ICO Initial coin offering. InformationTechnology BlockChain Cryptocurrency Token BitCoin broadcast TechGuide HTTPS SEO IT CPU Q&A IOT internet of things Review
C:\Users\admin\Downloads\BTE210
http://steemit.com/@ThePsychCo
http://steemit.com/@WizMoreBiz
3.8.2018_6.15PM-BTE210KY_Backtests1.-5. ICO Initial Coin Offering. Informationtechnology Blockchain Cryptocurrency Token Bitcoin Broadcast Techguide HTTPS SEO IT CPU Q&A IOT Internet Of Things Review
Tags:
2.28.2018_6.15pm-bte210ky_backtests1.-5. ico initial coin offering. informationtechnology blockchain cryptocurrency token bitcoin broadcast techguide https seo it cpu q&a iot internet of things review
Today we’ll talk about the group project. We’ll talk about preparation for the exam and we’ll do review. Bring pencils and ID. We’ll talk about the format and I’ll do Q&A. Also, I’ll talk about SEO and I’ll also do additional quizzes online, so remind me to help you find those too. I’m going to go to creator studio and I’m going to the broadcast. In creative studio, I’m going to go to live streaming and I want to go to events. And in my events, this is the hangouts and I’m going to start the hangout. I’m going to go to blackboard. You can also find my videos on steemit.com/@thepsychco. I’m going to go to Blackboard and go to Course Documents. We’ll have a couple of PowerPoints. This is chapter 1. I’m going to go to Course Documents again. This TG stands for TechGuide Hardware, TechGuide Software, Security, and Data. What I’m going to do on the second half of this semester is I’m going to focus in on additional topics. We’ll continue on blockchain, we’ll do cloud computing, AI, machine learning, IOT (internet of things), basically talk about what is happening. What I want to do is I want to focus on group projects. What I want for our group projects is for you to define a business problem, a solution to solve it, look at the competition, how it’s being addressed today and how your solution is better. And then what I want you to do is present that to the class and we may even have some guest speakers come in to do it. I want this to be something you’re passionate about. Who’s done any cryptocurrency? Or even think about blockchain? You could do your project on trying to understand more about blockchain. Even with a business problem and how to solve it, you’re going to go into depth on how to solve it. I see this begin alike a demo lab. We can demonstrate some type of technology and we’re objective that we don’t have a fiduciary interest in it. It could be like Shark Tank or it could be an area you want to get more involved in. If you are in finance, you could say that you started with automated trading systems and you may want to look at different strategies.
I want to be in everyone’s group and I want to encourage everyone to do the best they can. You may even have two ideas in your group and you may even want to divide up. Every week, we’ll be working on our projects. We’ll be continuing on subjects like artificial intelligence. I want to work with you to get your projects up and running. So, at the end of this semester, it won’t be all at the end, we’ll do step by step. There’s something called agile development. What is TI? Information technology. Remember we talked about software and developing software. In the past, how did they develop software? They had end users decide what the problem was and they went out to programing staff and said go ahead and program. What they did was 6 months later, they would come back to the end user and say here is the program. What do you think the problem with that? Lacks constant communication. 6 months is too long in this business. What they came up with is this idea of agile development. We’re going to be doing agile development. We’ll be doing step by step week by week. For next week, I’d like you to give me a preliminary, short one page from your group on what you propose to do, what you’re interested in. you don’t have to stick with that but just say what you want to do. Maybe I want to get into strategies, maybe I want to go with blockchain and evaluate what’s there in depth and maybe I’ll propose a new what they call, ICO, Initial coin offering. Rather than turn in a paper you don’t care about, you can take it with you. It can be about your own interest using technology. If you want to do blockchain in healthcare, you can look through the patient Tory, the health Met that you saw. Healthcare is fertile and it’s so inefficient and so vulnerable in terms of security and there’s so many intermediaries. If you can start cutting down those intermediaries. Before next class, I want your proposal uploaded to the AUDIT area. Make yourself a project folder and we’ll print it out. Pick a topic and decide what you want to do with that topic. We’ll end early today if you want to discuss it with me. I want a hard copy and at the end of the exam, I can give you feedback on where this is going.
The exam is going to capture chapters 1, 4, 5, TG1 and TG2. I’m going to leave out the cloud for this exam. Does anyone know how to get to your quizzes again after you take them?
