SlideShare ist ein Scribd-Unternehmen logo
1 von 81
Downloaden Sie, um offline zu lesen
Token Engineering
Fundamentals
An Introduction to Information Systems Engineering
Token Engineering Meetup
May 13, 2018
Goals
• Understand Engineering Math ‘Tools’
• Understanding of the design process
• Methodologies used in development
• Tools to evaluate results
Michael Zargham
• Actively Researching Blockchain enabled
Coordination and Decision Systems
• Contributor & Advisor, Sweetbridge
• Former Director of Data Science and Architect of
Data & Decision Systems at Cross MediaWorks
• PhD in Systems Engineering, UPENN
• Research Ares: Decentralized Optimization,
Decision Science, Operations Management
• Academic expertise in optimal and stochastic
Control Theory, Game Theory & Applied Math
• Quantitative Analyst and Decision Systems
Engineer since 2005.
• Research engineer and data scientist at
BlockScience, specializing in systems engineering
crypto-economic environments. He has developed,
simulated, and tested token mechanics for smart
contracts on the blockchain.
• Advisory board on AeroChain and Fr8 Network
• Directed model test programs for US and foreign
navies.
• Master’s degree from MIT in Ocean Systems
Management
Matthew Barlin
Preliminaries
• Definition of a Network
• Definition of a Blockchain Network
• Important Token Distinctions
• Coordination Problem
• Feedback
Definition of a Network
Definition of a Network
Definition of a Network
Definition of a Blockchain Network
Generalizing Crypto-Assets
Fungible Unique
Divisible Cryptocurrencies
Equity or Shares
in specific Assets
Discrete
Tokens representing
physical Commodities
Tokens representing
Titles or Deeds
• Tokens are digital representations of Assets which may or many not be tangible (goods vs rights)
• Ownership in the asset is governed by a decentralized ledger
• Crypto-Assets allow ownership to be transferred via smart contract
States in the “Economic Network”
•Smart Contracts and non-asset states
•automate the execution of workflows defined in legal contracts (discrete states)
•maintain account balances and other dynamic values (continuous states)
•Enforce the set of legal state transitions for all types of states
•Economic Systems Have “configuration spaces” implied by their initial state and the valid state transitions
•Curse of dimensionality
•Bitcoin example – low dimension space restrictions
https://www.cs.cmu.edu/~motionplanning/lecture/Chap3-Config-Space_howie.pdf
http://web.eecs.umich.edu/~ocj/courses/autorob/autorob_14_configuration_spaces.pdf
Economic System Layer is Dynamical
https://ocw.mit.edu/courses/electrical-engineering-and-
computer-science/6-241j-dynamic-systems-and-control-spring-
2011/readings/MIT6_241JS11_chap10.pdf
Economic System Layer is Discrete
https://web.stanford.edu/class/archive/ee/ee392m/ee392m.1
056/Lecture9_ModelSim.pdf
Finite State Machine for
TCP/IP
Economic System Layer is a Hybrid System
http://www-
inst.cs.berkeley.edu/~ee291e/sp09/ha
ndouts/book.pdf
Math example for a water tank switching model
Peers Coordinate to Validate the Current State
Agree On Prior State
Compute locally
by operating on the same priors
One Agent Declares
‘solution’
candidate posterior state
Network Validates
Solution, adopting the
Posterior state
Coordination Platforms and/or Applications
Front End User Interface
Decentralized (Self-sovereign) Identity Decentralized Payment System
Core functionality for dApp
Application Token
Private or
Permissioned
Data Layer
(Thin) Centralized Backend
- Basic business logic
- ML microservices
- Application data
- APIs to other systems
- Other Oracles
Users of all roles
Recurring Example: Sweetbridge
Sweetbridge, Inc
Sweetbridge Vision: Protocol Stack
Core Features
•Stable Token driven to par by
commerce not by trading
•Self-lending
•Continuously Audited financial
system
•Financial base layer building
towards ecosystem level
operations management
algorithms via smart contracts
https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
Liquidity Protocol: 2 Currency System
https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
Human Actions: Taking & Repaying UOUs
https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
Network Systems:
Analogies and Examples
Engineered Multi-agent Network Analogy
https://www.frontiersin.org/articles/10.3389/frobt.2017.00012/full
Engineered Multi-agent Network Research
https://www.media.mit.edu/projects/blockchain-a-new-
framework-for-swarm-robotic-systems/overview/
Now!
Then! (c. 2005)
https://ieeexplore.ieee.org/document/1605401/
Transportation System Analogy
The naval architect’s
design spiral
Designing for and managing
the interface
Example: Transportation System Incentive Research
https://forum.stanford.edu/events/posterslides/CapriCongestionandParkingReliefIncentives.pdf
https://web.stanford.edu/~balaji/
Key Concepts
• Systems Engineering
• Model
• Model Based Systems Engineering
• Requirements
Systems Engineering Principles
Introduction to Systems Engineering
Project Performance (Australia) Pty Ltd
DO:
• Establish an objectively adequate problem definition before committing
significant resources to design and development
• Design a solution by dividing the big problem into a set of individually
sufficiently-well-defined smaller problems, by defining the required
characteristics of each element of the solution.
ELSE:
• Inadequate requirements have consistently been the single biggest
cause of project failures and losses in all sectors. The cost of inaction
typically exceeds the cost of prevention by a factor of 10-100 to one.
• Results in design errors, the need for much increased design verification,
and problems first revealed in system integration (or later).
Systems Engineering Design Process
SYSTEMS ENGINEERING FUNDAMENTALS, Department of
Defense, Systems Management College, January 2001
Requirements Key Points:
The 4-C's of requirements:
Ø Clear: understandable so that all stakeholders can participate in validation
and all developers know what to build and test
Ø Concise: Short requirements are more understandable and maintainable.
And, they can often be more precise when you use formalisms.
Ø Correct: Incorrect requirements will lead to reduced revenue, or major
rework.
Ø Complete: Incomplete requirements also leads to major rework and last-
