Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation: Fill & Download for Free


Download the form

A Useful Guide to Editing The Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation

Below you can get an idea about how to edit and complete a Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation step by step. Get started now.

  • Push the“Get Form” Button below . Here you would be taken into a splasher making it possible for you to make edits on the document.
  • Choose a tool you want from the toolbar that appears in the dashboard.
  • After editing, double check and press the button Download.
  • Don't hesistate to contact us via [email protected] for any questions.
Get Form

Download the form

The Most Powerful Tool to Edit and Complete The Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation

Edit Your Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation Within seconds

Get Form

Download the form

A Simple Manual to Edit Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation Online

Are you seeking to edit forms online? CocoDoc can help you with its useful PDF toolset. You can make full use of it simply by opening any web brower. The whole process is easy and quick. Check below to find out

  • go to the CocoDoc's online PDF editing page.
  • Upload a document you want to edit by clicking Choose File or simply dragging or dropping.
  • Conduct the desired edits on your document with the toolbar on the top of the dashboard.
  • Download the file once it is finalized .

Steps in Editing Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation on Windows

It's to find a default application capable of making edits to a PDF document. Luckily CocoDoc has come to your rescue. Take a look at the Manual below to find out how to edit PDF on your Windows system.

  • Begin by adding CocoDoc application into your PC.
  • Upload your PDF in the dashboard and make edits on it with the toolbar listed above
  • After double checking, download or save the document.
  • There area also many other methods to edit PDF files, you can go to this post

A Useful Handbook in Editing a Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation on Mac

Thinking about how to edit PDF documents with your Mac? CocoDoc can help.. It enables you to edit documents in multiple ways. Get started now

  • Install CocoDoc onto your Mac device or go to the CocoDoc website with a Mac browser.
  • Select PDF document from your Mac device. You can do so by clicking the tab Choose File, or by dropping or dragging. Edit the PDF document in the new dashboard which includes a full set of PDF tools. Save the file by downloading.

A Complete Manual in Editing Key Responsibilities For Both Parties Are: To Follow All Agreed Upon Implementation on G Suite

Intergating G Suite with PDF services is marvellous progess in technology, with the potential to streamline your PDF editing process, making it faster and more cost-effective. Make use of CocoDoc's G Suite integration now.

Editing PDF on G Suite is as easy as it can be

  • Visit Google WorkPlace Marketplace and find CocoDoc
  • install the CocoDoc add-on into your Google account. Now you are in a good position to edit documents.
  • Select a file desired by pressing the tab Choose File and start editing.
  • After making all necessary edits, download it into your device.

PDF Editor FAQ

What is contract farming?