Go to the end of web links and you can go to the third, it says why is blockchain the most disruptive tech in decades. The exam will cover two parts, the first part will be multiple choice, the second will be open-ended. It will be one or two questions I’ll ask you. One of the major questions I’ll ask you is on blockchain. These are excellent questions for the blockchain. What is blockchain, what does blockchain do? public vs. private blockchain. For instance, public versus private blockchain, what is the difference? Who’s ever looked at bitcoin before? Can everybody invest in bitcoin? Its open, it’s public. Everyone can. Private is you restrict who can be on your blockchain. Many times, you can do bank to bank. What’s the advantage to blockchain is it’s anonymous in the way you don’t necessarily know who’s on the blockchain. The ledger is distributed but you don’t know who owns it. Criminals liked it because it wasn’t easy to find out whose record that was. It is secure blockchain because on each end of that blockchain, it is encrypted. The security is there but you can’t get a list and see who exactly did that blockchain. Many companies by law require that you KYOC, know your customer. When you open up a bank account, the bank is required to know who the customer is. You have to know where the money is coming from. If they don’t know and it’s suspicious, they have to file SARS. If you have which industries use blockchain? The question could be pick an industry and describe it. For instance, you have Fintech, mobile, and energy. This is a good article and I’ll ask you some form of these types of questions. For NinjaTrader, I may ask what’s the difference between strategy and indicator? What is open source? It’ll be a bit on our experience on automated trading systems and ninja trader. But I would concentrate on this Blockchain. If you want to get more information, you can read about it.
My goal here on the exam is that we understand all the basics and my goal is not to trick you. I think most of you will see that it won’t be a surprise. You have here TechGuide hardware. You need to know the trends in hardware and software. Basically, what happens to hardware is what? The costs go down, the capabilities go up. You need to know about the CPU? What is a CPU? Central processing unit. The difference between primary storage and secondary storage. Input technologies, output technologies, communication technologies. Communication technologies are some of the ones we did on the beginning of the class. The collaboration, being about to collaborate. Most companies don’t even have headquarters, they work at home or collaborate spaces like WeWork. Large companies now say you’re on the road so much, just get a place at WeWork. You can communicate with customers, clients and your team. You can think of input output technologies, multimedia, what are the devise we’re putting for input and output, what resources do we put out there for people to read. Think about Gesture based input, human data entry, source data input devices. Examples are keyboards and such. Output of coarse are monitors, printers, voice output. So, the Central Processing Unit (CPU) is device up into the microprocessor, control unit, arithmetic logic unit (ALU). What’s an example of logics? Ors, ands, if this number is greater than another. There’s something called Moore’s Law. What is Moore’s Law? It basically means we’re going to get faster and in every two years, it’ll get faster. This is great when you talk about genome, big data. what is the biggest disadvantage of blockchain? 7 transactions a second. Could Master Card and Visa do 7 transactions a second? No, they’re doing hundreds of thousands a second. People are taking microprocessor chips and creating basic algorithms for blockchain. Why is it so slow? In a regular model, it’s being record not along the chain. So basically, in this distributed ledger, it keeps on going down the chain so it’ll be very slow. You see here you have the arithmetic logic unit, you have the idea of registers, you have input, you have the output, communication devices and you have the idea of primary storage and secondary storage.
We know computer memory. What’s an example of primary storage? What’s the difference between primary and secondary storage? Another equivalent for primary storage is RAM. RAM stands for Random Access Memory. Is it volatile or non-volatile? Volatile. If it shuts down is it permanent? No. in reference to that, secondary storage, is it volatile or non-volatile? Non- volatile. It means that it exists. An example of secondary storage is SSD. What does that stand for? Solid State Drive. Solid state means the parts aren’t moving versus a hard disk, they used to have hard disks that are moving. In terms of solid state versus RAM, RAM is faster than that solid state. The other thing that you need to know about is servers versus clients. You can think about servers as computers that host software or host websites. You can think about yourself as the client. If I think about it, the clients are my laptop, tablets. If you’re uploading a video on YouTube, the server is YouTube. If you’re using a word processors, you’re the client using the word processor. We talked about computer memory, personal storage. Here is the computer hierarchy. What’s a bit? The smallest unit a computer can understand. It’s either on or off. How many bits make up a byte? 8. If I looked at Madeline, her name, how many bytes do you have to your name? Every letter is going to be a byte. M then is a byte. A kilobyte is next, megabyte, gigabyte, terabyte, etc. there’s registered memory, cache memory, Random access memory, read only memory. Is read only memory volatile or non-volatile. It’s non-volatile. It’s permanent. Put this in your notes. When you turn on your computer, there’s a little bit of instructions that are pre-programmed in the read-only memory. An end user doesn’t have access to that read only memory. It remains with those instructions. With Random Memory access, if I have a word processor and it’s on my harddrive, when I use that word processor, it’ll bring it into RAM and I can then start typing. So, I’m finished with TG1.