minute schedule changes.
Requirements Key Points:
Ø The specification should not bias the design or implementation.
Ø Don't get ahead of yourself, you will do design later
Ø Design details make the system requirements for non-technical
stakeholders to understand
Ø Design details are irrelevant to system test.
Ø You may come up with better ideas for the design later, you do should not
have to change the system requirements unless your goals for the product
change.
Types of Requirements
Ø Performance
Ø To what extent is the function executed? What are the quality and quantity of
the function?
Ø Design
Ø How will we build? What are the technical needs?
Ø Derived
Ø Implied from a higher-level requirement
Ø Allocated
Ø Established by dividing a top-level requirement into multiple lower-level ones
Ø Operational
Ø How well the system serves users and under what conditions?
Ø Functional
Ø What are necessary the tasks or actions? Top-level for functional analysis
Requirements Analysis
• Inputs converted to outputs:
– Customer requirements –
– SE outputs from prior development efforts
• Controls:
– Laws and organizational policies and procedures –
– Tech base and other constraints
• Enablers:
– Multi-disciplinary product teams
– Decision and requirements database including system/configuration item
descriptions from prior efforts
– System analysis and control
SYSTEMS ENGINEERING FUNDAMENTALS, Department of
Defense, Systems Management College, January 2001
REQUIREMENTS
ANALYSISInputs converted to outputs
Controls
Enablers
Outputs
Model Based Systems Engineering:
Model
§ A simplified version of a concept, phenomenon, relationship, structure or system
§ A graphical, mathematical or physical representation
§ An abstraction of reality by eliminating unnecessary components
The objectives of a model include:
Ø to facilitate understanding
Ø to aid in decision making, examine 'what if' scenarios
Ø to explain, control, and predict events
Introduction To Model-Based System Engineering (MBSE) and SysML
Laura E. Hart Lockheed Martin, IS&GS
System Model
• Requirements
What are the stakeholder goals, purposes, and success conditions for the system
Specification of black box behavior and characteristics
• Behavior
What the system has to do to meet the requirements
Transformations of inputs to outputs (functional/activity models)
State/Mode-based behavioral differences (state models)
• Structure
The parts that exhibit the behavior
The component hierarchy, elements, and stores
• Properties
The performance, physical characteristics and governing rules that constrain the structure and
behavior
• Interconnections
The way the structural elements arrange and communicate to achieve the required behavior
under the given constraints
Introduction To Model-Based System Engineering (MBSE) and SysML
Laura E. Hart Lockheed Martin, IS&GS
Model Based Systems Engineering in a Nutshell
Traditional Systems Engineering Model Based Systems Engineering
Image credit to NASA/JPL-Caltech
Component Scope Design
BlockScience Solution
BRAINSTORMING = DESCRIPTIVE MODELLING
BLOCKCHAIN LAYER
BLOCKCHAIN
DEVELOPMENT
TOKEN LAYER
EVOLUTIONARY
ECONOMY
ECONOMY
ENGINEERING
ICO LAYER
SALES
INVESTORS
Model Breakdown:
(Token or Economic Engineering)
BlockScience Solution
High Level Formal Specification
SPEC
High Level Analysis
SPEC SPEC SPEC
REQUIREMENTS
INTEGRATION
COMPONENT SIMULATION AND TESTING, REQUIREMENTS MET?
Sell Line
Triggering
Vault State
Legal Vault
State*
Liquidation
Event
Return Vault to Legal State
Vault States
LV/AV
Continuous Vault States
Liability Value as a % of Asset Value
Good Standing Valid Sell Line Triggering Default
Vault States: Original Customer
Requirements
Example from Sweetbridge: Sell Line Vault Controls
Collateralized debt positions have rules which trigger control actions which prevent loans from defaulting
https://images.sweetbridge.org/main/Sweetbridge-WP-LiquidityProtocolMath-v1-01.pdf
Hybrid System Controller designed to massively reduce the
probability of reaching the state of invalid vault despite it being
possible due to outside volatility in asset value
Automated Actions: Sell Line Vault Controls
Formal Proof creates a cushion between Valid and Triggering states with a tunable parameter, Theta
But we check our work numerically and use the simulations to guide parameter decisions
https://images.sweetbridge.org/main/Sweetbridge-WP-LiquidityProtocolMath-v1-01.pdf
Asset
Value
Asset
Value*
Figure 3: Asset and Liabilities at New State
Sweetbridge
Transaction
Fee
Liability
Value
Liability
Value*
-ΔLV
Penalty Fee
-ΔLV(1+PF)(1+TF)
Vault States: Revised Customer
Requirements
0 0.2 0.4 0.6 0.8 1 1.2
LV/AV
Vault States
Vault States with Sell Line
Liability Value as a % of Asset Value
Good Valid Sell Line Triggering Cannot Cover Fees Cannot Cover Liabilities
Modeling:
Token System Design
Defining State Variables in Economies
Defining Value Functions and Invariants
Sweetcoin Design Preserves an Invariant:
The Ratio of Fees incurred to Fees Paid!
We didn’t yet understand the generality of invariants when working on this
Sweetcoin Intrinsic Value– Marketprice Independence
Tokens in use:
Locked for the period
Based on level of service
Tokens owned
Purchase tokens
Sell tokens
Market value of
tokens owned
Discount capacity of
tokens owned
Network state:
Total tokens activated
Total platform use Token utility:
Financial value of using the
tokens based on costs offset
over a period of repeated use
use
From Discount Token Framework Published by Sweetbridge Inc
https://images.sweetbridge.org/main/WP-Sweetbridge-Discount-
Tokens.pdf
Discount Token
reduces platform fees by a percentage
F = total fees Network-wide
f = individual user fee without token
A = total activated tokens network-wide
a = individual user activated tokens
Discount Capacity = phi * a/A*F/f
User’s Discount = phi * a/(a+A)*(f+F)/f
phi = network-wide discount rate
zero fee when: a = f*A/( phi*F +(1-phi)*f)
Utility= Discount Capacity;
NOT dependent on Token Market Price
Discount Token as an On-chain Microservice
History of all
(f,a,f’)
Stored in Ledger
(f,a) f’f’= f*(1-phi * a/(a+A)*(f+F)/f)
f = fees incurred
a= tokens activated
activated tokens
remain locked for
N blocks in the future
f’ = fees due
after accounting
