10 minutes to learn about ADC blockchain
Blockchain is a kind of technology, which solves the core "trust" problem in the market economy and reces the trust cost between strangers to a very low level
there is one crucial thing in the market economy, which is "trust". Without trust, no deal can be established. When you go to LAICHANG to buy vegetables, if you don't believe that the pesticide content in vegetable is up to the standard, you won't trade with that dealer; If you buy a bottle of water in a small shop, the clerk will not sell you the water if he doesn't believe that the money you give is real
the traditional small-scale peasant economy is acquaintance economy, and the transaction scale is limited to people who are familiar with each other nearby. If an acquaintance deceives you, he will lose your social relationship and damage his reputation in the whole circle of acquaintances. We believe that acquaintances are less likely to cheat us than strangers
therefore, once we are beyond the scope of acquaintances, we need to use a high cost to identify whether a stranger will cheat me and how to avoid the risk of being cheated. This situation will hinder the transaction and restrict the transaction
in addition, different races, nationalities, cultures, religious beliefs and so on will naturally have this kind of trust problem
in the market economy, why can there be so many transactions between strangers? Because of the birth of a new mechanism to solve the problem of trust in strangers
so far, the most important mechanism to solve the trust problem is the "trust intermediary" organization and mode
as long as you and strangers trust a third-party organization, the trust problem between you can be solved through this third-party organization
this third-party organization, we call it trust intermediary. Both the government and the bank are trust intermediaries
you can sell the goods you have worked hard to proce to a stranger in exchange for a stack of RMB banknotes. It's because the credit of the note issuing bank and the guarantee of the authority of the government guarantee the currency value and effectiveness of the banknotes. Otherwise, sell things, in exchange for a few ordinary paper, who would like to
in the era of global village and Internet, the people who buy your things may be strangers who will not meet and thousands of miles away. Trust is lower, so Alipay assumes the role of trust intermediation. Buyers first pay the goods to Alipay's account. When they receive the goods, they confirm that they are OK, then they agree to sell the goods to the seller. Taobao and other e-commerce have been booming rapidly in just over ten years
trust intermediary is in a central position in the transaction system. All transactions should solve the trust problem through it
However, the cost of trust intermediary itself is often hugeas a trust intermediary, how much transaction tax does the government charge each year? What is the most profitable instry? Financial services. The annual profits of Alipay's ant suit are over ten billion. p> What does this mean? Both sides of the market actually pay a huge trust cost
if there is any way to cancel or greatly rece the trust cost, the transaction cost of the general public can be reced, and the profits can be greatly increased
so in the Internet era, blockchain technology is on the stage
it allows the trading party to get rid of the intermediary, solve the problem of trust among strangers, and greatly rece the cost of trust
the blockchain can be expanded on a large scale, the data is open and transparent, the data of each client is consistent, and even if some clients are destroyed, the data security will not be affected. These highly reliable technical features can solve the trust problem of strangers with low cost
this technology can be extended to all fields that can be digitized, such as digital currency, payment and clearing, digital bills, proof of rights and interests, credit reference, government services, medical records, etc
in the medium and long term, blockchain will be a revolutionary technology, which will bring about great social changes like the existing Internet, and has great investment value and money making opportunities
in the future, the companies that can combine blockchain with different scenarios to promote applications may be the next group of bat, the next Google, Microsoft and apple
as the first practical application of blockchain technology, bitcoin has been widely accepted and used all over the world. Millions of users and tens of thousands of merchants have accepted the payment of bitcoin as a digital currency, and the exchange value of bitcoin as a currency is growing. Even e to the consensus that the total amount is fixed and the long-term value is bullish, bitcoin has become a hedge asset similar to gold, and the price has skyrocketed
The way in which people keep accounts together is also known as "distributed" or "decentralized", because everyone keeps accounts, and the accuracy of the account book is determined by the program algorithm, not by an authoritative organization
this is the blockchain, the core is finished, blockchain is so simple, a common account book
six core algorithms of blockchain Technology:
blockchain core algorithm 1: Byzantine agreement