If I go to TG2, the idea is with software. With software, we’ve talked about application software. One of the application software we use in this class is NinjaTrader, excel. We talk about issues we have with software. If you look at this software here, you’ll need to know the difference between system software and application software. What’s is the difference and who cares? System software is the intermediary of application software. Give me an example of system software? An example is operating system (OS). An example is android, google chrome, iOS. An application software is those for the end user. The system software integrates all the hardware so the software can use it. A lot of times, the same software has different versions to work on different operations systems. We always have bugs with software. What’s the purpose of software licensing? If it’s not open source, I want to license it and prevent piracy. Open source we’ve talked about is free. There’s something called infrastructure. If I think about infrastructure here, it will deal with IT infrastructure. You can think about it as an organization has an IT department and the infrastructure consists of its hardware components, personnel dealing with IT, and computer services.
Now let’ go to information security, this is chapter 4. Basically, you need to know what a threat is. A threat is a danger where the system is exposed. You need to know what an exposure is and what’s a vulnerability. The best way to not be vulnerable is turn off your machines and phones. We’re vulnerable because we’re on the internet, because other people can infiltrate, we have these cameras. What kind of camera is here? It’s an IP network camera, IP stands for internet protocol. When I talk about an internet protocol, protocol is a set of rules. It has an SSL, secure socket layer. A version of this, you see all the time. Remember when you went to blackboard, here’s my URL right here on my address board. HTTPS: The H stands for hyper, the T stands for text. If I’m a client, I’m transferring a lot of the time through a server. Along the way while I’m transferring, something could be on that line to grab that information. Think about that credit card. Let’s say I buy something on amazon, that goes along the hypertext transfer protocol. If it’s not secure, another party can grab onto it and grab onto my credit card information. So along with this, the S stands for secure and it’s a version of SSL, Secure Socket Layer. The key here is secure, secure means it’s encrypted, encrypted means if I have your text, I won’t be easily able to read it. Is it completely secure? No. there’s software out there that will break down the encryption. So, I know that I’m going to be vulnerable. There’s what we call unintentional threat, I didn’t mean to do that but it caused a threat. I could put a wrong information.
Social engineering is when I deliberately try to get information from you on a social setting. You’re unintentionally giving out information to me that you weren’t supposed to do. An example is let’s say you work in a medical facility, I call you up and say I’m from IT support and we’re doing a shut down now but we need to get into your computer and we’ll have this woman come by and let her use your computer for a minute. Threats can come from the outside like these hackers but I could have my employees unintentionally or intentionally hack. There’s software attacks, alien software, SCADA attacks, bots, like software robots. Phishing attack is going to be someone deliberately sending you email that looks legitimate. The end user has to do an action, it’s usually clicking on a link that looks legitimate but can cause a lot of problems. Spear phishing is I’m looking exactly for someone. DOS attacks are denial of service attacks. You go to amazon or Miami.edu, you as one person type that in. Denial of service is to deny a server and give it so many requests that a server can’t handle anymore requests. A distributed denial of server is they have a number of bots throughout the world denying a server. There’s a tax by a programming development system that will do it. Spyware will exist to grab your information.
You need to know what risk, risk analysis and risk mitigation are. There’s no way to eliminate risk so I’m trying to mitigate, which means to reduce. Think about your house, can your house be broken into, yes. You want to mitigate that risk. You want to lock a door, you may want to get an alarm, get a dog, put security cameras. How much is the asset worth? It may be worth 500,000 and you spend 10 million to protect it. The idea in organization is they want to protect their information resources and they look at how valuable are they and how can I assure them. They do a risk analysis to be able to develop a DRP, a Disaster Recovery Plan. It’s a plan in case there is a disaster, if I have a denial of service, a hurricane, or fire. Sometimes they also call it a Business Continuity Plan, how can I then continue my business? So, what I need to do for my Disaster Recovery Plan, I can set up what I call Alternate Sites. I can have a cold site, a warm site and a hot site. An alternate hot site means my entire data center is duplicated in another location. If we have a hurricane and my whole building is destroyed, I can say that at 12:05, let’s start up at the host site and we can keep on running with no time delay. A cold site is that I just have a bare bones building. I can’t turn over overnight, I have to start with all my equipment. Warm site is in between. Some of this gets mitigated if I have cloud service as a back-up. If I want to reduce my risk, I set up controls. Physical controls are set up some locks, walls, set up badges, guards, alarms. Those are physical controls. What’s the problem on the internet with this? We can lock our doors but we’re on the internet. I don’t need physical controls, I need access controls. You have Authentication, which is something the user is, has, does and knows. In communication controls, we talked about encryption, secure socket layer, I talked about hot sites, cold sites, that’s going to be important. Then I’m finished with this chapter.