for locking a
F’ = Sum: f’
over N blocks
look back N blocks
F = Sum: f
A = Sum: a
System tends to the intended property
F’ = (1-phi)* F
But we added a low pass filter reduce noise in discount capacity experienced by Sweetcoin users
Going Beyond Invariants: Maximization and Convergence
Is “On Chain Control” Possible?
What about Games?
Actions and Reward are fixed: play best response
Design the game, but once deployed the game is fixed
But in the world of blockchain networks the game itself can change in time!
How does our "Control System” Relate to Games?
• Think of it as engineering how the ‘Game’ itself is evolving
• The players actions move the state within the ‘possible’ configurations
• We make no claims about what any player actual does
• We only make claims about what those ‘possible’ configurations are
• In practice this means careful selection of smart contract methods to be
mathematically consistent with fixed point properties in the manner of
Lyapunov Optimization
• Only After Characterizing the Possible configurations does it really make
sense to design incentive profiles over actions
https://en.wikipedia.org/wiki/Lyapunov_optimization
Model Testing: Component
Level Simulations
Moving through the systems design process:
VERIFICATION
SYSTEMS ENGINEERING FUNDAMENTALS, Department of
Defense, Systems Management College, January 2001
Simulation Principles
§ Build tool using mathematical model
§ Determine assumptions
§ Define ranges
§ Validate Tool
§ Define test
§ Run test to answer right questions,
§ Deterministic vs Stochastic
§ Stochastic processes
§ Monte Carlo Simulation
Sweetcoin Macro-Economic Research
Uses of Sweetcoin in the network over time, time grouped averages over 100 unique Stochastic Experiments
Sweetcoin Macro-Economic Research
Statistics for Global Discount Ratios and Discount Capacity KPIs over 100 unique trials
At system launch few discounts are achieved
but the system evolves toward the designed
discount equilibrium point
The discount capacity of tokens grows roughly
proportionally with the growth in network
utilization as measured by fees incurred
Integration: System Level Simulations
Integration Key Points
• Systems Integration is the process of:
Assembling the constituent parts of a system in a logical, cost-effective way,
comprehensively checking system execution (all nominal & exceptional paths),
and including a full functional check-out.
• Systems Test is the process of:
• Verifying that the system meets its requirements
• Validating that the system performs in accordance with the customer/user
expectations
• Manage system integration and system test based upon subsystems that can be
end-to-end tested against system level requirements; manage system design &
development based upon components that can be independently developed and
checked.
• Success
• All subsystems integrated; all subsystem & system threads exercised
successfully.
• System is robust and is ready for formal requirements verification.
Integration Example
Bridgecoin Economy Research
System without Depositor Policy Implemented by Treasury
System with simple Depositor policy offering
interest bearing loans to lock up BRC
The 3Ms:
Measuring
Monitoring
Maintenance
Measuring, Monitoring and Maintenance
How:
• Collect data in real time from blockchain and other
data sources
Why:
• To be good stewards of shared infrastructure, system
(maintenance) tuning and well informed governance
requires data
• Owe it to your stakeholders to be informed about the
performance of your system
• Ability to gain insight, tune, foresee, and learn about
your blockchain environment
• Consider the operational life cycle of the product
Measuring, Monitoring and Maintenance
Example: CryptoKitties (AxiomZen)
https://drive.google.com/file/d/1soo-
eAaJHzhw_XhFGMJp3VNcQoM43byS/vie
w
• Low Stakes
Build a “toy” system but release it
into the real world to learn a lot. ‘It’s
just a game after all.’
• Low Risk
No major harm if something goes
wrong
• High Reward
Real data about real activity with
respect to an explicit incentive is
available and can be analyzed!
Cryptokitties: NFTs, Functions and States
https://github.com/BlockScience/EthereumStats/blob/master/KittyExplorer.ipynb
GiveBirth() and the Midwife Role
// Send the balance fee to the person who made birth happen.
msg.sender.send(autoBirthFee);
Births By Midwife
The all time top 10 Midwives
May the Best Midwife win…
Though Not as Dominant as it appears…
Midwives Go Professional: Smart Contracts
Instead of “external accounts” — Smart contracts specialized to call give Birth Emerged a few weeks in
Smart Contracts and Serious Multi-tasking
Birthing Smart Contacts: Profit by Caller
Restricted to top Midwife Accounts
Birthing Smart Contacts: Profit by Called
Serious differences in performance despite a flat reward function
There can be only one… you lose a lot
Each kitty can only be born once so there is a trade off between gas fee on the call and chance of winning
Opportunities and Challenges
Identity and Privacy
All blockchain ‘accounts’ have public key addresses
Networks are Psuedo-nonymous
Government Issued
“Legal” Identity
Public Ledgers are a double-edged sword not a Panacea
Layered Architectures and Nuanced thinking around Policy
and Regulation are required build and regulate systems that
store, manage or make decisions using
Personally Identifying Information (PII)
Map
Regulation and Governance
Technology is what can be done
but Society needs to think about
What the technology is used for.
When economic ‘robotic agents’ are part of the economy….
Who decides what their objective functions are allowed to be?
Who is responsible for monitoring the health of the economy?
… for tuning network or agent parameters?
… for decommissioning them?
Do we need professional engineering licenses for economic agents?
How do we make sure they aren’t taking advantage of people?
… or incentivizing or enabling nefarious behavior?
Scifi Dystopian Future?
A synthetic world interwoven with the physical one
in which autonomous software agents interact with
each other, their environment and humans.
Trending up
Trending down
Emergence of a hyper-intelligent AI that has central
command of legions of robotic agents; coordination
issues: Byzantine General’s Problem
Thanks!

