On Demand

Join us for a webinar exploring approaches for structuring open source projects. This session will address differences in community-driven governance and explore various case studies, including:

  • 'single-project' projects
  • unfunded and funded projects
  • technology-focused umbrella projects
  • industry-focused umbrella projects
On Demand

Join us for a webinar exploring approaches for structuring open source projects. This session will address differences in community-driven governance and explore various case studies, including:

  • 'single-project' projects
  • unfunded and funded projects
  • technology-focused umbrella projects
  • industry-focused umbrella projects
On Demand

Join us for a webinar exploring approaches for structuring open source projects. This session will address differences in community-driven governance and explore various case studies, including:

  • 'single-project' projects
  • unfunded and funded projects
  • technology-focused umbrella projects
  • industry-focused umbrella projects
On Demand

Blockchain, the distributed ledger technology (DLT) underlying bitcoin, is far more valuable than the currency it supports. As enterprises start to put distributed ledger technology into practice, it’s important to understand the security implications. We’ll look at public vs. private blockchains and lessons learned for enterprises moving to DLTs. We will walk through real life deployments of Blockchain solutions and discuss how Blockchain can both enhance security but also when built into traditional solutions requires traditional security measures. This talk will leave you with understanding how Blockchain does, and does not, change the security requirements for your enterprise. Then we’ll talk about Hyperledger’s new Bug Bounty program. Join us!

On Demand

Blockchain, the distributed ledger technology (DLT) underlying bitcoin, is far more valuable than the currency it supports. As enterprises start to put distributed ledger technology into practice, it’s important to understand the security implications. We’ll look at public vs. private blockchains and lessons learned for enterprises moving to DLTs. We will walk through real life deployments of Blockchain solutions and discuss how Blockchain can both enhance security but also when built into traditional solutions requires traditional security measures. This talk will leave you with understanding how Blockchain does, and does not, change the security requirements for your enterprise. Then we’ll talk about Hyperledger’s new Bug Bounty program. Join us!

On Demand

Blockchain, the distributed ledger technology (DLT) underlying bitcoin, is far more valuable than the currency it supports. As enterprises start to put distributed ledger technology into practice, it’s important to understand the security implications. We’ll look at public vs. private blockchains and lessons learned for enterprises moving to DLTs. We will walk through real life deployments of Blockchain solutions and discuss how Blockchain can both enhance security but also when built into traditional solutions requires traditional security measures. This talk will leave you with understanding how Blockchain does, and does not, change the security requirements for your enterprise. Then we’ll talk about Hyperledger’s new Bug Bounty program. Join us!

On Demand

Decentralized identity is exploding as a topic. It can be hard to make sense of all the initiatives and technologies. However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.

In particular we’ll discuss the following questions:

  • What makes decentralized identity different from alternative approaches?
  • What are its unique challenges and strengths?
  • What are key features of a decentralized identity ecosystem?
  • Where is there variety and similarity in approaches to decentralized identity?
  • How does Hyperledger Indy tackle the decentralized identity landscape?
On Demand

Decentralized identity is exploding as a topic. It can be hard to make sense of all the initiatives and technologies. However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.

In particular we’ll discuss the following questions:

  • What makes decentralized identity different from alternative approaches?
  • What are its unique challenges and strengths?
  • What are key features of a decentralized identity ecosystem?
  • Where is there variety and similarity in approaches to decentralized identity?
  • How does Hyperledger Indy tackle the decentralized identity landscape?
On Demand

Decentralized identity is exploding as a topic. It can be hard to make sense of all the initiatives and technologies. However, a few deep themes are emerging as foundational elements, no matter which details are true of your favorite approach. This webinar will distill the topic down to certain fundamentals, show how they manifest differently in various approaches, and discuss where the community is likely to coalesce or diverge.

In particular we’ll discuss the following questions:

  • What makes decentralized identity different from alternative approaches?
  • What are its unique challenges and strengths?
  • What are key features of a decentralized identity ecosystem?
  • Where is there variety and similarity in approaches to decentralized identity?
  • How does Hyperledger Indy tackle the decentralized identity landscape?
On Demand

By now your company has (hopefully!) prepared for the GDPR, the EU’s General Data Protection Regulation. Rather than speak broadly about all aspects of general compliance with the GDPR, this webinar will instead look at specific ways that we see the GDPR interacting with open source development models and with new technologies.

