments, and I'll tell you about some of my developments in this direction.
 
 
Not so long ago, I was a participant in the project to change the scheme of IGP interaction, within the project it was necessary to make a migration in a live network. Given the scale of the project, the work was broken down into several independent stages, and developed a fine, in terms of network design, migration plan ...
+ 0 -

Data exchange in distributed networks

In decentralized networks, processing data is much more difficult than in centralized ones. In addition, technical schools and universities teach, mainly, the programming of client-server systems. Therefore p2p-programmers are orders of magnitude smaller than programmers of client-server systems.
 
 
By this article, I decided to partially fill the gap by listing the eight distributed technologies known to me: the first three describe ways of distribution (distribution) of data over the network, others 5 explain distribution methods (separation) of data.
 
 
Data exchange in distributed networks ...
+ 0 -