Three use cases highlighting the business value of private blockchain
Rarely do we find a technology as controversial as blockchain. It seems there are as many blockchain sceptics as blockchain enthusiasts. The sceptics are concerned with unlawful behavior that occurred in public blockchain networks, as well as with extremely high current or past energy consumption of certain public blockchains.18.10.2022
Maja Schwarz
➔
Other Topics
- aad
- acl
- android
- api developer portal
- api gateway
- api management
- api security
- app store
- argo-cd
- array of struct
- augmented reality
- automation
- aws
- best practice
- blockchain
- buildah
- ci
- ci/cd
- client certificate
- cloud
- compiler
- computing
- container
- control plane
- cowsay
- crossplane
- cybersecurity
- data
- data architecture
- data governance
- data lake
- data mesh
- data strategy
- data transfer
- data warehouse
- data-oriented design
- data-streams
- decentralization
- dependency management
- devcontainers
- development
- development environments
- devops
- devsecops
- dlt
- docker
- eks
- entity component system
- etl
- external secrets
- fastlane
- financial services
- flutter
- frontend
- gateway
- github actions
- gitops
- hashicorp vault
- hazelcast
- http/2
- infrastructure
- infrastructure as code
- integrated development environment
- java
- java 17
- jwt
- jwt signer
- kafka
- kafka connect
- kong
- kong plugin
- kubernetes
- kubernetes operator
- lcg
- lua module
- lxm
- metrics
- microservices
- mixed reality
- mobile
- mobile development
- monitoring
- mtls
- multi-threading
- mutual tls
- oauth 2.0
- obo
- observability
- on-behalf-of
- openid connect
- openidconnect
- opentelemetry
- parameter store
- pdk
- perimeter security
- platform engineering
- play store
- plugin cloning
- priority-updater
- process automation
- prometheus
- quarkus
- rancher desktop
- random
- restful api
- rfc 9068
- rfc 9440
- rootless
- routing
- saml
- saml bearer assertion
- scalability
- sealed secrets
- secrets
- secrets manager
- security
- seo
- servicemonitor
- software lifecycle
- software supply chain
- sport
- ssh
- ssm
- streamapi
- time to first byte
- token cloning
- token exchange
- token validation
- traffic management
- ttrp
- user experience
- virtual reality
- visual studio code
- vpc
- web performance optimization
- xr technology
- zero-trust architecture
- zta