In this session we will discuss how the GDPR relates to:

  • Source code management systems in open source projects
  • Blockchain and distributed ledgers
  • Data collaboration communities
  • Artificial intelligence and machine learning
On Demand

By now your company has (hopefully!) prepared for the GDPR, the EU’s General Data Protection Regulation. Rather than speak broadly about all aspects of general compliance with the GDPR, this webinar will instead look at specific ways that we see the GDPR interacting with open source development models and with new technologies.

In this session we will discuss how the GDPR relates to:

  • Source code management systems in open source projects
  • Blockchain and distributed ledgers
  • Data collaboration communities
  • Artificial intelligence and machine learning
On Demand
On Demand

Blockchain, the distributed ledger technology (DLT) underlying bitcoin, is far more valuable than the currency it supports. As enterprises start to put distributed ledger technology into practice, it’s important to understand the security implications. We’ll look at public vs. private blockchains and lessons learned for enterprises moving to DLTs. We will walk through real life deployments of Blockchain solutions and discuss how Blockchain can both enhance security but also when built into traditional solutions requires traditional security measures. This talk will leave you with understanding how Blockchain does, and does not, change the security requirements for your enterprise. Then we’ll talk about Hyperledger’s new Bug Bounty program. Join us!

On Demand

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and education barriers to secure communication over the Internet. Since its launch in December, 2015, Let’s Encrypt has issued over 200 million certificates for more than 65 million websites. For more information or to offer your support, visit www.letsencrypt.org.

You’ll learn:

  • Why you should switch to HTTPS now
  • How Let’s Encrypt works
  • Why Let’s Encrypt is different
On Demand

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and education barriers to secure communication over the Internet. Since its launch in December, 2015, Let’s Encrypt has issued over 200 million certificates for more than 65 million websites. For more information or to offer your support, visit www.letsencrypt.org.

You’ll learn:

  • Why you should switch to HTTPS now
  • How Let’s Encrypt works
  • Why Let’s Encrypt is different
On Demand

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and education barriers to secure communication over the Internet. Since its launch in December, 2015, Let’s Encrypt has issued over 200 million certificates for more than 65 million websites. For more information or to offer your support, visit www.letsencrypt.org.

You’ll learn:

  • Why you should switch to HTTPS now
  • How Let’s Encrypt works
  • Why Let’s Encrypt is different
On Demand

Many people find the Linux kernel an overwhelming place, and don't know where to start. This seminar will introduce Linux kernel modules and the kernel Kbuild system. The Linux Kernel Kbuild system allow you to build both the Linux kernel and out-of-tree modules. It has also been copied into most other major Embedded projects in order to handle the configuration of features in their own code.

On Demand

Many people find the Linux kernel an overwhelming place, and don't know where to start. This seminar will introduce Linux kernel modules and the kernel Kbuild system. The Linux Kernel Kbuild system allow you to build both the Linux kernel and out-of-tree modules. It has also been copied into most other major Embedded projects in order to handle the configuration of features in their own code.

On Demand

Many people find the Linux kernel an overwhelming place, and don't know where to start. This seminar will introduce Linux kernel modules and the kernel Kbuild system. The Linux Kernel Kbuild system allow you to build both the Linux kernel and out-of-tree modules. It has also been copied into most other major Embedded projects in order to handle the configuration of features in their own code.

On Demand

Deploying a multi-component system like Hyperledger Fabric to production is challenging. In this webinar we lower the threshold by showing how to deploy Hyperledger Fabric onto Kubernetes through the usage of Helm Charts. Rather than using a monolithic Helm Chart for the whole deployment, we provide separate charts for each Hyperledger Fabric component, namely the Certificate Authority, Peer, CouchDB and Orderer. We demonstrate how to enable these charts to work together to provide a working blockchain system.

On Demand

Deploying a multi-component system like Hyperledger Fabric to production is challenging. In this webinar we lower the threshold by showing how to deploy Hyperledger Fabric onto Kubernetes through the usage of Helm Charts. Rather than using a monolithic Helm Chart for the whole deployment, we provide separate charts for each Hyperledger Fabric component, namely the Certificate Authority, Peer, CouchDB and Orderer. We demonstrate how to enable these charts to work together to provide a working blockchain system.

On Demand

Deploying a multi-component system like Hyperledger Fabric to production is challenging. In this webinar we lower the threshold by showing how to deploy Hyperledger Fabric onto Kubernetes through the usage of Helm Charts. Rather than using a monolithic Helm Chart for the whole deployment, we provide separate charts for each Hyperledger Fabric component, namely the Certificate Authority, Peer, CouchDB and Orderer. We demonstrate how to enable these charts to work together to provide a working blockchain system.