Weitere ähnliche Inhalte

Was ist angesagt?

How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?
101 Blockchains
 
List of 10 Most Expensive NFTs Ever Sold
List of 10 Most Expensive NFTs Ever SoldList of 10 Most Expensive NFTs Ever Sold
List of 10 Most Expensive NFTs Ever Sold
101 Blockchains
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
101 Blockchains
 

Was ist angesagt? (20)

Blockchain and Banking
Blockchain and BankingBlockchain and Banking
Blockchain and Banking
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
 
Blockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxBlockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptx
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
How blockchain is changing finance
How blockchain is changing financeHow blockchain is changing finance
How blockchain is changing finance
 
Blockchain
BlockchainBlockchain
Blockchain
 
How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?
 
List of 10 Most Expensive NFTs Ever Sold
List of 10 Most Expensive NFTs Ever SoldList of 10 Most Expensive NFTs Ever Sold
List of 10 Most Expensive NFTs Ever Sold
 
Hyperledger Fabric
Hyperledger FabricHyperledger Fabric
Hyperledger Fabric
 
Blockchain use cases
Blockchain use casesBlockchain use cases
Blockchain use cases
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
Blockchain Network Theory
Blockchain Network TheoryBlockchain Network Theory
Blockchain Network Theory
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
 
Brand New Web3 Wallet
Brand New Web3 WalletBrand New Web3 Wallet
Brand New Web3 Wallet
 
MultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platformMultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platform
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain Explained
Blockchain ExplainedBlockchain Explained
Blockchain Explained
 

Ähnlich wie Token engineering presentation 5 13-18

Brian muirhead v1-27-12
Brian muirhead v1-27-12Brian muirhead v1-27-12
Brian muirhead v1-27-12
NASAPMC
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentation
MAHERMOHAMED27
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
Rahul Hedau
 
