At first glance it may seem absurd that someone would need a service in order to have an IOTA node.
That’s because the activation of a known IOTA node is in fact a very simple operation, and in the coming releases the configuration of peering with other nodes will be fully automated.
However, node activation may be required for several reasons and some of these introduce additional complexities.
For example, if an application based on the IOTA network publishes data, being able to ensure node response times is a key factor. …
Recently, Deutsche Bank released an interesting study comparing the development of the Internet with the spread of crypto-currency. You can download it here.
I really enjoy the “money flower” on page 4, which immediately makes visually understandable the great variety of contexts in which we use currency.
And of course it is impressive to note the overlapping of the Internet adoption curve with the number of crypto-currency wallets.
Where’s the mistake?
The basic error that I identified in this study is the tendency to consider the adoption of Internet, measured in millions of users, comparable with the adoption of cryptos, measured in number of wallets. …
Those who read my writing knows that I’m a fan of technology, crypto currency in general and especially IOTA.
Now I could go on describing the innovative ideas that the new WP of IOTA contains, enumerating the various components that ensure the distribution of consensus even in the absence of economic incentive.
I could, but I don’t, because the document would deserve an in-depth examination for practically every page, but I don’t think this would help to understand once and for all what the value of the IOTA is and why it is fundamental for technological development in the coming years. …
Six months after the initial launch of ProductID, we have obtained many confirmations of the importance and usefulness of such a tool in many industrial contexts.
We have therefore decided to invest and expand the functions of the system.
The main feature of ProductID is to provide an identification property of a generic object.
To grant a strong security level, the ID property provided by the system is dynamically generated each time the ID verification is needed, and it’s valid only for that specific verification request.
This procedure is very similar to an OTP (one time passcode or password), used as second authentication factor to log in to critical web pages. …
Note: this is a translation of a post that was published on LinkedIn in italian a few months ago. A prototype has been realized since then, we will soon release additional information about this solution.
Opening a lock is a very common action, and nowadays we perform it many times everyday without realizing how complex it is on many layers.
In time, locks and keys have become more and more sophisticated, especially in the digital era with electronic locks and digital keys.
We are so used to using keys that we sometimes forget that they have two different functions:
Distributed Data Logger (DDL) was created with the purpose of extending and boosting the well-known Masked Authenticated Messaging (MAM) second IOTA layer, allowing a MAM channel reader to access additional features.
More specifically a MAM channel has these properties:
- it can be read only starting from a known root id (the unique message identification number) up to the last message in the channel;
- it can be read only sequentially, because the fetch function, given a root id, returns one message, a requested number of messages, or all messages in the channel starting from that root;
- there is no way to know in advance how many messages are stored in a MAM channel from a given root id, without reading all the channel up to the last messages. …
DLTs (Distributed Ledger Technologies) are the latest evolution of the public register to designate the ownership of properties and assets since the Middle Ages.
While most of public registers record only the variation of the asset’s ownership, DLTs incorporate additional features:
- they can record the change of ownership of an asset;
- they can record the value of the asset;
- they manage the fund movement from the buyer to the seller.
These features are clearly visible in the Ethereum platform, where an ERC#721 token can change ownership recording the applied price and moving the funds.
Hence, I wondered: is it possible to create a marketplace of valuable physical products that provides the same features that Ethereum provides to a digital product? …
First of all, I would like to point out that the word “blockchain” refers to the data structure that can store the information that in a monetary exchange system are called “ transactions”. This is why the blockchain has become synonymous with ledger.
Second, it must be explained that the reason a blockchain is a preferred choice over a database is because linking transactions in blocks and linking blocks between them creates a computational difficulty to an attempt to modify the data.
In a traditional database, the impediment to modify a data is dependent on the performance of the host machine’s operating system which is, of course, prone to attacks in many ways. …
I have been asked to explain why we use IOTA for this solution. The answer is simple: IOTA is currently the only distributed ledger that lets us create professional applications with direct control over cost, performance and reliability. The resulting efficiency does not depend on the network usage level, nor is it affected by variable costs deriving from the transactions fees, and at the same time the data is replicated, made immutable in the process, on all the other nodes of the network. A perfect combination of control over a private node and resilience of a public network.
The evaluation of the origin of a product, i.e. the identity of its manufacturer, is an important matter for many industrial and commercial sectors. …
The counterfeiting of goods and qualitative data in the supply chain is the subject of my previous article (https://medium.com/@sdellavalle/identity-of-things-based-on-iota-tangle-62c9dd0d81ab)
The use of hw cryptography and IOTA Tangle are perfect to protect and certify quality and value products.
However, I think that there is another widespread object that can benefit from IOTA technology: banknotes.
It seems a bit absurd to use a crypto currency to protect paper currency, but it is simpler than you might think.
It is well known that the banknotes are produced using special techniques that make the production of “good fake notes”, very expensive.
The cost of producing false copies combined with the difficulty of selling large volumes, discourages counterfeiters. …