On Demand

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and education barriers to secure communication over the Internet. Since its launch in December, 2015, Let’s Encrypt has issued over 200 million certificates for more than 65 million websites. For more information or to offer your support, visit www.letsencrypt.org.

You’ll learn:

  • Why you should switch to HTTPS now
  • How Let’s Encrypt works
  • Why Let’s Encrypt is different
On Demand
On Demand

Come learn how ScanTrust, a smart-packaging company, set out to deliver end-to-end traceability for their ethical trade client, Cambio Coffee using Hyperledger Sawtooth. Join Tobias Kars, VP of Product and Blockchain Services at ScanTrust, for this exciting session that will explore how ScanTrust approached the challenge, why they chose to develop with Hyperledger Sawtooth, and the lessons they learned along the way.

You’ll learn:

  • How ScanTrust integrated Hyperledger Sawtooth with their smart packaging platform 
  • Tips and tricks about building on Hyperledger Sawtooth
  • Factors to consider while assessing a blockchain platform
On Demand

Come learn how ScanTrust, a smart-packaging company, set out to deliver end-to-end traceability for their ethical trade client, Cambio Coffee using Hyperledger Sawtooth. Join Tobias Kars, VP of Product and Blockchain Services at ScanTrust, for this exciting session that will explore how ScanTrust approached the challenge, why they chose to develop with Hyperledger Sawtooth, and the lessons they learned along the way.

You’ll learn:

  • How ScanTrust integrated Hyperledger Sawtooth with their smart packaging platform 
  • Tips and tricks about building on Hyperledger Sawtooth
  • Factors to consider while assessing a blockchain platform
On Demand

Come learn how ScanTrust, a smart-packaging company, set out to deliver end-to-end traceability for their ethical trade client, Cambio Coffee using Hyperledger Sawtooth. Join Tobias Kars, VP of Product and Blockchain Services at ScanTrust, for this exciting session that will explore how ScanTrust approached the challenge, why they chose to develop with Hyperledger Sawtooth, and the lessons they learned along the way.

You’ll learn:

  • How ScanTrust integrated Hyperledger Sawtooth with their smart packaging platform 
  • Tips and tricks about building on Hyperledger Sawtooth
  • Factors to consider while assessing a blockchain platform
On Demand

Financial institutions are sensitive about their data and do not want it available to competitors. The result — they are wary to join any shared blockchain network. We’ve seen this as a sticking point for adoption. MonetaGo convinced competitive finance receivables exchanges to join a Fraud Mitigation Network based on Hyperledger Fabric to eliminate instances of double financing without sharing specific elements of any invoice. MonetaGo CEO Jesse Chenard will walk through achieving the competitors’ buy-in process for this blockchain network now used in production. In this webinar, attendees will learn tricks and tips from direct field experience about how to get buy-in from various (often competing) parties to join a permissioned blockchain network for their mutual benefit while addressing their concerns from a technology standpoint.

On Demand

Financial institutions are sensitive about their data and do not want it available to competitors. The result — they are wary to join any shared blockchain network. We’ve seen this as a sticking point for adoption. MonetaGo convinced competitive finance receivables exchanges to join a Fraud Mitigation Network based on Hyperledger Fabric to eliminate instances of double financing without sharing specific elements of any invoice. MonetaGo CEO Jesse Chenard will walk through achieving the competitors’ buy-in process for this blockchain network now used in production. In this webinar, attendees will learn tricks and tips from direct field experience about how to get buy-in from various (often competing) parties to join a permissioned blockchain network for their mutual benefit while addressing their concerns from a technology standpoint.

On Demand

Financial institutions are sensitive about their data and do not want it available to competitors. The result — they are wary to join any shared blockchain network. We’ve seen this as a sticking point for adoption. MonetaGo convinced competitive finance receivables exchanges to join a Fraud Mitigation Network based on Hyperledger Fabric to eliminate instances of double financing without sharing specific elements of any invoice. MonetaGo CEO Jesse Chenard will walk through achieving the competitors’ buy-in process for this blockchain network now used in production. In this webinar, attendees will learn tricks and tips from direct field experience about how to get buy-in from various (often competing) parties to join a permissioned blockchain network for their mutual benefit while addressing their concerns from a technology standpoint.