Position: Home page » Blockchain » Blockchain and warehouse management

Blockchain and warehouse management

Publish: 2021-05-02 05:56:46
1.

Well, I'm a blockchain operator


Yes, I am engaged in operation work in blockchain technology instry, covering community operation, user operation and content operation


is there any doubt that the blockchain technology is developing steadily, but the blockchain instry seems to be ups and downs? Blockchain operation is also exploring in constant changes. Me too


here is my confession


1.1. Not sad or happy, token is not all

operating in the blockchain instry, and the price is inevitable to talk about. Ups and downs are common, and ups and downs are daily. If you don't have a mind to see the strange, I'm afraid you can't bear such changes in the blockchain instry

2.2. Work or work, no change

what is operation? Compared with the early Internet instry, when most of the operations in the instry are still relatively shallow community operations, what we can do is to exceed the average level in the instry. Operation is still those operations, and because it is a blockchain instry, the nature of operation will change

3.3. Although it's exploration, there are also routines

in the process of operation in the blockchain instry, you will find that some operations still stay at the level of simple community operation or user operation, and even can't be called user operation, while some operations can be transformed from Zhonghua Li, upgrade and iterate their own operation routines, and have their own views on the development of the instry, We have explored our own methodology of blockchain operation

4.4. Professional level, top matching ability

what is professional? Ten points, twelve points. If the operation in the classical Internet era is traceable and the methodology of operation has a way to go, then the operation of the blockchain instry is based on the classical Internet operation. The changes in the blockchain instry are no less than those in the early years of the Internet, and even more than those in the early years of mobile Internet, o2o and other procts. What we need is not only the professional level of operation, but also the top allocation ability

5.5. To understand what you want to do

to enter the operation of the blockchain instry, most of you are interested in the infinite opportunities contained in this instry, or even directly cross-border from unrelated instries. No matter what your professional background is before you become a blockchain operator, I believe this instry will bring you what you want. But the question is, before you enter the instry, do you really want to understand what you want

6.6. Your core competitiveness and how to continue to advance

whether you operate in the classical Internet instry or in the blockchain instry, we must continue to explore, strengthen and continue to advance your core competitiveness. If you're good at it, dig deep. In the starting line and no big difference, the heart is the only key


the development of a new thing still needs to go through many detours, and the development of an emerging instry will also go through many key nodes


when eating crabs, you have to eat your own skills, don't you

2. The vone block chain self-organization of wanglian technology is an innovative form of organization. It can break through the space and population size constraints of the physical world self-organization by using the block chain technology, and mobilize a wider range of human cooperation.
3. Automatic shelves are composed of assembled shelves supplemented by stacker, conveying equipment, palletizing equipment, handling equipment, etc. through manual, stand-alone, online or computer networking control, it can realize automatic access to goods, make full use of building space, achieve standardization and automation, greatly rece labor intensity and storage and transportation costs
why not suggest that all enterprises choose automated shelves? According to the characteristics of automated shelves, first of all, if the height of automated shelves is more than 10 meters, then the warehouse with the height less than 10 meters is not suitable for automated shelves
secondly, the automated shelf has some requirements on the packaging technology of goods, and the goods need to be stored on the whole pallet. If it is aluminum profiles such as water pipes, it is not suitable for the automated shelf
thirdly, e to the need of automatic shelves, transportation equipment and other intelligent equipment are added, which is the most expensive shelf system in the storage shelf system. If the enterprise budget cost is low, it is not suitable for the economic and practical enterprise development!
4. 1、 Similarity

distributed
git ensures that each code warehouse maintains a complete project library locally, not just the branch in which it works and its own submission history. At the same time, it also keeps all the snapshot and index information after the latest pull

on the blockchain, each node keeps a complete database locally, not just its own transaction information

traceability
in Git commit chain, each commit object contains a parent object (the object of the last commit, except the first commit), which can trace all the previous records

on the blockchain, each block contains the index of the previous block (except the genesis block), which can trace all valid transactions before<

tamper proof
in Git's commit chain, each object itself calculates a checksum before storing, and then references it with a checksum. Once modified, the checksums will not be correct, which means that it is impossible to change the contents of any file or directory without git's knowledge< The mechanism used by git to calculate the checksums is called SHA-1 hash. This is a string composed of 40 hexadecimal characters (0-9 and A-F), which is calculated based on the content or directory structure of the file in GIT. SHA-1 hash looks like this:



in the blockchain, each block contains the last block ID, and this block ID has two SHA-256 hashes, which are calculated based on the block content. Once the content is modified, the hash will change, which is inconsistent with the chain of other nodes and cannot be added to the longest chain, so the content cannot be tampered with< 2. Difference

collective consensus and central node will: 1 - blockchain merges based on collective consensus (POW / POS) to form the longest chain, which is the main chain

2 - in Git system, when multi node cooperation is carried out through the warehouse hosting platform, it is the manager of the platform project who controls the power of merge, which reflects the will of the central node<

cryptography
1 - in bitcoin blockchain, cryptography mainly uses the following methods

in the whole system of bitcoin blockchain, a large number of public encryption algorithms are used, such as Merkle tree hash number algorithm, elliptic curve algorithm, hash algorithm, symmetric encryption algorithm and some coding algorithms. The functions of various algorithms in bitcoin blockchain are as follows:

A) hash algorithm

the two hash functions used in bitcoin system are: 1. SHA-256, which is mainly used to complete pow (proof of workload) calculation; 2. Ripemd160, mainly used to generate bitcoin address

b) Merkle hash tree

binary tree or multi tree based on hash value. In the computer field, Merkle tree is mostly used for integrity verification. In the distributed environment, integrity verification can greatly rece the complexity of data transmission and calculation<

C) elliptic curve algorithm

in bitcoin, the public key cryptography algorithm based on secp256k1 elliptic curve mathematics is used for signature and verification. On the one hand, it can ensure that the user's account is not replaced by an impostor, on the other hand, it can ensure that the user can not deny the signed transaction. The private key is used to sign the transaction information, and the user's public key is used to verify the signature. If the verification is passed, the transaction information will be recorded and the transaction will be completed

d) symmetric encryption algorithm

the official bitcoin client uses AES (symmetric block cipher algorithm) to encrypt the wallet file. After the user sets the password, the private key of the wallet is encrypted by the user set password through AES to ensure the security of the private key of the client

e) base58 encoding

base58 is a unique encoding method used in bitcoin. It is mainly used to generate the wallet address of bitcoin, which is similar to the permutation algorithm mechanism in classical cryptography. Its purpose is to increase the readability of bitcoin and change the binary hash value into the address we see

2 - git: SSH key is mainly used for remote login verification, SHA-1 is used for code content checking sum<

SSH is the abbreviation of secure shell, developed by IETF's network working group. It is a protocol designed to provide security for remote login sessions and other network services. SSH protocol can effectively prevent information leakage in the process of remote management< The process of SSH transmission is as follows: (1) the remote host receives the user's login request and sends its public key to the user 2) The user uses the public key to encrypt the login password and send it back 3) The remote host uses its own private key to decrypt the login password. If the password is correct, the user is allowed to log in.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750