Software project management requirements analysis
Software project management requirements analysisSoftware project management requirements analysis
Software project management requirements analysis
Antony Alex
 
O'Neil Technical Resume
O'Neil Technical ResumeO'Neil Technical Resume
O'Neil Technical Resume
monica o'neil
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
FLYMAN TECHNOLOGY LIMITED
 
Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W Engineering
Mikel Raj
 
SE chapters 6-7
SE chapters 6-7SE chapters 6-7
SE chapters 6-7
Hardik Patel
 

Ähnlich wie Token engineering presentation 5 13-18 (20)

Presentation of se
Presentation of sePresentation of se
Presentation of se
 
Brian muirhead v1-27-12
Brian muirhead v1-27-12Brian muirhead v1-27-12
Brian muirhead v1-27-12
 
22-REQUIREMENT.ppt
22-REQUIREMENT.ppt22-REQUIREMENT.ppt
22-REQUIREMENT.ppt
 
An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentation
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development
 
Software Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptxSoftware Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptx
 
Aspect Oriented Programming - AOP/AOSD
Aspect Oriented Programming - AOP/AOSDAspect Oriented Programming - AOP/AOSD
Aspect Oriented Programming - AOP/AOSD
 
Project management through the eye of the systems engineer
Project management through the eye of the systems engineerProject management through the eye of the systems engineer
Project management through the eye of the systems engineer
 
Management Information system
Management Information systemManagement Information system
Management Information system
 
Software project management requirements analysis
Software project management requirements analysisSoftware project management requirements analysis
Software project management requirements analysis
 
O'Neil Technical Resume
O'Neil Technical ResumeO'Neil Technical Resume
O'Neil Technical Resume
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
Unit II- Hardware design & testing methods1 - Electronic Product Design
Unit II- Hardware design & testing methods1 - Electronic Product DesignUnit II- Hardware design & testing methods1 - Electronic Product Design
Unit II- Hardware design & testing methods1 - Electronic Product Design
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdf
 
Software Requirement Engineering.pptx
Software Requirement Engineering.pptxSoftware Requirement Engineering.pptx
Software Requirement Engineering.pptx
 
Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W Engineering
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
SE chapters 6-7
SE chapters 6-7SE chapters 6-7
SE chapters 6-7
 

KĂźrzlich hochgeladen

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

KĂźrzlich hochgeladen (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Token engineering presentation 5 13-18

