Abstract

With the recent advances on information and communication technologies, every year we can see more and more branches in this topic. Communities from all over the world are continuously investigating and developing in different categories of the informatics with the idea of finding new innovative solutions to all type of problems. Blockchain is one of this branches that tries to solve transparency, security, and decentralization issues from the databases and informatic systems. The constant evolution of this technology leads us to the necessity of studying the benefits and tools that are being developed in this topic of the information and communication technologies. Investigate what are the facilities that we may have by using this emerging technology in our systems and informatics solutions, what are the disadvantages, as well as to evaluate the possibility of integrating it to other tools, are some of the restlessness that immediately come up. This article arises from a grade thesis made by the authors for a technology center ICT4V (Information and Communication Technologies For Verticals), and it intends to resume what was investigated and learnt during the project.

Highlights

  • Summary – With the recent advances on information and communication technologies, every year we can see more and more branches in this topic

  • This article arises from a grade thesis made by the authors for a technology center ICT4V (Information and Communication Technologies For Verticals), and it intends to resume what was investigated and learnt during the project

  • Se dio a conocer los hallazgos de este proyecto con distintos becarios que se encontraban comenzando proyectos con tecnologías como blockchain, Hyperledger Composer, Hyperledger Fabric

Read more

Summary

Introduction

Summary – With the recent advances on information and communication technologies, every year we can see more and more branches in this topic. Blockchain es una de estas ramas que busca la transparencia, seguridad, y descentralización de las bases de datos y sistemas informáticos. Los mineros están constantemente aplicando el algoritmo SHA-256 utilizando como valor de entrada una concatenación del hash del bloque anterior, el número de bloque, las transacciones y un nonce.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call