In contract farming, a group of farmers and a company develop a mutually agreeable contract to undertake a farming enterprise. In the contract, the type of commitment, responsibilities, and sharing of rewards and risks are clearly discussed, agreed upon and specified. Developing the trust between the company and the farmer contractors is critical for success in contract farming. Each party must honor its commitments for the smooth operation and management of the relationship. Developing the trust takes time and efforts by both parties. Continuous flow of significant benefits from the venture to both parties will strengthen the relationship and trust among them.Contract farming provides better linkage among production, processing, and marketing, and all actors in the value chain—farmers, retailers, custom hire machine operators, retailers, traders, processing companies, and bankers—are key stakeholders. Banks provide credit to support and facilitate the win-win contract farming arrangement between farmers and companies. Some companies may share a part of their profit with farmer contractors to enhance trust, participation and sustainability in contract farming.For the purpose of contract farming, farmers in any country can be grouped into four categories based on their holding size, commercial orientation to farming, influence in local community and in political circles, and exposure to knowledge and technologies (Table 1). We need to develop different types of contract farming with different groups to enhance the synergy of operation and management and to minimize risks to both parties. The different types of contract farming are:1. Joint venture contract farming with very large commercial farmers (holding size more than 1000 ha each).2. Facilitating professional management for groups of large rice farmers.3. Facilitating knowledge sharing, credit, and sale of seed and critical inputs to small-scale and medium farmers.1. Joint venture contract farming with very large commercial farmers (holding size more than 50 ha each).In this case, a joint venture is developed between a company and the very large commercial farmers on individual or group basis, specifying the equity holding of each party. The farmers will be a part of the management committee of the joint venture. The equity holding for the contract farmer comes through provision of developed land with good water supplies for irrigation and labor needed for cultivating the crops. Major management decisions are jointly discussed and finalized by the company and the farmers well in advance of the cropping season. Farmers are responsible for all field operations and day-to-day decisions in managing the crops, while the company provides training and technical support, mechanization support for all operations, procurement and supply of good seed and other critical inputs (fertilizers, herbicides, and pesticides), and management of all post-harvest processing, packaging and marketing of the produce and byproducts. Suggested responsibilities of each party are shown in Table 2.In joint venture contract farming, farmers gain through improved and mechanized farming and increased yields from their farms. Farmers also get timely supply of good seed and critical inputs. The company secures assured supply of good quality paddy for processing and marketing. The profits of the joint venture are shared between the two parties as per the equity holding. Since both parties have large stakes in the running of the joint venture, the likelihood of success is high.2. Facilitating professional management for groups of large farmers.The second type of contract farming involves providing professional management to groups of large farmers with holding sizes of 11 to < 50 ha each. Large farmers can be encouraged to form themselves into groups (20 to 50 farmers per group). The company can develop a contract with each farmer group defining the roles and responsibilities of each party. Farmers provide land, labor, and some capital, and farm under the guidance of a trained extension specialist appointed by the company. The extension specialist will train the farmers, organize all inputs on credit or for cash, supervise all farm operations to ensure proper application of inputs and management of crops and to maintain product quality, and arrange the procurement of produce at agreed price. Roles and responsibilities large farmer groups and the private sector company are shown in Table 3. Thus, farmers have to follow strict guidelines in farming and maintain product quality as per the agreement. The credit given to farmers is recovered during the time of procurement. Some companies pay the contract price or the market price, whichever is higher at the time of procurement to build up the long-term relationship with their farmer contractors.3. Facilitating knowledge sharing, credit, and sale of seed and other critical inputs to medium and small-scale farmers.The third type of contract farming involves thousands of medium and small-scale farmers with farm holdings of < 10 ha each. The company can train trainers to develop trained public or NGO extension staff who in turn train farmers and provide technical support to them. The company can adopt 2-3 villages in selected locations to provide focused technical assistance to farmers through company-trained public or NGO extension staff. In the adopted villages, the company can work with retailers to assure timely supply of good quality seed and other inputs to farmers; train and work with local entrepreneurs to develop village-level machinery pools for custom hiring of farm machines and mechanized farm operations; train on quality standards and work with local commodity traders for procurement of the produce for the company; work with banks, educate them about the company’s support to improved farming in adopted villages, and encourage them to lend money to farmers in those villages; and liaise with local politicians and educate them on the company’s activities in supporting farmers in modern farming in their constituencies. Data in Table 4 show the roles and responsibilities of different stakeholders in the commodity value chain to support small farmers in improved farming. These initiatives will spread the risks among different stakeholders in the commodity value chain, and empower them to play their respective roles efficiently and help farmers adopt modern farming technologies. It will be a win-win partnership for all stakeholders because all of them gain from improved farming of a selected crop (e.g., basmati rice, soybean, cotton, sugarcane, etc.): farmers from increased crop yields and higher price for quality grain; retailers from assured supply of quality inputs from the company and enhanced sale to farmers; new employment for rural youth to develop and manage machinery pools and custom-hiring services; traders from enhanced procurement of good quality produce for the company; banks from increased lending to and recovering from trained and professionally supported farmers in adopted villages; and local politicians through enhanced prestige, respect and political power due to development of improved farming in their constituencies. The company will get adequate quantities of good quality produce for processing and also market their own good seed and other farm inputs such as fertilizers, pesticides and herbicides plus farm machines and implements for developing machinery pools. This will be one possible way to reach out to thousands of farmers in selected adopted villages.Private sector can play huge role in contract farming. Contract farming will solve the problems like quality of inputs, farms can be fully mechanized, crop monitoring on a regular basis, better technical advise free of cost at farmers’ doorsteps, assured upfront price and market outlet at their produce. Examples of contract farming corporates are: Mysore SNC Oil Company, Sami Labs, Ion Exchange (Enviro Farms), United Breweries, Satnam Overseas (Basamati rice), Amrtita Feeds, PepsiCo, Punjab Agro Foods, Apache Cotton Company, Mahindra and Mahindra, Cadbury, Godrej, ACE Agrotech, L&T, Hafed, BEC Co, Reliance Group, Fritto Lay India, etc.

How can Turkey make up a maritime border with Libya as if the Greek island of Crete was invisible?