  • 1. Token Engineering Fundamentals An Introduction to Information Systems Engineering Token Engineering Meetup May 13, 2018
  • 2. Goals • Understand Engineering Math ‘Tools’ • Understanding of the design process • Methodologies used in development • Tools to evaluate results
  • 3. Michael Zargham • Actively Researching Blockchain enabled Coordination and Decision Systems • Contributor & Advisor, Sweetbridge • Former Director of Data Science and Architect of Data & Decision Systems at Cross MediaWorks • PhD in Systems Engineering, UPENN • Research Ares: Decentralized Optimization, Decision Science, Operations Management • Academic expertise in optimal and stochastic Control Theory, Game Theory & Applied Math • Quantitative Analyst and Decision Systems Engineer since 2005. • Research engineer and data scientist at BlockScience, specializing in systems engineering crypto-economic environments. He has developed, simulated, and tested token mechanics for smart contracts on the blockchain. • Advisory board on AeroChain and Fr8 Network • Directed model test programs for US and foreign navies. • Master’s degree from MIT in Ocean Systems Management Matthew Barlin
  • 4. Preliminaries • Definition of a Network • Definition of a Blockchain Network • Important Token Distinctions • Coordination Problem • Feedback
  • 5. Definition of a Network
  • 6. Definition of a Network
  • 7. Definition of a Network
  • 8. Definition of a Blockchain Network
  • 9. Generalizing Crypto-Assets Fungible Unique Divisible Cryptocurrencies Equity or Shares in specific Assets Discrete Tokens representing physical Commodities Tokens representing Titles or Deeds • Tokens are digital representations of Assets which may or many not be tangible (goods vs rights) • Ownership in the asset is governed by a decentralized ledger • Crypto-Assets allow ownership to be transferred via smart contract
  • 10. States in the “Economic Network” •Smart Contracts and non-asset states •automate the execution of workflows defined in legal contracts (discrete states) •maintain account balances and other dynamic values (continuous states) •Enforce the set of legal state transitions for all types of states •Economic Systems Have “configuration spaces” implied by their initial state and the valid state transitions •Curse of dimensionality •Bitcoin example – low dimension space restrictions https://www.cs.cmu.edu/~motionplanning/lecture/Chap3-Config-Space_howie.pdf http://web.eecs.umich.edu/~ocj/courses/autorob/autorob_14_configuration_spaces.pdf
  • 11. Economic System Layer is Dynamical https://ocw.mit.edu/courses/electrical-engineering-and- computer-science/6-241j-dynamic-systems-and-control-spring- 2011/readings/MIT6_241JS11_chap10.pdf
  • 12. Economic System Layer is Discrete https://web.stanford.edu/class/archive/ee/ee392m/ee392m.1 056/Lecture9_ModelSim.pdf Finite State Machine for TCP/IP
  • 13. Economic System Layer is a Hybrid System http://www- inst.cs.berkeley.edu/~ee291e/sp09/ha ndouts/book.pdf Math example for a water tank switching model
  • 14. Peers Coordinate to Validate the Current State Agree On Prior State Compute locally by operating on the same priors One Agent Declares ‘solution’ candidate posterior state Network Validates Solution, adopting the Posterior state
  • 15. Coordination Platforms and/or Applications Front End User Interface Decentralized (Self-sovereign) Identity Decentralized Payment System Core functionality for dApp Application Token Private or Permissioned Data Layer (Thin) Centralized Backend - Basic business logic - ML microservices - Application data - APIs to other systems - Other Oracles Users of all roles
  • 18. Sweetbridge Vision: Protocol Stack Core Features •Stable Token driven to par by commerce not by trading •Self-lending •Continuously Audited financial system •Financial base layer building towards ecosystem level operations management algorithms via smart contracts https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
  • 19. Liquidity Protocol: 2 Currency System https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
  • 20. Human Actions: Taking & Repaying UOUs https://sweetbridge.com/public/docs/Sweetbridge-Whitepaper.pdf
  • 22. Engineered Multi-agent Network Analogy https://www.frontiersin.org/articles/10.3389/frobt.2017.00012/full
  • 23. Engineered Multi-agent Network Research https://www.media.mit.edu/projects/blockchain-a-new- framework-for-swarm-robotic-systems/overview/ Now! Then! (c. 2005) https://ieeexplore.ieee.org/document/1605401/
  • 24. Transportation System Analogy The naval architect’s design spiral Designing for and managing the interface
  • 25. Example: Transportation System Incentive Research https://forum.stanford.edu/events/posterslides/CapriCongestionandParkingReliefIncentives.pdf https://web.stanford.edu/~balaji/
  • 26. Key Concepts • Systems Engineering • Model • Model Based Systems Engineering • Requirements
  • 27. Systems Engineering Principles Introduction to Systems Engineering Project Performance (Australia) Pty Ltd DO: • Establish an objectively adequate problem definition before committing significant resources to design and development • Design a solution by dividing the big problem into a set of individually sufficiently-well-defined smaller problems, by defining the required characteristics of each element of the solution. ELSE: • Inadequate requirements have consistently been the single biggest cause of project failures and losses in all sectors. The cost of inaction typically exceeds the cost of prevention by a factor of 10-100 to one. • Results in design errors, the need for much increased design verification, and problems first revealed in system integration (or later).
  • 28. Systems Engineering Design Process SYSTEMS ENGINEERING FUNDAMENTALS, Department of Defense, Systems Management College, January 2001
  • 29. Requirements Key Points: The 4-C's of requirements: Ø Clear: understandable so that all stakeholders can participate in validation and all developers know what to build and test Ø Concise: Short requirements are more understandable and maintainable. And, they can often be more precise when you use formalisms. Ø Correct: Incorrect requirements will lead to reduced revenue, or major rework. Ø Complete: Incomplete requirements also leads to major rework and last- minute schedule changes.
