Hyperledger is a set of open-source distributed ledger related technologies, the most well-known being Fabric, which is a framework for creating blockchain networks.
The most interesting cases are S&P Global and Walmart, who use it to keep track of data for various auditing purposes. The idea is that since data on a blockchain can't be modified on a whim without that change being observed, it protects the integrity of the data being stored. Basically it is being treated as a sort of database.
I've seen those and I wouldn't describe them as "blockchains" in the same sense that cryptocurrencies use it. The word seems to only be used for marketing purposes. Those are just an ordinary ledger with some sharding/mirroring.
Blockchain itself just refers to a linked list (the chain) of cryptographically hashed items such as a timestamp and the data it is time-stamping (the block), which is based on previous elements in the chain. This is also how how it is also described in the original Bitcoin paper.
Blockchain doesn't rely on crypto, crypto was implemented using blockchain. Blockchain was invented long before crypto in the early 90s at Bellcore. Crypto may emphasize transactions and combating double-spending (due to nodes being on a public network), but no one is held to crypto's use of blockchain to be blockchain. The Bitcoin paper cites both the original Bellcore paper and its follow-up discussing the use of Merkle Trees, and the Bellcore paper cites patent documents as a potential use-case. So I think what S&P Global and Walmart are doing are valid use of the technology.
Now whether or not cryptocurrency itself or the networks they run on have value is a different story. For what it's worth, one of the use-cases for Corda that I found basically advertised itself as "we are better than transacting with paper" lol.
> The idea is that since data on a blockchain can't be modified on a whim without that change being observed, it protects the integrity of the data being stored.
Audit logs are not a new thing. Immutable data stores are not a new thing. This can be done in any number ways, each of them more efficient.
Moreover, it doesn't help with data entry. Yes, data cannot be modified. And still someone orders bananas and ends up with mouldy tomatoes.
> S&P Global and Walmart, who use it
I very much doubt they use it. All these "use cases" fall apart within a year or two after initial starry-eyed announcements
> Basically it is being treated as a sort of database.
Indeed. Treated like a database. When people treat Kafka as a database, those people are derided and there are entire articles on why you shouldn't treat a read-only append-only log as a database. But sure. Once it's blockchain, it's amazing and the bee's knees.
I would listen to all of Evoken's work while I was programming lol. One day the earbuds had accidentally unplugged and people were looking at me like "HOW CAN THIS MAN FOCUS?!?!?"
Here are the big-name defense contractors that are US-based:
Lockheed Martin, Raytheon, General Dynamics, Boeing and Northrop Grumman.
Lockheed Martin, Raytheon, General Dynamics and Northrop Grumman are almost entirely (if not entirely) focused on work for the military. Boeing has lots of their own commercial stuff, but they also do work for the military. The work these companies do is pretty broad. They can make fighter jets, but also custom software.
The military tends to get funding for certain projects, and then seeks out contractors to research, build or manufacture things for them. In some cases, they may split budget between multiple companies or organizations. The military tends to select companies or organizations with demonstrated expertise in a project area.
I was on a DARPA project, and when DARPA announces projects, you have to apply to be selected. The money from our project wasn't funded by DARPA directly, but rather via the Air Force Research Labs. All of the companies or organizations that were selected for the collaborative research team I was on, were experts in some privacy-related area (usability, data storage, AI, differential privacy etc). I worked for a big-name university which was awarded a contract, and we were held accountable for how we spent the money. Keep in mind, congress keeps an eye on these budgets. We also didn't strictly do research, we were expected to produce something tangible and had to put in an honest effort to transfer the technology to the public.
So when you talk about startups and VC funding, I can't imagine there are too many (if any) of those kinds of companies around. A VC is going to invest in a company, because that company is producing a product that is going to get them a return on their investment. If the government isn't awarding contracts to your startup, then you aren't making money. Think back to SpaceX vs Blue Origin, and how much money Bezos lost on that NASA contract. One of the companies I worked with that gets awarded DARPA money was started by an ex-DAPRA project manager. They had connections. Other companies who did contracting work for the military were well-established and have a track record of delivering quality. You just won't really see college-aged kids come out with an idea for defense, get a ton of VC money and then start working with the government. Chances are more likely that they will build some product that has relevancy to the government, and thus the government becomes a sort of side-customer. College-aged kids just aren't really established enough to be taken seriously for these kinds of things. They may get to work on those projects during the course of their research at university, though.
For things like limitations on research, as mentioned above, you will be awarded a research grant for a specific project. Your limitations are scoped to that project. The military (DARPA in this case) could hypothetically decide a particle disintegrator is worth researching, and then call for people to apply if they got funding for it. You will see companies and universities applying for this work. DARPA project managers tend to be experts in a specific area. The project manager for Brandeis (the project I was on) is an expert in cryptography. So you won't see random people coming up with random ideas. The project managers have to come up with a project that is worth getting funding on, which isn't easy as I understand.