I have partially answered inGeorges Gritsis's answer to Turkey sent its accord with Libya on a maritime boundary between the two countries to the United Nations for approval, despite objections from Greece that the agreement violates international law. What is your opinion on it?But obviously need to go in a little more detail.First some background:The current Greek and Turkish borders were settled by the 1923 Lausanne and 1947 Paris Treaties. In effect, all islands -except Gökçeada & Bozcaada which were given to Turkey and Megisti which was given to Greece- further than 3 Nautical Miles (5 km) from the Anatolian coastline belonged to Greece.Both countries were satisfied by the arrangement till 1973 when oil was discovered in the straits between the island of Thassos and the Greek mainland.How were they satisfied? Neither side laid any claims on the the sovereign areas agreed by the Lausanne and Paris Treaties. Indeed when called by the UN in 1953 to determine their areas of sovereignty for implementing their air space control, both parties agreed.The Turkish Republic provided the UN its maps such as this one:Hence the following boundaries were agreed between Turkey and Greece and implemented:A few years after the discovery of the Prinos oil field between Thassos and the Greek mainland, the UN Convention on the Law of the Sea regulating usage of sea areas beyond the 12 NM territorial waters was agreed upon in 1982, signed and ratified by 167 nations and entered into force on 16 November 1994 upon deposition of the 60th instrument of ratification.When signatories couldn’t bilaterally agree on their maritime boundaries the UN’s International Court of Justice would issue a ruling on the matter.What does UNCLOS states about boundaries between neighboring countries: use the median lineThe island’s importance depends on its location and size.Ref PREAMBLE TO THE UNITED NATIONS CONVENTION ON THE LAW OF THE SEAUNCLOS Article121 Regime of islands1. An island is a naturally formed area of land, surrounded by water, which is above water at high tide.2. Except as provided for in paragraph 3, the territorial sea, the contiguous zone, the exclusive economic zone and the continental shelf of an island are determined in accordance with the provisions of this Convention applicable to other land territory.3. Rocks which cannot sustain human habitation or economic life of their own shall have no exclusive economic zone or continental shelf.Examples of boundariesThe South West Baltic was divided after a special settlement between Sweden, Germany and Denmark, because of the latter’s islands:In the North sea:In the North Atlantic and western Mediterranean:In the Central Mediterranean, where a 1988 ICJ ruling apportioned a section of Libya’s and Italy’s EEZ to the Maltese Republic:The USA which were instrumental in drafting the Convention, signed it but the US Senate didn’t reach the 2/3 majority for ratification as it considered the provisions included in Part XI of the Convention, concerning international cooperation, management and technology sharing in deep sea bed mining beyond the 200 NM Exclusive Economic Zone, contrary to US interests. Nevertheless the USA now recognizes the UNCLOS as a codification of customary International Law.6 nations with access to the sea have neither signed nor ratified the Convention, usually because of maritime boundary disputes with their neighbors: Peru, Venezuela, Eritrea, Syria, Israel and Turkey.Although Turkey’s borders are all the result of international Treaties and thus has no disputed borders with its neighbors, Turkish governments in a general revisionist attitude of their Kemalist heritage have started disputing Greece’s sovereignty over the Aegean islands since 1982, when then Turkish president Suleyman Demirel claimed that 132 Greek islands belonged to Turkey.It is obvious that geography has dealt a bad hand to Turkey by not including within its borders areas containing hydrocarbon. It is very unfortunate, so the temptation of denying those borders is great.The current Turkish president with its Neo Ottomanist fantasy wants to see the Lausanne treaty scrapped, not only in respect to Turkey’s borders with Greece but also with Syria and Iraq. There’s a particular twist in these claims as President Erdogan’s family is closely involved in the hydrocarbon trade. His friend and Ankara’s mayor made the following statement:Greece’s position since 1976 has been to defer the issue of determining its maritime boundaries with Turkey to the UN International Court of Justice, as both nations had decided in their 1932 Ankara Agreement to defer to International arbitration any disputes arising from their common treaties.Hence in order to alleviate Ankara’s justified claims that its ships needed free access to International Waters and in order settle differences, a Turkish Greek panel of jurists worked on the following solution:Unfortunately successive Turkish governments have neither accepted UNCLOS nor the ICJ’s jurisdiction, claiming the issue could only be settled bilaterally.Hence, apart from disputing Greece’s sovereignty on the Aegean islands, Turkish governments contend that islands are not entitled to any EEZ, while controversially pretending abiding to Internationally Law.While Libya has signed UNCLOS and has twice in the past referred to the ICJ to settle its maritime boundaries with Tunisia and Malta, the embattled Tripoli government who depends on Ankara for its existence has agreed with the Turkish government to a new delimitation, ignoring previous arrangements with Greece as well the island of Crete’s right to an EEZ.It is obvious that the Al Sarraj government is as incapable of controlling Tripoli’s suburbs as its maritime jurisdiction, particularly since the equally UN recognized Libyan Parliament opposes decisions taken in Tripoli. So the latest Tripoli - Ankara agreement basically amounts to a unilateral decision taken by the Turkish president.What are the Turkish government motivations behind this latest move?Below an article by Dr Theodoros Tsakiris an associate professor of geopolitics at the University of Nicosia. Some points are debatable, it however highlights the issue quite well.The motivations behind Turkey’s behavior, THEODOROS TSAKIRIS | Kathimerini“ The unprecedented challenge that the deal between Turkey and Fayez al-Sarraj’s Libyan government poses to Greece has resulted in a renewed effort to understand Turkish motivations from three different angles.The first is the economic approach and sees Turkish actions as an attempt to acquire access to hydrocarbon deposits. Put in simplistic terms, we could sum up this argument as “all wars are about oil,” and it would therefore follow that a distribution of these resources would avert conflict.The manner in which this conversation is framed in Greece tends to excite fantasies of billions of barrels of oil that would erase the public debt almost overnight. It makes sense, then, for Turkey to want a share of this energy “treasure;” therefore, if we manage to give it a piece of the pie through bilateral negotiations, it will leave us alone.Champions of this “win-win” approach see it as a negotiable option. This, however, is not the case for two basic reasons:a) If under the threat of violence you agree to share resources with the person making the threat over something he does not own, then why should he respect the win that was only allowed