  • 30. Requirements Key Points: Ø The specification should not bias the design or implementation. Ø Don't get ahead of yourself, you will do design later Ø Design details make the system requirements for non-technical stakeholders to understand Ø Design details are irrelevant to system test. Ø You may come up with better ideas for the design later, you do should not have to change the system requirements unless your goals for the product change.
  • 31. Types of Requirements Ø Performance Ø To what extent is the function executed? What are the quality and quantity of the function? Ø Design Ø How will we build? What are the technical needs? Ø Derived Ø Implied from a higher-level requirement Ø Allocated Ø Established by dividing a top-level requirement into multiple lower-level ones Ø Operational Ø How well the system serves users and under what conditions? Ø Functional Ø What are necessary the tasks or actions? Top-level for functional analysis
  • 32. Requirements Analysis • Inputs converted to outputs: – Customer requirements – – SE outputs from prior development efforts • Controls: – Laws and organizational policies and procedures – – Tech base and other constraints • Enablers: – Multi-disciplinary product teams – Decision and requirements database including system/configuration item descriptions from prior efforts – System analysis and control SYSTEMS ENGINEERING FUNDAMENTALS, Department of Defense, Systems Management College, January 2001 REQUIREMENTS ANALYSISInputs converted to outputs Controls Enablers Outputs
  • 33. Model Based Systems Engineering:
  • 34.
  • 35. Model § A simplified version of a concept, phenomenon, relationship, structure or system § A graphical, mathematical or physical representation § An abstraction of reality by eliminating unnecessary components The objectives of a model include: Ø to facilitate understanding Ø to aid in decision making, examine 'what if' scenarios Ø to explain, control, and predict events Introduction To Model-Based System Engineering (MBSE) and SysML Laura E. Hart Lockheed Martin, IS&GS
  • 36. System Model • Requirements What are the stakeholder goals, purposes, and success conditions for the system Specification of black box behavior and characteristics • Behavior What the system has to do to meet the requirements Transformations of inputs to outputs (functional/activity models) State/Mode-based behavioral differences (state models) • Structure The parts that exhibit the behavior The component hierarchy, elements, and stores • Properties The performance, physical characteristics and governing rules that constrain the structure and behavior • Interconnections The way the structural elements arrange and communicate to achieve the required behavior under the given constraints Introduction To Model-Based System Engineering (MBSE) and SysML Laura E. Hart Lockheed Martin, IS&GS
  • 37. Model Based Systems Engineering in a Nutshell Traditional Systems Engineering Model Based Systems Engineering Image credit to NASA/JPL-Caltech
  • 39. BlockScience Solution BRAINSTORMING = DESCRIPTIVE MODELLING BLOCKCHAIN LAYER BLOCKCHAIN DEVELOPMENT TOKEN LAYER EVOLUTIONARY ECONOMY ECONOMY ENGINEERING ICO LAYER SALES INVESTORS
  • 40. Model Breakdown: (Token or Economic Engineering) BlockScience Solution High Level Formal Specification SPEC High Level Analysis SPEC SPEC SPEC REQUIREMENTS INTEGRATION COMPONENT SIMULATION AND TESTING, REQUIREMENTS MET?
  • 41. Sell Line Triggering Vault State Legal Vault State* Liquidation Event Return Vault to Legal State Vault States LV/AV Continuous Vault States Liability Value as a % of Asset Value Good Standing Valid Sell Line Triggering Default Vault States: Original Customer Requirements
  • 42. Example from Sweetbridge: Sell Line Vault Controls Collateralized debt positions have rules which trigger control actions which prevent loans from defaulting https://images.sweetbridge.org/main/Sweetbridge-WP-LiquidityProtocolMath-v1-01.pdf Hybrid System Controller designed to massively reduce the probability of reaching the state of invalid vault despite it being possible due to outside volatility in asset value
  • 43. Automated Actions: Sell Line Vault Controls Formal Proof creates a cushion between Valid and Triggering states with a tunable parameter, Theta But we check our work numerically and use the simulations to guide parameter decisions https://images.sweetbridge.org/main/Sweetbridge-WP-LiquidityProtocolMath-v1-01.pdf
  • 44. Asset Value Asset Value* Figure 3: Asset and Liabilities at New State Sweetbridge Transaction Fee Liability Value Liability Value* -ΔLV Penalty Fee -ΔLV(1+PF)(1+TF) Vault States: Revised Customer Requirements 0 0.2 0.4 0.6 0.8 1 1.2 LV/AV Vault States Vault States with Sell Line Liability Value as a % of Asset Value Good Valid Sell Line Triggering Cannot Cover Fees Cannot Cover Liabilities
  • 46. Defining State Variables in Economies
  • 47. Defining Value Functions and Invariants
  • 48. Sweetcoin Design Preserves an Invariant: The Ratio of Fees incurred to Fees Paid! We didn’t yet understand the generality of invariants when working on this
  • 49. Sweetcoin Intrinsic Value– Marketprice Independence Tokens in use: Locked for the period Based on level of service Tokens owned Purchase tokens Sell tokens Market value of tokens owned Discount capacity of tokens owned Network state: Total tokens activated Total platform use Token utility: Financial value of using the tokens based on costs offset over a period of repeated use use From Discount Token Framework Published by Sweetbridge Inc https://images.sweetbridge.org/main/WP-Sweetbridge-Discount- Tokens.pdf Discount Token reduces platform fees by a percentage F = total fees Network-wide f = individual user fee without token A = total activated tokens network-wide a = individual user activated tokens Discount Capacity = phi * a/A*F/f User’s Discount = phi * a/(a+A)*(f+F)/f phi = network-wide discount rate zero fee when: a = f*A/( phi*F +(1-phi)*f) Utility= Discount Capacity; NOT dependent on Token Market Price
