SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Downloaden Sie, um offline zu lesen
Towards a
Practice of
Token Engineering
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
Early
iterations
Early iterations:
Flailing
Can we
structure this
better?
Realization: Tokenized Ecosystems
Are a Lot Like Evolutionary Algorithms!
What Tokenized ecosystem Evolutionary Algorithm
Goals Block reward function
E.g. “Maximize hash rate”
Objective function
E.g. “Minimize error”
Measurement
& test
Proof
E.g. “Proof of Work”
Evaluate fitness
E.g. “Simulate circuit”
System agents Miners & token holders (humans)
In a network
Individuals (computer agents)
In a population
System clock Block reward interval Generation
Incentives &
Disincentives
You can’t control human,
Just reward: give tokens
And punish: slash stake
You can’t control individual,
Just reward: reproduce
And punish: kill
We can approach token design
as optimization design.
Optimization Design
Steps in Optimization Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing solver. If needed, try different
problem formulations or solvers.
3. Design new solver?
1. Formulation of an optimization problem
Objectives & constraints in a design space
2. Try an existing solver. Does it converge?
3. Design new solver
Example of a Successful Outcome
Token Design
as Optimization
Design
Steps in Token Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
1. Formulate the Problem
(a) Ask
•Who are my potential stakeholders?
•And what do each of them want?
•What are possible attack vectors?
(b) Translate those into objectives and constraints.
2. Try Existing Patterns
1. Curation
2. Proofs of human or compute work
3. Identity
4. Reputation
5. Governance / software updates
6. Third-party arbitration
7. …
2.1 Patterns for Curation
•Binary membership: Token Curated Registry (TCR)
•Discrete-valued membership: Stake Machines
•Continuous-valued membership: Curation Markets
characterized by bonding curve
•Hierarchical membership: each label gets a TCR
•Work tied to membership: Proofed Curation Market
•Non-fungible tokens: Re-Fungible Tokens
2.2 Patterns for Proofs of Compute Work
Case Study:
Analysis of Bitcoin
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
E(Ri) α Hi * T
E() = expected
value
# tokens (BTC)
dispensed each
block
block
rewards
hash power of actor
= contribution to
“security”
Result of Bitcoin’s objective function:
People are maximizing security! = Maximizing electricity
More power than USA by mid 2019
Case Study:
Design of Ocean
1. Formulate the Problem:
(a) Who are stakeholders? What do they want?
Objective function: maximize supply of relevant data
Token rewards if: supply relevant data
Token rewards if: supply data, and curate it
1. Formulate the problem:
(b) Translate into objectives and constraints
Constraints = checklist:
• For priced data, is there incentive for supplying more? Referring?
• For priced data, good spam prevention?
• For free data, is there incentive for supplying more? Referring?
• For free data, good spam prevention?
• Does the token give higher marginal value to users of the network versus external
investors? Eg Does return on capital increase as stake increases?
• Are people incentivized to run keepers?
• Is it simple? Is onboarding low-friction?
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints – values too!
2. Try Existing Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market.
Curation: Pay tokens to listen.
Key Question 1 2 3 4 5
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔
2. Try existing patterns: evaluate on objectives &
constraints. None passed…
3. Try New Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market. Curation:
Pay tokens to listen.
5. Data registry + free data curation market. Curation: Stake
tokens as belief in reputation. Auto CDN.
6. Actor registry + free&priced data curation market. Curation:
Stake tokens as belief in reputation. Auto CDN. “Proofed
Curation Market”
Key Question 1 2 3 4 5 6
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔ ✔
3. Try new patterns: evaluate on objectives &
constraints
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: Proofed Curation Market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
#TokenEngineering
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Engineering theory,
practice and tools
+ responsibility
Token Engineering for Analysis & Synthesis
Conclusion
Trent McConaghy
@trentmc0
• Token design ≈ optimization design
• So, approach token design as optimization design!
1. Formulate problem. Objectives, constraints.
2. Try existing patterns. Iterate.
3. If needed, try new design.
• This process helped a lot for designing Ocean (so far)
• Token Engineering = Theory + practice + tools + responsibility
Conclusion:
Towards a Practice of #TokenEngineering

Weitere ähnliche Inhalte

Was ist angesagt?

What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
Ulf Mattsson
 

Was ist angesagt? (20)

Write smart contract with solidity on Ethereum
Write smart contract with solidity on EthereumWrite smart contract with solidity on Ethereum
Write smart contract with solidity on Ethereum
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Lean Analytics for Startups and Enterprises
Lean Analytics for Startups and EnterprisesLean Analytics for Startups and Enterprises
Lean Analytics for Startups and Enterprises
 
SlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design SecretsSlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
 
A Playbook for Achieving Product-Market Fit
A Playbook for Achieving Product-Market FitA Playbook for Achieving Product-Market Fit
A Playbook for Achieving Product-Market Fit
 
Decentralized Application: A Software Engineering Perspective
Decentralized Application: A Software Engineering PerspectiveDecentralized Application: A Software Engineering Perspective
Decentralized Application: A Software Engineering Perspective
 
Building a Company-Wide Growth Culture: SaaStr Annual 2016
Building a Company-Wide Growth Culture: SaaStr Annual 2016Building a Company-Wide Growth Culture: SaaStr Annual 2016
Building a Company-Wide Growth Culture: SaaStr Annual 2016
 
The Build Trap
The Build TrapThe Build Trap
The Build Trap
 
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
 
Tokens and Complex Systems
Tokens and Complex SystemsTokens and Complex Systems
Tokens and Complex Systems
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
 