For legal stuff... one of the organizations on the DARPA project I was on ended up developing technology that the military decided to keep secret. I don't know if those individuals ended up getting a security clearance or what, but they weren't allowed to discuss the work with other team members who weren't involved. Typically a contractor will want to see US Citizens and ask that they get a security clearance, but sometimes there is work that doesn't require a clearance. As mentioned in another post, you do have to consider laws like ITAR especially if you start using HTTPS and other encryption methods. If it is a DARPA project, there shouldn't be any "legal" issues that randomly prop up. They keep in touch with you, so unless you keep things a secret from them, that shouldn't happen.
I keep an e-mail for anything I suspect I will get spam from, one for anything official like work/job hunting, and a gmail mostly for anything google-related.
A smart bulb by itself is not particularly likely to cause any kind of harm.
IoT in general can have some risks and these have been proven, especially if your devices are linked to services outside of your device provider such as "If This Then That" (or IFTT) [1]. I am a little fuzzy on the details, but I believe some smart home appliances such as TVs expose APIs that aren't particularly secure either...
Additionally, some devices do not secure the data they transmit to whatever nearby base station [2].
Overall it is fine to buy in to IoT, just be aware of what you are buying and things that can go wrong (i.e. how can people exploit this device?). If you get actuators that adjust windows or vents based on temperature, make sure they are secure physically and can't be gamed by intruders.
I should add that although your smart bulb may not have a microphone, people can determine other things about you from data analysis or machine learning.
This seems to be heavily focused on studying social phenomena and less so about things like engineering papers or Physics etc. The author himself specializes in social-oriented research. I think it would be better to look at how successful non-social studies are vs humanities. It is debated on whether or not Sociology is even a science at all.
For what it is worth, I happen to know that big tech companies follow research at big name CS universities with a bit of interest. At times, even borrowing the research itself in their products. At one point, a professor I worked under was quoted in Android documentation.
I work in the banking industry which has a bit of regulation, and is a bit risk-averse. People are expected to engage in risk management at all levels. If sabotaging became more common, OSS adoption would likely become unacceptable at these organizations. Mine already blocks Github and you need to request permission just to view it, and even then you can't pull code via command line.
Putting in code that is destructive like that, for any reason, is a good and fast way to scare management away from using your code. If you are going to insist on doing that stuff, just engage in hacking on the side lol.
I work as a senior developer for one of the largest banks in the US at the moment, and have also worked for a subsidiary of the largest medical provider in the city. Neither of these companies had particularly challenging interviews. Generally, if you are IT, the interviews are simple.
The only people who I have met who turn the interview process into a gamut of algorithm puzzles, are people who happen to be very good at them. These also don't tend to be the people running things at banks, let alone large ones.
Maybe because these companies see the coding part as almost mechanical and try to tackle the complexity with (often overboarding) design and processes? Problem is that those assume that a tree like divide-and-conquer will reduce complexity in the "leaf-nodes", but as soon as you have a lot of cross-cutting dependencies everybody is shaking that tree.
The problem with "artisanal developers" is that they tend to overestimate their proximity and underestimate how much of a "system" they actually should build. Most of the time they lack domain knowledge, too.
If you can identify the cross-cutting interactions that will result in the biggest risk for the project, and put how to handle those in a design that is communicated well, you can leave freedom how to do the rest and the craftsmen will be appeased. But that needs a good deal of domain (and people) knowlege.
Most of the comments touched on what you need already, but one thing I will add:
I don't know if I can advertise other startup accelerators here, but there is at least one startup accelerator that involves companies with manufactured products. I participated in this program, and they work closely with participating companies on this process. The accelerator is also very well connected, which could help with your marketing thing too.
I am developing an Apache module that does some authentication stuff, and I needed a way to parse and read JSON in C. I really did not want to deal with doing that myself, and I wanted to avoid any complicated library.
I really don't understand the widespread fear of C/C++ that I see so often. The vast majority of security pitfalls are from using very old functions that don't check input. These are easily caught with linters and scanners. In many cases the compiler itself will warn you if you use them. Don't ignore warnings!
Remember that Apache Remote Code Execution bug? No, not Struts, the other one. No, not mod_cgi, the other one. No, not auth_digest the other one.. ad inifinum. These were all caused by so-called "unsafe legacy functions". Just because YOU might not implement them, doesn't mean others won't.
The possibility for Remote Code Execution vulnerability from an unauthenticated user. This should be offloaded into a memory safe language, ideally by a parser that's been battle tested.
https://www.hyperledger.org/learn/case-studies
Hyperledger is a set of open-source distributed ledger related technologies, the most well-known being Fabric, which is a framework for creating blockchain networks.
The most interesting cases are S&P Global and Walmart, who use it to keep track of data for various auditing purposes. The idea is that since data on a blockchain can't be modified on a whim without that change being observed, it protects the integrity of the data being stored. Basically it is being treated as a sort of database.