Scaling the Office Romance

Written by unicornlaunching | Published 2018/12/08
Tech Story Tags: bitcoin | ethereum | web3 | aws | networking

TLDRvia the TL;DR App

“A mass in movement resists change of direction. So does the world oppose a new idea.” — Nikola Tesla, The Future of the Wireless Art (1908)

In 1982, there were just 400 Ivy-League and Military-grade computers on the DARPA-funded network. Today, there are 7.6 billion computers on the internet.

Later that year, TCP/IP Co-Inventor Vint Cerf pushed the button again. This time around, he shut down the entire network for two days straight.

There would be no misunderstandings: TCP/IP was the future.

Shutting Down The Internet — On Purpose

Vint Cerf and Bob Khan co-invented TCP/IP. They shut down ARPANET twice in 1982 because DARPA — the funders of the network (DARPA stands for Defense Advanced Research Projects Agency) — wasn’t satisfied with a measly 400 computers helping Researchers solve complex problems over email. Far from it.

Instead, DARPA envisioned a future with hundreds of millions of computers, all connected and communicating simultaneously with each other across land, sea, air and space.

Cerf & Khan’s invention — TCP/IP — would usher in the age of the internet as we know it today.

By temporarily shutting down the network twice in 1982, Vint Cerf, Bob Khan, and DARPA sent a clear message to everyone on the 400-computer network: TCP/IP is the way you MUST communicate over the internet. In other words, if you don’t use TCP/IP to communicate over the internet, you’re not going to be allowed on the internet. On January 1st, 1983, TCP/IP became the only way to send information across the internet. In fact, TCP/IP eventually became to be known simply as the Internet Protocol Suite.

Today, 40 years later, Cerf & Khan’s invention of the TCP/IP Protocol Suite is the CORE technology that enables the transferring and receiving of information over the internet. It underlies every Like, every RT, every Swipe, every Bitcoin Transaction, and every email you send to your office romance.

“We have identified a number of technical issues with the current (TCP/IP-based) technology which prevent it delivering the required levels of service without excessive complexity or, in some cases, at all.” — Does 5G finally mean curtains for TCP/IP?

The Black Swan Event

As critical as the invention of TCP/IP was, TCP/IP is NOT going to be the way the world communicates information over the internet for much longer. Nothing lasts forever. Someone’s about to push the button on TCP/IP and usher in a new internet.

Today’s network protocols…were designed during a simpler time. — Kevin Smith, Chairman, ETSI ISG NGP

“It is intended to give practical demonstrations of these principles with the plant illustrated. As soon as completed, it will be possible for a business man in New York to dictate instructions, and have them instantly appear in type at his office in London or elsewhere. He will be able to call up, from his desk, and talk to any telephone subscriber on the globe, without any change whatever in the existing equipment. An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant.” — Nikola Tesla, The Future of the Wireless Art (1908)

The Monkey Wrench in the Office Romance

When it comes to your Office Romance, you wouldn’t want ‘you know who’ to find out aboutyou know who. This challenge has been around for awhile, and in Computer-Science speak, the problem of preventing ‘you know who’ from finding out about ‘you know who’ goes by the name of CAP Theorem.

CAP Theorem is very important in the Big Data world, especially when we need to make trade off’s between the three (Consistency, Availability and Partition Tolerance), based on our unique use case. — Syed Sadat Nazrul

Web3, Microsoft and Mastercard, Hedera, Ethereum, Bitcoin — these are all technologies and partnerships that are fundamentally trying to make transactions 100% secure and private, 100% fast (aka real-time), and 100% scalable. Gaming, Advertising, Mining, Energy — when it comes to the IT — they’re all made up of just different types of transactions that are fundamentally made up of one’s and zero’s, light on, light off. In technical terms, they’re trying to solve the challenge set forth by CAP Theorem.

In the past, when we wanted to store more data or increase our processing power, the common option was to scale vertically (get more powerful machines) or further optimize the existing code base. However, with the advances in parallel processing and distributed systems, it is more common to expand horizontally, or have more machines to do the same task in parallel. We can already see a bunch of data manipulation tools in the Apache project like Spark, Hadoop, Kafka, Zookeeper and Storm. However, in order to effectively pick the tool of choice, a basic idea of CAP Theorem is necessary. CAP Theorem is a concept that a distributed database system can only have 2 of the 3: Consistency, Availability and Partition Tolerance. — CAP Theorem and Distributed Database Management Systems, Syed Sadat Nazrul

Security AND Privacy and Anonymity on the Blockchain

So far, it’s been impossible to make transactions — and office romances — 100% safe, 100% fast, and 100% secure and private. The ultimate office romance of all — Bitcoin transactions — aren’t 100% private and anonymous to malicious attackers…yet.

Bitcoin and other cryptocurrencies have surged in popularity over the last decade. Although Bitcoin does not claim to provide anonymity for its users, it enjoys a public perception of being a privacy preserving financial system. In reality, cryptocurrencies publish users’ entire transaction histories in plaintext, albeit under a pseudonym; this is required for transaction validation. Therefore, if a user’s pseudonym can be linked to their human identity, the privacy fallout can be significant. Recently, researchers have demonstrated deanonymization attacks that exploit weaknesses in the Bitcoin network’s peer-to-peer (P2P) networking protocols. In particular, the P2P network currently forwards content in a structured way that allows observers to deanonymize users. — Fanti et. al Redesigning the Bitcoin Network for Anonymity

Scalability on the Blockchain

So far, it’s been impossible to make blockchain transactions scalable. Most notably, Bitcoin transactions consumed the energy equivalent of 169 countries last year.

