Internet value : transfer the original data - (Dingyining)
Don Tascott, known as the father of the digital economy, is a world-renowned new economist and master of business strategy. He has lectured at TED about how the blockchain will change the future of finance, and it will make people feel the subversive and social changes that the blockchain is about to bring. He made it clear that the second generation of the Internet will have the potential to change our money, trade, and society. What is the second generation of the Internet? How to achieve it? Let’s try to analyze the key.
( https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_money_and_business/transcript?language=zh-cn#t-88650)
First, the new generation of value Internet needs to transfer the original of the data assets (original)
In Don Tascott’s speech, a passage about the value of the Internet is mentioned below:
In the past few decades, we have embraced the information age of the Internet. When I send you an email, or a PPT file or something else, I am actually not sending the original file, I am sending a copy of the copy. That’s awesome. This is a democratized information age. But if you are involved in assets, such as financial assets such as money, stocks and claims, shares, intellectual property, music, art, a ballot, carbon credits and other assets, it is a bad idea to send a copy. If I give you $100, it is important that I no longer own the money.
Nakamoto has solved the double-spending problem of digital pass-through by creating bitcoin. Further, the value of the Internet needs to solve the double-spending problem of all digital assets on the Internet.
The so-called value Internet should be hand-delivered with one hand. It is not simply the circulation of Token. More value comes from the transfer of digital assets. Token is just a bookkeeping. Today, many blockchains implement only tokens, and do not involve the execution side of the digital assets behind them. We need to think deeply about the following questions: 1. How to solve piracy in the web 2.0 era? 2. Digital content can be copied indefinitely in the web 2.0 era, and the copied content is exactly the same. How to create scarcity in such an Internet environment? These two questions are not resolved. How do you really achieve “You Own Your Own Data”? For example, to exchange digital assets such as movies and games, can the general blockchain technology realize the safe and scarce circulation of these digital assets? This is a big problem!
Therefore, the new generation of value Internet needs to send the original (original) of the data assets.
Second, the realization of the value of the Internet requirements
First, the data is confirmed and protected. It is a great thing that data can be determined through a self-running blockchain. However, the determination of rights is only the first step. On this basis, data needs to be protected to regulate and punish violations.
Second, the digital data scarcity. To ensure the uniqueness of the value, that is, when the data is transferred from A to B, it needs to disappear from A and then transfer to B. Therefore, the right to blockchain is not guaranteed to transfer value, but also requires an open source, fair and just data logistics system.
What is the just-in-time need for an intelligent economy? A secure, trusted Internet environment is needed that requires digital assets to flow safely and scarcely on the basis of security. How to take advantage of the blockchain combined with the Internet to give consumers more integrity and bring real business value, this is the significance of the blockchain + Internet.
Third, the solution to the cloud project
The reason the blockchain can pass value is because it is a program based on a piece of code that is trusted by both parties. Based on this thinking, to make an anti-piracy version on the Internet, it is necessary to package the produced digital content into an executable code, that is, a small program, and only have the corresponding key to run the program.
This program does not run through third-party applications (because this third-party application can do evil) and can run directly on the operating system. The operating system of the cloud is also a virtual machine operating system. Through the virtual machine technology (a process, that is, the isolation of an address space), it is guaranteed that there is no Internet access, there is no background daemon process, no driver can be installed, and the difficulty of software making evil is greatly improved. Also, the cloud system can turn all the data into programs, remove the software intermediary, and remove the second piracy.
Data is transmitted on the original network, and the use of the cloud system to upload secure and trusted programs on the decentralized network will be a revolutionary change.
The Elastos project is a huge project. It is to build a new generation of Internet from the height of Internet architecture reconstruction. It is not easy to understand this project. In fact, we can think of Elastos Smartweb as a computer. In the cloud architecture, Elastos Hive is a hard drive; IPFS is a public storage of programs and public data; OneDrive, Google Drive and Home NAS are home directories for supporting millions of users’ personal storage; Elastos Carrier is a Smartweb computer The “internal” bus on the motherboard is like the PCI of a PC; the phone is the “dockers” (CPU) of the foreground application or DApp. With such a system architecture, a new generation of Internet can be truly built, and it is possible to truly realize the demand for value Internet.
To build a new generation of Internet can not only rely on the blockchain, but also need a network structure to see the circulation of the pass-through economy. It also builds a trusted Internet by building a decentralized carrier to realize the secure flow of information and value, thereby ensuring the protection of user data and privacy, and building a secure economy. infrastructure.