by his magnanimity? He will use the same blackmailing tactic, at a time of his own choosing, to take your half, the piece you had not ceded to begin with. He will leave you with the illusion of a viable compromise that may buy you some peace of mind for a few years, but ultimately all that he will have left you is the indignity of the person who shoots himself with his own gun when others are threatening to kill him. This is how the Czechoslovakians must have felt a year after the Munich Agreement with Hitler in 1938.b) The area outlined by Turkish demands along the Greek continental shelf between Kastellorizo, Rhodes and Lasithi on Crete is the most unexplored in terms of seismic research in Europe. There has been no exploratory drilling whatsoever, which makes sense as seismographic data has not been collected for decades there, because no one has considered this area to be of any interest. No one is conspiring to hide something because no one knows what this area could contain in terms of hydrocarbons. Therefore, Turkey’s aggression cannot be explained as being motivated by energy interests when the assets at stake are unknown.The second approach is centered on the law and has a tendency of treating Turkish aggression like a courtroom simulation. International law forms the cornerstone of Greece’s foreign policy. However, if we do not have the deterrent power to defend it, we cannot protect ourselves just by invoking it for the simple reason that compliance with international law is not automatic.The fact that the Erdogan-Al Sarraj agreement is invalid, illegal and irrational does not mean that it doesn’t entail the risk of political faits accomplis. These can be averted not just by legal arguments but mainly through our airborne deterrent strength, which would render our legal arguments much more effective. Meanwhile, our powerful alliances may be multiplying, but they are no substitute for either of the two aforementioned factors of national force. The stance of France, Egypt and Israel will be key here.This law-centric approach calls for immediate recourse to the International Court of Justice at The Hague via an arbitration agreement and the restarting of exploratory talks in order to achieve this arbitration agreement. It fails, though, to answer a series of questions that render this option impractical, such as:- Why would Turkey accept an arbitration agreement which it has stubbornly refused to sign since 1976, especially when the balance of power is clearly more in its favor than it was in 1976 or 1987?- Why should exploratory talks lead to an agreement now when they’ve failed to do so for the past 20 years, during which time they were a simulation of negotiations?- Will we seek a package solution for the Aegean and the Southeastern Mediterranean or will we ask for a decision only on our differences with Turkey in the Southeastern Mediterranean, where, however, we have yet to determine the external boundaries of the Greek continental shelf – which is in fact the basis of our line of negotiation – as we have done in the Ionian and Libyan seas since 2011?- With which exact measurement of territorial waters will we go to The Hague? Will we try to win Turkey over to the idea of legal recourse by accepting – as the government of Costas Simitis did in 2002-04 – that Greece’s territorial waters are less than 6 nautical miles in parts of the Aegean?- Could Turkey view the intention to embark on negotiations as a sign of weakness and move ahead with implementing the Sarraj accord by sending seismic research vessels into the disputed area?The third approach, that of Thucydidean Realism, sees Turkish aggression as stemming from an imbalance in the bilateral balance of power. Observing the actions of Recep Tayyip Erdogan, Thucydides would not recommend that Greece should take immediate recourse to The Hague.He would note that Libya lies too far away for the Turkish Armed Forces and that Turkey not only has no response to the Greek Mirage jets but has the same type of F-16s as Greece, though manned by inferior crews following the purge in the wake of the 2016 coup attempt. He would remind us that Greece has a superior submarine fleet to that of Turkey, and that these vessels have clear tactical advantages in the Southeastern Mediterranean theater due to the proximity of Greek harbors.He would advise us to form a common front with Egypt, Saudi Arabia, the United Arab Emirates and the majority of the Arab League states that would recognize a future elected Libyan government, with which we would sign our own exclusive economic zone agreement.Lastly, he would recommend that we deepen the defense and intensify the energy parameters of our cooperation agreements with Cyprus, Egypt and Israel, delineating the external borders of our continental shelf in the Southeastern Mediterranean up to the point where Cyprus’ delineation begins and then – after agreeing on an EEZ delimitation with Egypt – take recourse to The Hague, inviting Turkey to do the same.”So where do we go from there?From Greek editorialist A. PapachelasTough dilemmas in Greek-Turkish affairs, Alexis Papachelas | KathimeriniTurkey’s claims in the Aegean were first brought to the table in 1973, following the discovery of the Prinos oil field. They have escalated ever since, reaching successive peaks over 10 to 15 years and multiplying. The notorious question of “grey zones,” for example, first emerged in the 1990s.I still remember an interview with Emre Gonensay, Turkey’s foreign minister for a few months in 1996, in which I asked him what issues needed to be on the agenda of bilateral talks. He listed them without making any mention of grey zones. Then a diplomat sitting behind me held up a piece of paper; Gonensay immediately added: “I mustn’t forget the grey zones of course.” It was clear that one more issue had been added to the negotiations scale. Many at the time believed that it was simply a negotiating card that the Turks would later withdraw; they were wrong.Talks with Turkey may have been easier back when Recep Tayyip Erdogan was powerful, but he had not adopted the nationalist agenda or fallen hostage to the deep state. The balance of power between the two countries was even and Turkey’s European prospects were alive.The dilemmas we face today are both more numerous and tougher. Greece’s political leadership appears keen to take recourse to The Hague. It will take both parties to get there and, most importantly, they will have to agree on what is at stake. The situation has changed. Turkey insists on de-linking negotiations regarding the Aegean with those regarding the Eastern Mediterranean. It obviously plans to bring up the issue of grey zones in the Aegean and ask the court to rule on the sovereignty of certain small islands and islets. We do not know whether it will also choose to bring up the demilitarization of certain islands or even whether it will agree to certain formulaic solutions that had been agreed upon in the past.It will take time and lengthy negotiations for us to achieve any tangible results in talks that need to address a lot of very thorny issues. The next few weeks ought to reveal whether Ergodan really does want to seek a solution at the International Court of Justice or whether he will choose the path of strong-arm tactics. Until we have a bit more clarity on this point, Athens would be advised to play its cards close to its chest.

