Blockchain Infosys
Blockchain Infosys
BLOCKCHAIN
Understanding the Practical Applications
for Mining
This whitepaper has been written in association with Mining Journal
Technology has transformed the mining One of these is Blockchain. House Rules, which meant the identities
space and it has been a rough ride for a of those contributing must remain
With this in mind, Mining Journal recruited
sector that has a well-earned reputation as anonymous. However, we are able to
a laggard among industries. Mining may a leading global technology consultant, publish the experiences shared and the
have pedigree, with its roots in the Bronze Infosys, to partner in a blockchain broad round-table findings.
Age, but with direction and momentum round table in Toronto in early March.
Like the round table itself, those reading
established over some 5,000 years it also Contributing to the session were a
this report will have a range of experience
has the turning circle of the QEII. But this is mixture of senior executives from juniors
with blockchain and, so, it is worth taking
changing. Though the sector is still far from to genuine majors, with varied levels of
a few moments to establish the basic
agile, it is embracing innovation, largely blockchain understanding and experience.
principles of blockchain technology.
in the form of new technologies. Process
The idea was to establish the level of
automation and Big Data, which many The most celebrated example of
understanding around blockchain and
predicted would be gradually introduced, blockchain technology is Bitcoin. Its
determine the use cases showing the
have arrived with a bang and are now founder, Satoshi Nakamoto, described the
greatest potential for disruption.
verging on common practice for new technology as a “chain of digital signatures”
mines. Other technologies are emerging The session was run over two hours and but, to the layman, blockchain is essentially
with perhaps equally disruptive qualities. participation was based on Chatham a type of database.
1. Transactions entered into the database 2. Entries to the database are secured It could therefore be described as
are copied and distributed to all by encryption and agreed through a far more secure and trustworthy
participating stakeholders on a network consensus mechanisms so the network database, which is shared across network
that have to approve the transaction, flags up false entries, which ‘break participants.
rather than held by a centralized the chain’. The longer the chain of
hub that acts as the regulator. This entries (chain), the more complex the
Faster
Transactions
Improved Permissioned
Compliance & Confidential information shared on need to need
Audits basis, provides enterprise users flexibility
Disintermediated
New Consensus mechanism ensures security and
Business trust by removing intermediaries
Models
Reduced
Costs
Smart Contracts
Reduced Facilitate automated interactions across
Risk functions and processes
Systems Of Intelligence
Consumer Choice
• Machine Learning
• Vision, Speech, Natural Language
Processing
AI Automation Cognitive Knowledge • Knowledge Services Cost Pressure & Resource Constraints
© 2019 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.