A Contract Service Provider Model for Virtual Assets

Author(s):  
Thomas Hardjono ◽  
Alexander Lipton ◽  
Alex Pentland

With the recent rise in the cost of transactions on blockchain platforms, there is a need to explore other service models that may provide a more predictable cost to customers and end-users. We discuss the Contract Service Provider (CSP) model as a counterpart of the successful Internet Service Provider (ISP) model. Similar to the ISP business model based on peered routing-networks, the CSP business model is based on multiple CSP entities forming a CSP Community or group offering a contract service for specific types of virtual assets. We discuss the contract domain construct which encapsulates well-defined smart contract primitives, policies and contract-ledger. We offer a number of design principles borrowed from the design principles of the Internet architecture.

2005 ◽  
Vol 01 (03) ◽  
pp. 359-369
Author(s):  
IAN FENTY ◽  
ERIC BONABEAU ◽  
JUERGEN BRANKE

In this paper, co-evolution is used to examine the long-term evolution of business models in an industry. Two types of co-evolution are used: synchronous, whereby the entire population of business models is replaced with a new population at each generation, and asynchronous, whereby only one individual is replaced.


2011 ◽  
pp. 218-234
Author(s):  
George Yee

The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the growth of e-commerce on the Internet is the lack of consumer trust in the provider of the e-service (Van Slyke, Belanger, Comunale, 2004). This chapter presents a literature survey of recent contributions to building trust in e-commerce, followed by a description of seven ways for the B2C Internet service provider to build trust in the use of its services among consumers.


Author(s):  
Salim M Zaki

<p>The number of devices connected to the Internet using mobile devices is increasing every day. Charge for mobile data over 3G and 4G networks is high in some countries which pushes users to browse the Internet through text-only service. Facebook proposed free basics service which allows users to browse Facebook for free but without showing images. This research formats the images on web pages in a method that makes images transferred over text-only networks. This allows users with low income or slow connections to surf text service over the internet with images supported. The main objective is to test the free basic service by Facebook and Internet Service Provider over 3G networks additionally proposing an image format for text-only networks. The proposed algorithm converts .png and .jpg images and post them on the Facebook page. The results from the Facebook page show images can be seen over 3G networks with free mode enabled.</p>


2021 ◽  
Vol 3 (3) ◽  
pp. 22-33
Author(s):  
Julian Richards

In this paper, I review some of the discussions about the politics of the internet and relate them to our most recent understanding of rapidly evolving Violent Transnational Social Movements (VTSMs). I frame the analysis in terms of the key actors involved in shaping and governing the internet, organised as a triumvirate of citizen, state and internet service provider (ISP). I conclude that the internet may not be as powerful a force in shaping democracy as we may think, although further research and experience of a rapidly evolving situation will be critical. I also suggest that the state has more power to shape the situation to its interests than we might suppose, and this has a major bearing on the formulation of counter-extremism policy and strategy.


Author(s):  
Tommaso Pecorella ◽  
Laura Pierucci ◽  
Francesca Nizzi

A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalling and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and ongoing threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g. the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT devices,,Wi-Fi and Ethernet connections .


Author(s):  
George Yee

The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the growth of e-commerce on the Internet is the lack of consumer trust in the provider of the e-service (Van Slyke, Belanger, Comunale, 2004). This chapter presents a literature survey of recent contributions to building trust in e-commerce, followed by a description of seven ways for the B2C Internet service provider to build trust in the use of its services among consumers.


Author(s):  
Yoga Pangestu ◽  
Didik Setiyadi ◽  
Fata Nidaul Khasanah

Abstract   Communication needs is crucial due to the progress and development of data communication technology that is growing rapidly. In meeting the needs of data communication technology must be wise in choosing an Internet Service Provider (ISP) which we will use. Using two or more ISP can be the solution to meet the needs of the internet at the Office. Load balancing is one of the routing techniques can take advantage of some of the ISP to be used simultaneously or if other ISP backing up each other down or troubled. However, there are a variety of methods that can be used, one of which is the method Per Connection Classifier (PCC). PCC can be used to classify the traffic connection through router mikrotik into several groups. So that the router will remember the path that passed early traffic connections and on subsequent packets that are still associated with the connection will initially passed on the same lines as well. Based on the research results show that the proposed load balancing techniques make the burden of traffic on each ISP or gateway will be in balance so that the bandwidth usage for more efficient and capable of accelerating the network connection the Internet.  In addition the proposed techniques help network connection failover internet connection problems occur in order not to fail or a link down on one of the ISP.   Keywords: Failover, Load Balancing, Per Connection Classifier, Routing   Abstrak   Kebutuhan komunikasi sangat penting seiring dengan kemajuan dan perkembangan teknologi komunikasi data yang semakin berkembang pesat. Dalam memenuhi kebutuhan akan teknologi komunikasi data, administrator jaringan harus bijak dalam memilih Internet Service Provider (ISP) yang akan kita gunakan. Menggunakan dua ISP atau lebih dapat dijadikan solusi untuk memenuhi kebutuhan internet. Load balancing merupakan salah satu teknik routing yang dapat memanfaatkan beberapa ISP untuk dapat digunakan secara bersamaan atau saling membackup jika ISP lainnya down atau bermasalah. Ada berbagai metode yang dapat digunakan, salah satunya adalah metode Per Connection Classifier (PCC). PCC dapat digunakan untuk mengelompokan  trafik koneksi  yang melalui router mikrotik menjadi beberapa kelompok, sehingga router akan mengingat jalur yang dilewati diawal trafik koneksi dan pada  paket-paket selanjutnya  yang  masih  berkaitan  dengan  koneksi awalnya akan dilewatkan pada jalur yang sama juga. Hasil penelitian menunjukkan bahwa teknik load balancing yang diusulkan menjadikan beban traffic pada masing-masing ISP atau gateway seimbang sehingga dalam pemakaian bandwidth lebih efisien dan mampu mempercepat koneksi jaringan internet.  Selain itu diusulkan pula teknik failover yang membantu koneksi jaringan internet agar tidak terjadi koneksi gagal atau link down pada salah satu jalur ISP.   Kata kunci: Failover, Load Balancing, Per Connection Classifier, Routing, Mikrotik


2014 ◽  
Vol 3 (2) ◽  
pp. 157-167 ◽  
Author(s):  
Jashim Uddin Ahmed ◽  
Saad Md. Maroof Hossain ◽  
Mirza M. Ferdous

This case study deals with the organization, business model, challenges and successes of the largest Internet Service Provider (ISP) in Bangladesh. BRACnet is the largest ISP in the country using WiMAX and fibre optics to utilize its licensed spectrum at 3.5 GHz. Based on WiMAX and fibre optics technology, BRACnet serves a diverse client base, including corporations, small and medium enterprises (SMEs) and educational institutions across Bangladesh. To satisfy the connectivity needs of both corporate and individual customers, BRACnet offers a wide variety of service packages to accommodate the needs of its diverse client base. This case study explores the significant corporate and stakeholder aspects of BRACnet and how it is working towards its primary objective that is ‘IT sustainability in Bangladesh’. Finally, the study highlights challenges ahead seeking discussion and solutions.


Sign in / Sign up

Export Citation Format

Share Document