What is a blockchain?

A blockchain, or distributed ledger, is mostly known for the first technology it enabled, the Bitcoin, which Satoshi Nakamoto first described in a paper in 2008.I will try to provide a general overview of the technology and its potential, from both practical and technical perspectives, which you should be able to understand without any previous knowledge on the blockchain.Today, cryptocurrencies in circulation alone have a market capitalisation of well over ten billion dollars and new start-ups relying on the blockchain are funded every day, fulfilling the thirst of venture capitalists for the technology. What blockchain promises to solve is a long-standing computer science issue discussed since the early 1970’s and generalised in 1982 as the Byzantine Generals’ Problem which essentially asks how multiple cooperating parties can reach common knowledge about a factual element when there exists some malicious actors actively trying to spread incorrect information and who have a certain likelihood of intercepting and altering every direct communication between individuals. Until now, this problem would usually be addressed by relying on a trusted central authority, but for the first time, blockchain allows any such consensus to be reached without having to place trust in any single entity. Much has been written on the societal changes blockchain will bring, the challenges governments will need to address or even how a new body of law, Lex Cryptographia, will be needed to adjust to this new paradigm.Technical OverviewBlockchain’s solution to the Byzantine Generals’ Problem is to impose to every actor who wants to share some information to also solve a very complex mathematical puzzle (called block) that proves a large amount of work has been invested. Thanks to complex mathematical properties, it is possible to design problems that are hard to compute, but easy to verify; this is actually the reverse of the popular concept of asymmetric keys encryption in the field of cryptography, which powers most modern secured communication protocols and in which we want to generate puzzles that are easy to compute (creating the key) but hard to verify (cracking the key). Each block contains a hash (a string of characters), that has to refer cryptographically to the hash of the previous block (to guarantee the chronological order). Together, this serie of blocks, up to the genesis block (the only block hardcoded into the blockchain’s core script), form the blockchain. The computational difficulty of generating a valid block mostly stems from the randomness of the process of finding a new hash that will correctly connect to the hash of the previous block.A copy of the blockchain database (of about 80 gigabytes today for the Bitcoin blockchain, but continuously growing as more blocks are appended) as well as the core script that contains the rules of what should be considered a valid blockchain are stored on every computer (called full node) that is willing to be part of the network. In addition to the hash, each block stores a large amount of information (called transactions). Anyone who wants to get information stored in the database can do so by querying from any node of the network; if some nodes disagree on what should be the correct state of the blockchain, one will always trust the longest valid blockchain (i.e. the full node that can prove his version of the blockchain required more computational effort than all the other existing versions), which honest nodes will actively be searching for to replace their own version of the chain. It is also possible that multiple blockchain temporarily have the same length, in which case one has to wait until further blocks are added to be able to distinguish which version of the blockchain one should trust. As a general rule, the older a block is in the chain, the more trustworthy it is, because an attacker would have to start and re-create a much larger fraction of the blockchain to replace it.Most individuals who want to add some transactions into the blockchain do not have the computing power or the time necessary to find a valid block. In that case, they will add their transaction into a pool of unconfirmed transactions that are waiting for a professional block generator (called a miner) to find a block for them. When a miner finds a valid block, which is a really rare event, he will include in it as many transactions as the block allows for (currently one megabyte for the bitcoin blockchain) and broadcast it to all the full nodes of the blockchain, that will append the block to the chain after having checked its validity. In most blockchains, when a miner successfully adds a block to the chain, he receives a reward from the system as well a fee perceived from the individuals whose transaction has been included (optional, normally only included when there is a congestion of unconfirmed transactions, to help miners prioritise which transaction to include first).The underlying assumption of the process is that the total effort invested by honest miners is greater than the total effort invested by those with malicious intents. By effort, one should understand money, since computational difficulty directly relates to electricity and hardware costs. Each individual involved in the process owns a public and a private key. Your public key identifies you and can be used by anyone to see what contributions you have made to the blockchain (e.g. how much money you possess in the case of a cryptocurrency blockchain). Using your private key, you can generate transactions that are cryptographically guaranteed to originate from you. By this process, even if a malicious actor were to control a majority of the blockchain’s computing power, its power, through what is called a 51% attack, would be limited to cancelling recent transactions and blocking new transactions from occurring; stealing money from other accounts is impossible without knowing the private key of the targeted individuals. That way, by limiting the incentives for malicious actors to harm the system and creating strong rewards for people to reinforce the system, we make the blockchain an extremely reliable decentralised ledger. So far, no such attack has ever been successful.Modern uses & potentialThe blockchain can be used in a large variety of applications. As of today however, the most widespread use of blockchains remains limited to cryptocurrencies, or more famously the bitcoin. It is only recently, with the introduction of the Ethereum network in July 2015, two years after being described in a white paper by Vitalik Buterin in 2013, that serious alternatives were made possible. The main innovation of the Ethereum was to introduce a Turing-complete programming language that supports all basic operations necessary to implement any algorithm, allowing to manipulate the Ethereum blockchain easily. These new kind of applications, powered by the Ethereum or similar blockchains, are what I will call the modern uses of the blockchain, as opposed to the traditional usage generally limited to digital currencies. In general, most of the value of the blockchain can be summarised in getting rid of the intermediaries, whether they are banks, lawyers or any entity, thus dramatically reducing agency and coordination costs.Digital currencies and payment systems. While traditionally done through the Bitcoin network, payment systems will probably remain the main use of the blockchain for a few more years. With the introduction of better blockchains such as the Ethereum (which also supports payment systems), distributed digital payments are increasingly made easier, faster and cheaper. Through the blockchain, businesses could get rid of transaction fees, which often consume a large fraction of the margins in the retail industry, and automate payments without depending on banks. Such payment systems would be especially valuable in developing markets or countries with unstable currenciesOnline Privacy. Today, a factor that slows down technology adoption for many individuals, corporations or governments is privacy concerns and the fear of handing out too much control to other entities. But the blockchain would allow everybody to take advantage of new technologies, such as cloud storage of personal biometric information, while