Now I need chapter 5. In chapter 5, I deal with data and knowledge. You need to know data, databases, big data, the difference between data warehouses and data marts, knowledge management and relational based data management. Data governance is key. In data governance, we’re talking about an approach to managing information across the organization. Data governance basically in any organization, allows us to know what data we want to store in our organization, how secure that data has to be, who has access to that data, who am I going to allow to see that data, to edit that data, delete that data. That is going to be important. Which data do we want to collect? It’s also whose role, is it? Let’s say we go hacked, whose responsibility is that? The difficulty in data is what they call data rot, you can think of it as my data is stored on some external media device and rotting maybe there was a flood and it got degraded. A lot of that media gets degraded in a number of ways. We have to think about what’s the quality of that data. I also have to deal with government regulation. Depending on what industry I am, I have to think about what government regulation I have. In the EU, they have data regulations than they have in the United Sates.
In the US, what government regulations do I have? HIPPA: Health Information portability act. If you are a healthcare provider, you have to secure your data, you have to do due diligence. There’s another one called PCI, which means Payment Card Industry. Who is an example? Visa, MasterCard, American Express. When you have your card stolen, who is responsible? The bank. So, if I’m a vendor, you have to go through a number of controls and show a government body that it’s secure and they aren’t leaving it on some harddrive somewhere. If you’re not, they take away their license. There’s a data hierarchy and a data relational model. Database management systems minimize three problems of data. Remember when we talked about your data file? If I have a number of files, there’s data redundancy. If you change your address, it’s too many times. Data isolation means if you’re an athlete, it resides in a place no one can access. Data inconsistency is it has your address sand it changes in one place but not the other. Your GPA in the registrar says its 3.0, but business school says 2.0. This is the data hierarchy, bit, byte, field, data file or Table, database. If I want to do a data hierarchy and I want to do a student file where I have test 1, test 2, project grade and final grade. All my columns are called fields, my rows are called records. Data File is also called a table and to manage it together it’s a database. You need to know the difference between primary key and secondary key. If I have a database and I make a student database, what should be my primary key? First name, last name, or C Number? It’s C Number, it’s unique. It’s going to be unique, there isn’t going to be a duplicate. There could be a duplicate of a name. Secondary keys do not need to be unique. What did I say the column names were? Here the student ID seems to be the most unique here. Then we talk about big data. you need to know the characteristics of big data and how do you manage the big data. This is one description of big data. The key here is it’s diverse, it has high volume and high velocity. A key is the purpose to process that big data is usually for predications. It is to get some insight, to get discovery. Structured data is data I can well define, so first name, last name, C number, your grade on Test 1, test 2. Unstructured data is it is not well defined. Think about video and I want to find the content of the video, who is in the video, I want to find the meaning of the videos. That is unstructured. Semi structured is a combination of structured and unstructured.
Traditionally, big data has been used in large enterprises but that is changing because we all have access to a lot of big data. Just having a lot of data isn’t the key here. We have access to social data, a lot of times, you can see what’s trending, what is the sentiment, images, face recognition. The characteristics are volume, velocity and variety. So, know this. In Big data, prediction is the key. Issues of coarse is going to be untrusted data sources, I don’t know where it’s coming from, Big data is dirty means it’s not complete, I have to clean it up. It could mean data birth may be wrong, zip code is missing, states don’t match the zip code. An excellent example is stock. Do I have velocity? Yes, it’ll be diverse, it has volume, do I make predictions? Yes. Traditional relational databases use a language called SQL, structured query language. That’s when it’s structured. Many times, on big data, data isn’t structured, that is called NOSQL. That means not only structured languages, but other unstructured languages to get to my database. I have something called transactional data, transactional data means let’s say we go to Publix, I get my food, and what do I do? A person scans it, that is a transaction. I bought four items, right? That’s put into a database. Inventory is transactional data. have you seen those people stacking shelfs? They realize 2% milk is out and they have to get more. What I want to do with data many times is I want to find patterns in my data, I want to discover things I was not aware of. Once you buy something, Amazon recommends what to buy next. Put in your notes that data warehouses and data marts do not use realtime data. The use historical data. And then they try to find patterns that you are not aware of. I may find in the data warehouse for instance that I do what they call a data mart. A data mart is going to be local and it is a subset of my data warehouse. What I may do in marketing is I may have a marketing campaign and I want to see how we can sell one product and we want to see what segment of the population we should target. Here’s the differences of a data warehouse, is a repository of a historical data, data mart is a low-cost scaled down version. Characteristics of a data warehouse is it’s non-volatile, and its historical.