Token engineering presentation 5 13-18
Token engineering presentation 5 13-18Token engineering presentation 5 13-18
Token engineering presentation 5 13-18
 
Kanban values exercise
Kanban values exerciseKanban values exercise
Kanban values exercise
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Lean Analytics @ MicroConf
Lean Analytics @ MicroConfLean Analytics @ MicroConf
Lean Analytics @ MicroConf
 
The Rise of All-In-One SaaS
The Rise of All-In-One SaaSThe Rise of All-In-One SaaS
The Rise of All-In-One SaaS
 
Big Data vs Data Science vs Data Analytics | Demystifying The Difference | Ed...
Big Data vs Data Science vs Data Analytics | Demystifying The Difference | Ed...Big Data vs Data Science vs Data Analytics | Demystifying The Difference | Ed...
Big Data vs Data Science vs Data Analytics | Demystifying The Difference | Ed...
 
7 steps of product discovery
7 steps of product discovery7 steps of product discovery
7 steps of product discovery
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSys
 

Ähnlich wie Towards a Practice of Token Engineering

Ähnlich wie Towards a Practice of Token Engineering (20)

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and Nature
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
900 keynote abbott
900 keynote abbott900 keynote abbott
900 keynote abbott
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - Reboot
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Tokenomics
TokenomicsTokenomics
Tokenomics
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid language
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdf
 

Mehr von Trent McConaghy

Mehr von Trent McConaghy (14)

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real Estate
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the Planet
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In Python
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Towards a Practice of Token Engineering

  • 1. Towards a Practice of Token Engineering Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18. Realization: Tokenized Ecosystems Are a Lot Like Evolutionary Algorithms! What Tokenized ecosystem Evolutionary Algorithm Goals Block reward function E.g. “Maximize hash rate” Objective function E.g. “Minimize error” Measurement & test Proof E.g. “Proof of Work” Evaluate fitness E.g. “Simulate circuit” System agents Miners & token holders (humans) In a network Individuals (computer agents) In a population System clock Block reward interval Generation Incentives & Disincentives You can’t control human, Just reward: give tokens And punish: slash stake You can’t control individual, Just reward: reproduce And punish: kill
  • 19. We can approach token design as optimization design.
  • 21. Steps in Optimization Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing solver. If needed, try different problem formulations or solvers. 3. Design new solver?
  • 22. 1. Formulation of an optimization problem Objectives & constraints in a design space
  • 23. 2. Try an existing solver. Does it converge?
  • 24. 3. Design new solver
  • 25. Example of a Successful Outcome
  • 27. Steps in Token Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 28. 1. Formulate the Problem (a) Ask •Who are my potential stakeholders? •And what do each of them want? •What are possible attack vectors? (b) Translate those into objectives and constraints.
  • 29. 2. Try Existing Patterns 1. Curation 2. Proofs of human or compute work 3. Identity 4. Reputation 5. Governance / software updates 6. Third-party arbitration 7. …
  • 30. 2.1 Patterns for Curation •Binary membership: Token Curated Registry (TCR) •Discrete-valued membership: Stake Machines •Continuous-valued membership: Curation Markets characterized by bonding curve •Hierarchical membership: each label gets a TCR •Work tied to membership: Proofed Curation Market •Non-fungible tokens: Re-Fungible Tokens
  • 31. 2.2 Patterns for Proofs of Compute Work
  • 33. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log
  • 34. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log E(Ri) α Hi * T E() = expected value # tokens (BTC) dispensed each block block rewards hash power of actor = contribution to “security”
  • 35. Result of Bitcoin’s objective function: People are maximizing security! = Maximizing electricity More power than USA by mid 2019
  • 37. 1. Formulate the Problem: (a) Who are stakeholders? What do they want?
  • 38. Objective function: maximize supply of relevant data Token rewards if: supply relevant data Token rewards if: supply data, and curate it 1. Formulate the problem: (b) Translate into objectives and constraints
  • 39. Constraints = checklist: • For priced data, is there incentive for supplying more? Referring? • For priced data, good spam prevention? • For free data, is there incentive for supplying more? Referring? • For free data, good spam prevention? • Does the token give higher marginal value to users of the network versus external investors? Eg Does return on capital increase as stake increases? • Are people incentivized to run keepers? • Is it simple? Is onboarding low-friction? 1. Formulate the problem: (b) Translate into objectives & constraints
  • 40. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 41. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 42. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 43. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 44. 1. Formulate the problem: (b) Translate into objectives & constraints – values too!
  • 45. 2. Try Existing Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen.
  • 46. Key Question 1 2 3 4 5 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ 2. Try existing patterns: evaluate on objectives & constraints. None passed…
  • 47. 3. Try New Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen. 5. Data registry + free data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. 6. Actor registry + free&priced data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. “Proofed Curation Market”
  • 48. Key Question 1 2 3 4 5 6 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ ✔ 3. Try new patterns: evaluate on objectives & constraints
  • 49. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: Proofed Curation Market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 50. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 52. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints
  • 53. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints Engineering theory, practice and tools + responsibility Token Engineering for Analysis & Synthesis
  • 55. Trent McConaghy @trentmc0 • Token design ≈ optimization design • So, approach token design as optimization design! 1. Formulate problem. Objectives, constraints. 2. Try existing patterns. Iterate. 3. If needed, try new design. • This process helped a lot for designing Ocean (so far) • Token Engineering = Theory + practice + tools + responsibility Conclusion: Towards a Practice of #TokenEngineering