  • 50. Discount Token as an On-chain Microservice History of all (f,a,f’) Stored in Ledger (f,a) f’f’= f*(1-phi * a/(a+A)*(f+F)/f) f = fees incurred a= tokens activated activated tokens remain locked for N blocks in the future f’ = fees due after accounting for locking a F’ = Sum: f’ over N blocks look back N blocks F = Sum: f A = Sum: a System tends to the intended property F’ = (1-phi)* F But we added a low pass filter reduce noise in discount capacity experienced by Sweetcoin users
  • 51. Going Beyond Invariants: Maximization and Convergence
  • 52. Is “On Chain Control” Possible?
  • 53. What about Games? Actions and Reward are fixed: play best response Design the game, but once deployed the game is fixed But in the world of blockchain networks the game itself can change in time!
  • 54. How does our "Control System” Relate to Games? • Think of it as engineering how the ‘Game’ itself is evolving • The players actions move the state within the ‘possible’ configurations • We make no claims about what any player actual does • We only make claims about what those ‘possible’ configurations are • In practice this means careful selection of smart contract methods to be mathematically consistent with fixed point properties in the manner of Lyapunov Optimization • Only After Characterizing the Possible configurations does it really make sense to design incentive profiles over actions https://en.wikipedia.org/wiki/Lyapunov_optimization
  • 56. Moving through the systems design process: VERIFICATION SYSTEMS ENGINEERING FUNDAMENTALS, Department of Defense, Systems Management College, January 2001
  • 57. Simulation Principles § Build tool using mathematical model § Determine assumptions § Define ranges § Validate Tool § Define test § Run test to answer right questions, § Deterministic vs Stochastic § Stochastic processes § Monte Carlo Simulation
  • 58. Sweetcoin Macro-Economic Research Uses of Sweetcoin in the network over time, time grouped averages over 100 unique Stochastic Experiments
  • 59. Sweetcoin Macro-Economic Research Statistics for Global Discount Ratios and Discount Capacity KPIs over 100 unique trials At system launch few discounts are achieved but the system evolves toward the designed discount equilibrium point The discount capacity of tokens grows roughly proportionally with the growth in network utilization as measured by fees incurred
  • 61. Integration Key Points • Systems Integration is the process of: Assembling the constituent parts of a system in a logical, cost-effective way, comprehensively checking system execution (all nominal & exceptional paths), and including a full functional check-out. • Systems Test is the process of: • Verifying that the system meets its requirements • Validating that the system performs in accordance with the customer/user expectations • Manage system integration and system test based upon subsystems that can be end-to-end tested against system level requirements; manage system design & development based upon components that can be independently developed and checked. • Success • All subsystems integrated; all subsystem & system threads exercised successfully. • System is robust and is ready for formal requirements verification.
  • 63. Bridgecoin Economy Research System without Depositor Policy Implemented by Treasury System with simple Depositor policy offering interest bearing loans to lock up BRC
  • 65. Measuring, Monitoring and Maintenance How: • Collect data in real time from blockchain and other data sources Why: • To be good stewards of shared infrastructure, system (maintenance) tuning and well informed governance requires data • Owe it to your stakeholders to be informed about the performance of your system • Ability to gain insight, tune, foresee, and learn about your blockchain environment • Consider the operational life cycle of the product
  • 66. Measuring, Monitoring and Maintenance Example: CryptoKitties (AxiomZen) https://drive.google.com/file/d/1soo- eAaJHzhw_XhFGMJp3VNcQoM43byS/vie w • Low Stakes Build a “toy” system but release it into the real world to learn a lot. ‘It’s just a game after all.’ • Low Risk No major harm if something goes wrong • High Reward Real data about real activity with respect to an explicit incentive is available and can be analyzed!
  • 67. Cryptokitties: NFTs, Functions and States https://github.com/BlockScience/EthereumStats/blob/master/KittyExplorer.ipynb
  • 68. GiveBirth() and the Midwife Role // Send the balance fee to the person who made birth happen. msg.sender.send(autoBirthFee);
  • 69. Births By Midwife The all time top 10 Midwives
  • 70. May the Best Midwife win…
  • 71. Though Not as Dominant as it appears…
  • 72. Midwives Go Professional: Smart Contracts Instead of “external accounts” — Smart contracts specialized to call give Birth Emerged a few weeks in
  • 73. Smart Contracts and Serious Multi-tasking
  • 74. Birthing Smart Contacts: Profit by Caller Restricted to top Midwife Accounts
  • 75. Birthing Smart Contacts: Profit by Called Serious differences in performance despite a flat reward function
  • 76. There can be only one… you lose a lot Each kitty can only be born once so there is a trade off between gas fee on the call and chance of winning
  • 78. Identity and Privacy All blockchain ‘accounts’ have public key addresses Networks are Psuedo-nonymous Government Issued “Legal” Identity Public Ledgers are a double-edged sword not a Panacea Layered Architectures and Nuanced thinking around Policy and Regulation are required build and regulate systems that store, manage or make decisions using Personally Identifying Information (PII) Map
  • 79. Regulation and Governance Technology is what can be done but Society needs to think about What the technology is used for. When economic ‘robotic agents’ are part of the economy…. Who decides what their objective functions are allowed to be? Who is responsible for monitoring the health of the economy? … for tuning network or agent parameters? … for decommissioning them? Do we need professional engineering licenses for economic agents? How do we make sure they aren’t taking advantage of people? … or incentivizing or enabling nefarious behavior?
  • 80. Scifi Dystopian Future? A synthetic world interwoven with the physical one in which autonomous software agents interact with each other, their environment and humans. Trending up Trending down Emergence of a hyper-intelligent AI that has central command of legions of robotic agents; coordination issues: Byzantine General’s Problem