maintaining complete control over their data, even from governments, due to cryptographic encryption. This would be of great value for example for corporations who focus on selling hardware or services, such as Walmart or even Apple, but of lesser value to corporations whose value creation reside in owning data, such as Google and Facebook.Smart contracts. They can be considered as the building block of modern blockchain applications. Smart contracts are self-executing agreements written in code instead of words and enforced by the blockchain instead of courts. Blockchains that support external scripting, such as Ethereum, generally make the implementation of such contracts very easy with only a few lines of code.Most traditional contracts could potentially be partially or fully implemented in a smart contract. The more objective the evaluation of the outcome is, the easier it is to draft such a contract. A classic example would be an online advertising agency selling search engine optimisation services, with the promise that the client’s website will appear on the first page of a specified search engine for a given keyword within 30 days. Such services generally appear very suspicious because they are often provided on the web by unknown companies based in a foreign country, but an example implementation of such a contract only requires a few rules:- Start contract when both parties have sent agreed bitcoin amount to account managed by the smart contract (stored in the blockchain). If no amount is received within 7 days, cancel contract and send back all money received.- After 30 days, check the search engine’s URL that corresponds to the selected keyword. If given website is in the URL’s source code, send all the money of the contract’s account to the agency; otherwise, send it all back to the customer (including the penalty for failed execution).More advanced and larger scale contracts can easily take place, especially in the financial sector where trust plays a central role and allows intermediaries to justify hefty commissions in all trades. A multisignature escrow account, futures contract, any financial derivative or commodity trading with completely eliminated counterparty risk can be implemented just as easily using a similar stratagem; here the trust would be reduced to one agent only: the stock exchange that publicly displays the stock prices on its website, used as the source of truth when the contract triggers the settlement.Smart contracts not only eliminate enforcement costs, they also get rid of ambiguity and make all business dealings instantaneous: if a specified condition is met, the blockchain immediately releases the fund and all other digital assets as specified by the contract.Smart property, also known as colored coins. Pushing the limits even further, the blockchain allows for cryptographically activated assets. Those could be either physical or digital and would take the form of a token; whoever possesses the token, which can be easily exchanged and transferred like any other digital currency, owns the asset. Those assets could be real estate (e.g. a house whose door only opens to people in possession of the token), objects (e.g. diamonds whose transactions are only recognized by governments if sold with a valid token, reducing trafficking and making it easier to verify their authenticity) or intellectual property (e.g. patent ownership that can be traced back to the entity owning the patent’s token, or music royalties that are sent automatically to the owner of the token associated with the rights to the songs).Some of these systems would require full support from the government as it currently manages most of the existing ledgers, e.g. land registries that often require a lengthy and costly administrative procedure to access or to change, often necessitating the services of a notary in case of a sale. But the private sector will play a key role in defining how those evolutions take place and, potentially, whether it can take over some of these functions that used to require the government—a trusted central authority—but can now be handed over to the blockchain.Decentralised name registration. A natural extension to smart property is decentralized name registration: the first individual to add a certain name to the blockchain, if it did not exist already, receives “ownership” of that name. This could be used to manage internet domain names, traditionally a responsibility of registry operators who owned a monopoly on a specific top level domain (e.g. Verisign for the .com). In the case of domain names, the blockchain could require from individuals to pay a yearly fee to maintain ownership, which would be used to cover mining costs or would be sent automatically to the government as a tax.We could further generalise the registration of names to more abstract concepts such as texts, images, videos or even ideas: the first to submit automatically gains ownership of intellectual property.Decentralised autonomous organisations (DAOs). When smart contracts are bundled together, they can sometimes form what is called a Decentralised Autonomous Organisation (DAO). While there is not yet a formally agreed upon definition of the concept, DAOs can be understood as regular organisations except that, instead of following the lead of human managers, they have an automated governance encoded in smart contracts. The most famous implementation of a DAO was the venture capital fund sobrely called The DAO that (despite later issues that led to its shut down) raised over a hundred million USD over a crowdfunding campaign in May 2016. Contrary to traditional funds, shareholders of The DAO do not elect a board to represent them but are directly involved in the operational activities and investment decisions.Wikipedia is a perfect example of organisation that could have benefited from the blockchain. Its organisational structure is really close to that of a DAO, with most of its content being generated by its community and all decisions being made through a democratic process. Yet, without the blockchain, the Wikimedia Foundation had to rely on a few individuals to manage the organisation, such as the executive director, vested with special powers. This creates conflicts of interest, even within a non-profit. A Wikipedia DAO could easily be implemented, thus removing the need for human representatives and making Wikipedia truly neutral and independent.Similarly to smart contracts, not even its creators can control a DAO once deployed in the blockchain (unless special provisions have been written in the initial code). Large networks of DAOs could grow to become artificially intelligent clusters of computer programmes with control over physical assets, similarly to how machine learning neural networks work, bringing us a bit closer to the technological singularity.Costs and risksReduced control. The blockchain is attractive for its unmatched level of security. You can trust it to protect the integrity of your data more than you would trust any bank or government. But it will do so indiscriminately and will not protect you from your own mistakes. Once a smart contract is released into the blockchain, no one can stop it, not even you. If by mistake you forgot to add a clause that indicates where to send the funds back when the contract is cancelled, the money will stay forever lost in the blockchain. Worse, if you design a harmful contract that incentivises illegal behavior (e.g. by automatically remunerating individuals who publish terrorist content) and equip it with large financial resources, neither remorse nor an injunction will be of any effect to stop it.Latency. The blockchain is not as reactive as traditional databases. This is the cost to pay for security: for each block and each transaction we add, the nodes need to run many time-consuming checks that insure they comply with the rules defined by the core script. In addition, many blockchains artificially adjust the level of “difficulty” of the mining to make sure the blockchain doesn’t grow too fast. In the bitcoin for example, a new block is only added about every ten minutes, which is why transactions take a few minutes on average to be confirmed. Recent blockchains such as Ethereum have been able to decrease that delay to about fifteen