the story of Byzantine is like this: the Byzantine Empire has great wealth, and the surrounding 10 neighbors have been around for a long time, but the Byzantine walls stand tall and firm, No single neighbor has been able to successfully invade. Any single neighbor's invasion will fail, and at the same time, it may be invaded by other nine neighbors. Byzantine Empire's defense ability is so strong that at least more than half of its ten neighbors attack at the same time before it can be broken. However, if one or several of the neighbors agree to attack together, but betray in the actual process, then the invaders may be annihilated. So each side was careful and could not easily trust its neighbors. This is the question of Byzantine Generals
blockchain core algorithm 2: asymmetric encryption technology
in the above Byzantine agreement, if several of the 10 generals send messages at the same time, it is bound to cause confusion in the system, resulting in different attack time schemes and inconsistent actions. Anyone can send the message of attack, but who will send it? In fact, it only needs to add a cost, that is, only one node can spread information in a period of time. When a node sends a unified attack message, each node must sign and seal to confirm its identity when receiving the message from the initiator
blockchain core algorithm 3: fault tolerance problem
we assume that in this network, messages may be lost, damaged, delayed and sent repeatedly, and the order of receiving is inconsistent with the order of sending. In addition, the behavior of nodes can be arbitrary: they can join or exit the network at any time, they can discard messages, forge messages, stop working and so on, and they may also have all kinds of human or non-human failures. Our algorithm provides fault tolerance for consensus system composed of consensus nodes, which includes both security and availability, and is suitable for any network environment
blockchain core algorithm 4: Paxos algorithm (consistency algorithm)
the problem solved by Paxos algorithm is how a distributed system can reach an agreement on a certain value (decision). A typical scenario is that in a distributed database system, if the initial state of each node is consistent, and each node performs the same operation sequence, then they can finally get a consistent state. In order to ensure that each node executes the same command sequence, it is necessary to execute a "consistency algorithm" on each instruction to ensure that the instructions seen by each node are consistent. A general consistency algorithm can be applied in many scenarios, which is an important problem in distributed computing. There are two models of node communication: shared memory and message passing. Paxos algorithm is a consistency algorithm based on message passing model
blockchain core algorithm 5: consensus mechanism
blockchain consensus algorithm is mainly workload proof and equity proof. Take bitcoin as an example. In fact, from a technical point of view, POW can be regarded as a reusable hashcash, and the generation workload proves to be a random process in probability. When mining a new secret currency and generating a block, the consent of all participants must be obtained, and the miner must obtain the pow work proof of all data in the block. At the same time, miners have to constantly observe and adjust the difficulty of this work, because the requirement for the network is to generate a block every 10 minutes on average
blockchain core algorithm 6: distributed storage is a kind of data storage technology, which uses the disk space of each machine through the network, and forms a virtual storage device with these scattered storage resources, and the data is stored in every corner of the network. Therefore, distributed storage technology does not store complete data in each computer, but stores the data in different computers after cutting. It's like storing 100 eggs, not in the same basket, but separately in different places. The total number is 100. Want to learn more, you can make more use of network search, network search results - small knowledge
2. Blockchain is an innovative application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies in the Internet era. In recent years, the development and application of blockchain is of great significance to technological innovation and instrial revolution. This experience introces the relevant knowledge of blockchain technology
3. Blockchain is a distributed ledger, which can contain financial and / or non-financial transactions. It can be replicated (distributed) on multiple systems in almost real time through peer-to-peer network. Each participant "owns" the same ledger and gets updated when adding any transaction. Each participant helps to determine the inherent "invariance" of all existing records, Using cryptography and digital signature to prove identity, authenticity and enforce read / write access, there is a mechanism that makes it difficult to change history, and it is easy to detect someone trying to change it
first of all, if conditions permit, try to study in the first tier cities, which are technology gathering areas after all. Secondly, we will examine other aspects, such as teachers, curriculum system, teaching mode, employment salary, tuition hours, etc. Go directly to the audition to investigate the real situation of the school.