Here’s a figure of a relational databases. What’s the whole big deal of a relational database? It’s that they’re tables. This is multi-dimensional databases. It’s how it relates from one table to another. You should know the difference between data versus information versus knowledge. We talked about query language. We talked about a data dictionary, which is going to define the required format to enter the data to a database. So, a data dictionary is going to be the required format of entering data to a database. For instance, have you ever seen something addressed to you and it chops off your last name? That’s because the data dictionary doesn’t allow enough characters. There’s relationships between data and you can think about data entities as either one to one, one to many or many to many.
Let me show you more quiz questions if you want to study more. Remember we talked about SEO, search engine optimization. Basically, when you’re on the internet and you want someone to find you on the search engine, you want to be on the first page. Do we want to do organic search or paid search? Better to be organic than to pay for it. If you want to learn more, you can do that for your project. I am trying to develop algorithms. I can take my own videos and see if I can get higher up by using certain key words. Why not give an incentive to my students and add additional quiz questions to my videos and you can see if it works. I’m always welcome to suggestions. Let’s all go to YouTube. I’m trying to look at searches that will be short that I can test out. Remember that I talked about back testing as a part of automated trading systems? I use the word back test because I want to help you study for the exams. I’m going to put in back test and I’m going to do it based on the chapter, so I’m going to put backtest1. What did you get? My classes. You see this (now) air open, I’m trying to figure out ways to be on the internet, to gain first positions and make it easier to end users. I’m going to try to do an experiment with vanity numbers. Since I have Now air open, it’ll have the matching phone number you see on your key pad. If you click on it, you see one question. It says in general, informed users tend to get more value from whatever technologies they use. Is it true or false? If you click show more, it says the answer is true. Another question says: a combination of your high school grades, application essays, letters of recommendation, and SAT scores would be considered information. True or false? Here it says place the following members of data hierarchy in their correct order. Does everybody understand? You can check all of these and they all have questions. Once you go into it, you may get other ones to come up on the other side. This is from chapter 1, this is a review session. Some of them don’t have it, but I would start with the 1 back test to get additional test questions. For the second exam, we’ll even have more. I’m trying to get the search engine optimization.
You can study together, some of you could find the additional questions, cut and paste and share it with your group. I’d like everyone to understand the basics. Should we continue having guest speakers? We’ll have guest speakers on blockchain, an attorney wanted to come in as well. He focuses on blockchain, how to set up an ICO, what are the pitfalls and so forth. He’s a UM alum, IBM was another one, they’re doing something called hyper ledger.
???????????????????????????????????????????????????
https://www.eventbrite.com/e/blockchain-beyond-the-hype-tickets-43557644086
DESCRIPTION
Curious about the hype surrounding Bitcoin, Cryptocurrency, and Blockchain? Don't know where to start, or how to separate the value from all the noise? Join us on Thursday, March 8th for an open panel discussion with true industry veterans and get yourself caught up on one of the most disruptive technologies in Fin-tech: programmable money.
A controversial technology, Bitcoin was quietly released in 2009 as the world's first peer-to-peer digital currency using an innovative digital record known as the Blockchain. Now the Blockchain is the hottest buzzword in tech and has given rise to extraordinary speculation and controversy.
How will Blockchain, and the cryptocurrencies it powers, continue to evolve? What's real and what's simply hype?
Join four experts from four different corners of the cryptocurrency ecosystem as we discuss those very topics.
Panelists:
Marshall Swatt is the founder and President of Swatt Exchange, a new seed-funded exchange for trading and investing in blockchain based financial instruments. He was the former co-founder and CTO of Coinsetter, which later sold to Kraken. He has a track record in building financial exchanges and is advisor to several ICOs and blockchain startups.
Andrew Hinkes is an adjunct Professor at New York University, and a cited authority on Virtual Currency issues. He was previously a partner at Berger Singerman LLP, where he focused his practice on commercial litigation and technology matters. He has authored more than 20 articles on blockchain and associated technologies.
Douglas Carrillo is the co-founder of Bitstop, a leading Bitcoin ATM provider based out of South Florida. He is also the co-organizer of the Miami Bitcoin Hackathon which has been held annually for the past 4 years.
Ariel Deschapell is a fullstack developer and author. He has contributed to the top cryptocurrency media site Coindesk since 2014, and has since been featured in many other publications including Bitcoin Magazine.
Co-sponsors: Blockchain Education Network, Bitstop.co, Bitcoin.Miami
See you there :)
TAGS
https://www.eventbrite.com/e/blockchain-beyond-the-hype-tickets-43557644086
???????????????????????????????????????????????????