seconds between each block, but that remains far too slow for real-time applications.Storage costs. One of the fundamental properties of the blockchain is that it has to conserve the full history of the transactions and thus will forever grow over time. In addition, its distributed nature requires thousands of nodes to make copies of the entire blockchain, and to store it on a well connected computer with a high bandwidth. As a result, storage costs are thousands of times higher than any other solution, making it largely impractical at the moment to store more than a few bytes of text, let alone images or videos.Mining costs and risks. Mining represents the majority of the costs in traditional blockchains that rely on a Proof-of-Work (PoW) algorithm, such as the Bitcoin. As explained earlier, the blockchain makes it artificially difficult to create a new block (thus very costly in electricity and hardware) to protect the network from 51% attacks. The drawback is that to provide a decent level of security, indecent amounts of electricity need to be wasted, which is not only expensive but also leaves a terrible environmental footprint. At the current value of the bitcoin, a few million dollars worth of electricity are consumed every day by bitcoin miners alone.The theoretical foundations of PoW incentives stem from game theory: if the rewards for a successful attack are lower than the costs, no rational individual should attempt an attack. As we saw, the rewards for a successful attack are limited as it is impossible to steal money without also knowing the private key of individuals. As for the costs, with PoW they come from two components: the initial investment (to acquire the necessary hardware) and the electricity. The cost of controlling the network will be proportional to the duration of the attack, as the attacker has to keep finding valid blocks faster than the honest nodes to maintain its blockchain longer than the honest blockchain. But with the recent advances in cloud computing, it has become cheap to rent a large CPU capacity for a very short period of time with little upfront investment. In addition, economies of scale and geographic differences in electricity and hardware prices have created strong incentives for miners to pool their resources, making the system more vulnerable.Blockchains can remunerate miners for their effort either by generating new currency or by perceiving a fee on each transaction. The former will create inflation and is thus equivalent to a “wealth tax” (since each coin loses a fraction of its value), whereas the latter is equivalent to a “value added tax” (or “financial transaction tax”); both kinds of taxation have been active topics of research in public policy for a long time and have well-understood advantages and inconvenients. There is also a trade-off between the desired level of security and the cost of running the blockchain, thus incentive levels might have to be adjusted depending on the criticality of the infrastructure.A promising alternative to PoW is Proof-of-Stake (PoS). With PoS, the network is protected as long as honest participants own at least 51% of all the assets at stake. Here, the incentive system has to be built in a way that makes anyone who successfully carries an attack lose as much wealth as possible. Many variations of PoS have been suggested, such as the Casper algorithm —expected to replace PoW in Ethereum soon—, in which individuals can “bet” coins on which block they believe will be added to the blockchain next. In such cases, the only circumstances in which participants will make non-hedgeable losses at betting is if the network is successfully attacked: this very low probability event is similar to a “systematic risk” in finance, and the gains made on successful bets can be compared to the “risk-free” return offered by government bonds. Just as for government bonds, all participants in such a blockchain should invest all their “assets” into the “betting” to gain the “risk-free” return unless they are too risk-averse to agree to increase their exposure to the “systematic risk” (to which they are exposed anyway whether they bet or not).We can actually show that consensus-by-bet PoS can be modelled as a subset of PoW displaying similar mining incentives except that the cost of carrying a successful attack against the network is not proportional to the duration of the attack but roughly constant (since your stake is likely to lose most of its value if you attack the network). This is a desirable property as the social cost of an attack is generally better represented by a fixed value than by a linear function of time. Assuming that most cryptocurrencies owners participate in the betting process, it also makes it easy to raise the cost of an attack to billions of dollars instead of millions. PoW also practically eliminates electricity consumption and, incidentally, makes possible several improvements to raise the speed of the network.Note that if financial instruments allowing speculators to take highly leveraged short positions on the blockchain exist (for example by shorting the stock of companies that have invested heavily in the technology), attackers will start having financial incentives to take the network down.Sybil attacks. Another less discussed vulnerability of the blockchain is its full nodes. If copies of the entire blockchain are not stored on enough computers, attackers can potentially fill the network with clients controlled by them and partially take down the system through what is called a Sybil attack. Malicious nodes are only problematic if they are so prominent that finding honest nodes becomes too time consuming, thus it is required to control much more than half of the network to inflict a generalised failure.Increasing the mining incentives will not necessarily improve the protection against sybil attacks, but a certain number of measures are generally put in place to make these attacks difficult, such as limiting the number of outbound connections per ip address. So far, blockchains have never really lacked of full nodes so research efforts have been concentrated in other areas. If sybil vulnerabilities become critical (for example because hosting full becomes too costly), it might be necessary to provide financial incentives to people running full nodes.Mitigation and recovery. While vulnerability to attacks and to human mistakes are a major weakness of the blockchain, recent events have shown that possibilities of mitigation play a huge role in the credibility of the system, in particular with regards to forking, which can sometimes allow an almost full recovery of lost or stolen funds.In June 2016, a vulnerability in the smart contracts behind The DAO allowed a hacker to steal over fifty million dollars from the fund. While this was not due to a failure of the Ethereum blockchain but only to the bad implementation of The DAO, the losses were of such large scale that they would strongly affect the Ethereum and put its survival at risk if nothing was done. The DAO had become a too big to fail financial institution that Ethereum (the “State” of this microeconomy) had to bail it out. Ethereum’s core developers thus released a patch that would essentially invalidate all the stolen funds, correct the vulnerability and bring back the Ethereum to its state just before the attack.When a communication failure between nodes occurs or when only part of the nodes update their core script, the blockchain may split into two distinct versions. This is what we call a fork. Most of the time, forks are only temporary and disappear once all the nodes are synchronised. But sometimes, they come from a conscious decision from one part of the community to disregard certain changes made in the core blockchain script by the rest of the community. If both parties can rally enough support from stakeholders, both blockchains may subsist, having only in common the blocks history up to the breakup point. This is what happened when the DAO’s bailout patch was released: a significant portion of the community, against the bailout, decided to ignore it and to keep mining the old blockchain, which still exists today as Ethereum Classic, with a market capitalisation of about 10% of that of the patched Ethereum as of September 2016.They now live as