Published late 2017

Proof-of-Work is the mechanism that makes the blockchain secure, but it costs a lot of energy to keep this mechanism going (today). Recent efforts to scale Ethereum have included proposals to move from Proof-of-Work Consensus for Transaction Security to Proof-of-Stake aka the Casper Protocol for Transaction Security. Explanations by Founder Vitalik Buterin can be found here. Criticisms can be found here.

Speed on the Blockchain

Since no one (centralized or decentralized) company or company of companies has emerged that can solve all of these problems; Amazon would seem like the only option.

Hashgraph’s Inventor Dr. Leemon Baird achieved his Carnegie Mellon PhD in record time.

So are Secure, Private, Anonymous, Fast and Scalable Fully Decentralized Blockchain Transactions a pipe dream? As every passing day goes by, Hashgraph’s Hedera Platform, which proposed an alternative to Decentralization by nominating a council of trusted gods so to speak, seems to make more and more sense. Decentralization Maximalists aren’t happy.

Fortunately, there is this world called the Eastern Hemisphere that has people who work on computers, too.

Road-Tested Emerging Blockchain Solutions

One degree north of the equator lies the the Republic of Singapore, the sovereign city-state and island country in Southeast Asia. And people think Toronto’s pretty!

Mindshare to Launch First Phase of Blockchain Pilot on the Zilliqa Platform_Mindshare joins with MediaMath, Integral Ad Science, and Rubicon Project to launch the first phase of blockchain pilot…_www.mindshareworld.com

Can Decentralized Blockchains enable scalable, speedy, and secure into the Billions?

Zilliqa Keynote Address

OK — so if we have scalable, secure, and speedy transactions ensured by Proof-of-Work that only takes five minutes out of every hour — thereby slashing electricity costs — and have achieved a few thousand transactions per second, are our goals met? Have we achieved VISA scale? What about PRIVATE, ANONYMOUS transactions?

Enter the Marlin Protocol, led by Zilliqa’s former Core Developer and wunderkind Siddhartha Dutta, or to his friends, simply Sidd.

Whitepaper

The Marlin Protocol claims that it is the first P2P network protocol combining anonymity and scalable one-to-many communication.

Sidd’s thesis is that network-layer scaling can provide multiplicative benefits over and above any scaling benefit obtained through better consensus algorithms.

A decade has passed since Satoshi Nakamoto’s original Bitcoin paper first surfaced. In this span of time, researchers and developers around the world have extended Satoshi’s ideas dramatically to propose distributed ledgers in different colors and shapes. In the last several years, we have seen a Cambrian explosion of blockchains that seek to solve fundamental technological limitations that Bitcoin posed, and extend the technology’s purview to domains far beyond digital currency.

While many of these newer systems are unrecognizably dissimilar to Bitcoin, and to each other — the same computer science principles of peer-to-peer networking lie at the heart of all of them. From another perspective, while there have been remarkable advances in cryptographic primitives, consensus protocols, and incentive mechanism, little has changed at the network layer. — Marlin Protocol, Mission

Contributors to the project include PhDs from Stanford and MIT while rumours have it that the former CEO of Bittorrent has recently joined their advisory board — makes a lot of sense for a decentralized relay network!

I’ve recently found that by exposing ideas to the crucible of fire that is open source review, amazing ideas are produced a la the Decentralized Socratic Method.

Functional Programming Faces the Crucible of Fire of Open-Source Review on Reddit

Given that Marlin’s Networking Solution emerged from well-studied networking literature, I’m sure they won’t mind the heat of scrutiny. The White Paper can be found here. High-level here.

Could Zilliqa and Marlin provide the technology that helps all other Blockchains become what they initially intended — the new standard for all Office Romances?

Until then, TCP/IP it is.

Towards truth.

“As soon as completed, it will be possible for a business man in New York to dictate instructions, and have them instantly appear in type at his office in London or elsewhere. He will be able to call up, from his desk, and talk to any telephone subscriber on the globe, without any change whatever in the existing equipment. An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant. In the same manner any picture, character, drawing, or print can be transferred from one to another place. Millions of such instruments can be operated from but one plant of this kind. More important than this, however, will be the transmission of power, without wires, which will be shown on a scale large enough to carry conviction. These few indications will be sufficient to show that the wireless art offers greater possibilities than any invention or discovery heretofore made, and if the conditions are favourable, we can expect with certitude that in the next few years wonders will be wrought by its application.” — Nikola Tesla, 1908

Case Studies & Interviews

UnicornLaunching Launches Unicorns Worth Launching based out of Toronto.

Our Dolphin-Based AI once discovered that a Company Executive was treating his Team like a personal harem.

SUDDENLY, A NEW CONTENDER HAS EMERGED.

As CTO & CEO both note, CAP Theorem dominates the DLT Boardroom.


Published by HackerNoon on 2018/12/08