Blockchain and warehouse management
Well, I'm a blockchain operator
Yes, I am engaged in operation work in blockchain technology instry, covering community operation, user operation and content operation
is there any doubt that the blockchain technology is developing steadily, but the blockchain instry seems to be ups and downs? Blockchain operation is also exploring in constant changes. Me too
here is my confession
1.1. Not sad or happy, token is not all
operating in the blockchain instry, and the price is inevitable to talk about. Ups and downs are common, and ups and downs are daily. If you don't have a mind to see the strange, I'm afraid you can't bear such changes in the blockchain instry
2.2. Work or work, no change
what is operation? Compared with the early Internet instry, when most of the operations in the instry are still relatively shallow community operations, what we can do is to exceed the average level in the instry. Operation is still those operations, and because it is a blockchain instry, the nature of operation will change
3.3. Although it's exploration, there are also routines
in the process of operation in the blockchain instry, you will find that some operations still stay at the level of simple community operation or user operation, and even can't be called user operation, while some operations can be transformed from Zhonghua Li, upgrade and iterate their own operation routines, and have their own views on the development of the instry, We have explored our own methodology of blockchain operation
4.4. Professional level, top matching ability
what is professional? Ten points, twelve points. If the operation in the classical Internet era is traceable and the methodology of operation has a way to go, then the operation of the blockchain instry is based on the classical Internet operation. The changes in the blockchain instry are no less than those in the early years of the Internet, and even more than those in the early years of mobile Internet, o2o and other procts. What we need is not only the professional level of operation, but also the top allocation ability
5.5. To understand what you want to do
to enter the operation of the blockchain instry, most of you are interested in the infinite opportunities contained in this instry, or even directly cross-border from unrelated instries. No matter what your professional background is before you become a blockchain operator, I believe this instry will bring you what you want. But the question is, before you enter the instry, do you really want to understand what you want
6.6. Your core competitiveness and how to continue to advance
whether you operate in the classical Internet instry or in the blockchain instry, we must continue to explore, strengthen and continue to advance your core competitiveness. If you're good at it, dig deep. In the starting line and no big difference, the heart is the only key
the development of a new thing still needs to go through many detours, and the development of an emerging instry will also go through many key nodes
when eating crabs, you have to eat your own skills, don't you
why not suggest that all enterprises choose automated shelves? According to the characteristics of automated shelves, first of all, if the height of automated shelves is more than 10 meters, then the warehouse with the height less than 10 meters is not suitable for automated shelves
secondly, the automated shelf has some requirements on the packaging technology of goods, and the goods need to be stored on the whole pallet. If it is aluminum profiles such as water pipes, it is not suitable for the automated shelf
thirdly, e to the need of automatic shelves, transportation equipment and other intelligent equipment are added, which is the most expensive shelf system in the storage shelf system. If the enterprise budget cost is low, it is not suitable for the economic and practical enterprise development!
distributed
git ensures that each code warehouse maintains a complete project library locally, not just the branch in which it works and its own submission history. At the same time, it also keeps all the snapshot and index information after the latest pull
on the blockchain, each node keeps a complete database locally, not just its own transaction information
traceability
in Git commit chain, each commit object contains a parent object (the object of the last commit, except the first commit), which can trace all the previous records
on the blockchain, each block contains the index of the previous block (except the genesis block), which can trace all valid transactions before<
tamper proof
in Git's commit chain, each object itself calculates a checksum before storing, and then references it with a checksum. Once modified, the checksums will not be correct, which means that it is impossible to change the contents of any file or directory without git's knowledge< The mechanism used by git to calculate the checksums is called SHA-1 hash. This is a string composed of 40 hexadecimal characters (0-9 and A-F), which is calculated based on the content or directory structure of the file in GIT. SHA-1 hash looks like this:
in the blockchain, each block contains the last block ID, and this block ID has two SHA-256 hashes, which are calculated based on the block content. Once the content is modified, the hash will change, which is inconsistent with the chain of other nodes and cannot be added to the longest chain, so the content cannot be tampered with< 2. Difference
collective consensus and central node will: 1 - blockchain merges based on collective consensus (POW / POS) to form the longest chain, which is the main chain
2 - in Git system, when multi node cooperation is carried out through the warehouse hosting platform, it is the manager of the platform project who controls the power of merge, which reflects the will of the central node<
cryptography
1 - in bitcoin blockchain, cryptography mainly uses the following methods
in the whole system of bitcoin blockchain, a large number of public encryption algorithms are used, such as Merkle tree hash number algorithm, elliptic curve algorithm, hash algorithm, symmetric encryption algorithm and some coding algorithms. The functions of various algorithms in bitcoin blockchain are as follows:
A) hash algorithm
the two hash functions used in bitcoin system are: 1. SHA-256, which is mainly used to complete pow (proof of workload) calculation; 2. Ripemd160, mainly used to generate bitcoin address
b) Merkle hash tree
binary tree or multi tree based on hash value. In the computer field, Merkle tree is mostly used for integrity verification. In the distributed environment, integrity verification can greatly rece the complexity of data transmission and calculation<
C) elliptic curve algorithm
in bitcoin, the public key cryptography algorithm based on secp256k1 elliptic curve mathematics is used for signature and verification. On the one hand, it can ensure that the user's account is not replaced by an impostor, on the other hand, it can ensure that the user can not deny the signed transaction. The private key is used to sign the transaction information, and the user's public key is used to verify the signature. If the verification is passed, the transaction information will be recorded and the transaction will be completed
d) symmetric encryption algorithm
the official bitcoin client uses AES (symmetric block cipher algorithm) to encrypt the wallet file. After the user sets the password, the private key of the wallet is encrypted by the user set password through AES to ensure the security of the private key of the client
e) base58 encoding
base58 is a unique encoding method used in bitcoin. It is mainly used to generate the wallet address of bitcoin, which is similar to the permutation algorithm mechanism in classical cryptography. Its purpose is to increase the readability of bitcoin and change the binary hash value into the address we see
2 - git: SSH key is mainly used for remote login verification, SHA-1 is used for code content checking sum<
SSH is the abbreviation of secure shell, developed by IETF's network working group. It is a protocol designed to provide security for remote login sessions and other network services. SSH protocol can effectively prevent information leakage in the process of remote management< The process of SSH transmission is as follows: (1) the remote host receives the user's login request and sends its public key to the user 2) The user uses the public key to encrypt the login password and send it back 3) The remote host uses its own private key to decrypt the login password. If the password is correct, the user is allowed to log in.