competitors. Despite both blockchains’ code being roughly identical, the split allowed both communities to make a strong statement to the world: Ethereum Classic is truly immutable and will not easily tolerate forks in the future, whereas Ethereum is likely to allow them again and even advertises them as a feature, an additional protection against potential attacks. The split could certainly have been avoided if Ethereum had taken a clear stand in favor of forks when it was first created, and businesses relying on a blockchain will have to decide whether they want to favor systems whose community supports voluntary forks or not. While a forking culture improves the mitigation potential, it can also backfire and overly empower core developers or a few individuals that can more easily impose their personal agenda to all the users of the blockchain.Implementation and MonetisationBeyond the hype, businesses realize that integrating such technologies might be just as hard as the transition to Big Data, both to implement and to extract value. Massive injection of funds will not suffice and some business models might prove more compatible than others, at least initially.As decentralisation and getting rid of intermediaries are the main purpose, the blockchain is generally associated with open-source technologies and can appear as an enemy to modern capitalism. However, many successful bitcoin and blockchain startups have shown that the technology can be synergised effectively with paid services; this contrasts strongly with the traditional open-source community—in which users expect an integrally free service—in part because people are already expecting to pay fees due to mining costs necessary to guarantee the reliability of the blockchain. Consulting advice on blockchain can also be offered for governments or organisations that want to leverage the potential of blockchain, and IT consulting firms will quickly need to develop an expertise in that area to respond to the demand. Similarly, companies offering cloud computing services can include Blockchain-as-a-Service (BaaS) into their offering. Universities will also observe a growing interest for both introductory and advanced blockchain courses in their computer science, economics and business degrees.Firms can also use blockchains to externalise data sensitive components of their applications to decrease their compliance costs and risks of legal liability. If the company does not control the blockchain and only has ownership of the front-end built on top of it, it can only be sued for building the system, not for what becomes of it. This would add a layer of protection for companies operating in an uncertain legal environment. Most of all however, the value of the blockchain for organisations resides in its ability to streamline processes and improve vertical integration of the value-chain by getting rid of costly intermediaries and by simplifying coordination. This will be especially valuable for very fragmented industries that rely heavily on external partners or for companies that trade in a market with a generally low level of trust or high level of uncertainty, such as in many developing countries.As for many modern technologies, the early business adopters will probably be start-ups, which can absorb a larger amount of risk and whose dynamism allows for better capacities to adapt to the fast-changing environment of blockchain. Businesses that will be the most at risk are those whose purpose is already to decrease coordination costs, such as banks and law firms, but are also the ones that have the most to gain by adapting. Lawyers for example could expand their services to include smart contracts drafting and bankers could design complex financial instruments living in the blockchain, offering a lot of transparency but requiring the competence of qualified financial advisors to be used appropriately.While the blockchain presents significant opportunities for economic growth, it might often represent more of a threat for individual companies than an opportunity. It will decrease the overall need for both the private and public sectors, in favor of what we call the “autonomous sector”, a complex (somewhat chaotic) network of intertwined DAOs and smart contracts living in the blockchain, over which no one has control. In such cases, the financial incentive for businesses to understand the technology will be more about how to dodge the threat and adjust the offering to remain competitive than about how to extract value out of it. In particular, key differentiation arguments over which the blockchain might win market share are privacy, security, reliability and independence: if companies can improve their products on these characteristics, they might avoid losing the customers who are the most at risk of switching to the blockchain.Most business uses of blockchain technologies will not require a dedicated blockchain. Use-cases can generally be satisfied easily through smart contracts encoded on networks supporting scripting, such as Ethereum, or by developing applications that rely on existing blockchains, such as a payment systems powered by the Bitcoin.Recently, private blockchains have been suggested as alternatives to public blockchains. Contrary to regular blockchains, private blockchains can only be modified or mined by a pre-approved network of computers, with a reading access potentially also restricted. Adding and approving transactions could for example be limited to a consortium of banks who trust each other to a certain extent, with the requirement that each transaction has to be confirmed by at least a certain percentage of the participants. With private blockchains, as the number of participants is limited and known in advance, PoW or PoS can be replaced by proof-of-membership (to a set of hard-coded authorised public keys). Obviously, such systems lose most of the desirable properties that made the blockchain so innovative in the first place (including proof-of-work itself), but they offer an original approach to partially decentralised consensus with cryptographic auditability.ConclusionMost current implementations of blockchain are unadapted for large-scale solutions. In particular, the Bitcoin community has shown great difficulties to scale and adapt its technologies. The blockchain revolution will not happen overnight, however trends are already emerging—often set by key actors quickly gaining influence—and the Ethereum system is imposing itself as the default option for modern blockchain applications. Further developments should make it highly usable and cost efficient for most business applications.Where business will play the most important role in the initial phase of this technology is in providing expertise for both private and public sectors through consultancy services and executive education, in complementing the current cloud computing offering with Blockchain-as-a-Service, in commercialising front-end applications on top of existing blockchains (e.g. e-wallet on top of the Bitcoin or smart contract drafting on top of Ethereum) for business and consumers and in leveraging private blockchains for internal uses. Blockchain should also be considered as a valid threat and direct competitor by many industries for long-term strategic planning.The blockchain by itself is of limited value, just as internet and most popular programming languages—all open-source technologies—did not benefit most to their inventors but to those who managed to create value on top of them. The key will be to identify the segments of the value chain of each industry for which the market values decentralisation from the segments for which the market values most the quality of the service and to focus on the latter. Today, practical limitations will orient which technologies we should put on a blockchain, but hopefully future developments such as proof-of-stake will make the blockchain just another database system that companies can choose from.Disclaimer: all the opinions stated here are my own and not those of my employer.

Feedbacks from Our Clients

This software definitely have so many functionalities, that makes it almost impossible no use it all. The many options to edit and do whatever you want with the PDF makes this software one of the bests.

Justin Miller