SlideShare uma empresa Scribd logo
1 de 55
Baixar para ler offline
Towards a
Practice of
Token Engineering
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
Early
iterations
Early iterations:
Flailing
Can we
structure this
better?
Realization: Tokenized Ecosystems
Are a Lot Like Evolutionary Algorithms!
What Tokenized ecosystem Evolutionary Algorithm
Goals Block reward function
E.g. “Maximize hash rate”
Objective function
E.g. “Minimize error”
Measurement
& test
Proof
E.g. “Proof of Work”
Evaluate fitness
E.g. “Simulate circuit”
System agents Miners & token holders (humans)
In a network
Individuals (computer agents)
In a population
System clock Block reward interval Generation
Incentives &
Disincentives
You can’t control human,
Just reward: give tokens
And punish: slash stake
You can’t control individual,
Just reward: reproduce
And punish: kill
We can approach token design
as optimization design.
Optimization Design
Steps in Optimization Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing solver. If needed, try different
problem formulations or solvers.
3. Design new solver?
1. Formulation of an optimization problem
Objectives & constraints in a design space
2. Try an existing solver. Does it converge?
3. Design new solver
Example of a Successful Outcome
Token Design
as Optimization
Design
Steps in Token Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
1. Formulate the Problem
(a) Ask
•Who are my potential stakeholders?
•And what do each of them want?
•What are possible attack vectors?
(b) Translate those into objectives and constraints.
2. Try Existing Patterns
1. Curation
2. Proofs of human or compute work
3. Identity
4. Reputation
5. Governance / software updates
6. Third-party arbitration
7. …
2.1 Patterns for Curation
•Binary membership: Token Curated Registry (TCR)
•Discrete-valued membership: Stake Machines
•Continuous-valued membership: Curation Markets
characterized by bonding curve
•Hierarchical membership: each label gets a TCR
•Work tied to membership: Proofed Curation Market
•Non-fungible tokens: Re-Fungible Tokens
2.2 Patterns for Proofs of Compute Work
Case Study:
Analysis of Bitcoin
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
E(Ri) α Hi * T
E() = expected
value
# tokens (BTC)
dispensed each
block
block
rewards
hash power of actor
= contribution to
“security”
Result of Bitcoin’s objective function:
People are maximizing security! = Maximizing electricity
More power than USA by mid 2019
Case Study:
Design of Ocean
1. Formulate the Problem:
(a) Who are stakeholders? What do they want?
Objective function: maximize supply of relevant data
Token rewards if: supply relevant data
Token rewards if: supply data, and curate it
1. Formulate the problem:
(b) Translate into objectives and constraints
Constraints = checklist:
• For priced data, is there incentive for supplying more? Referring?
• For priced data, good spam prevention?
• For free data, is there incentive for supplying more? Referring?
• For free data, good spam prevention?
• Does the token give higher marginal value to users of the network versus external
investors? Eg Does return on capital increase as stake increases?
• Are people incentivized to run keepers?
• Is it simple? Is onboarding low-friction?
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints – values too!
2. Try Existing Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market.
Curation: Pay tokens to listen.
Key Question 1 2 3 4 5
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔
2. Try existing patterns: evaluate on objectives &
constraints. None passed…
3. Try New Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market. Curation:
Pay tokens to listen.
5. Data registry + free data curation market. Curation: Stake
tokens as belief in reputation. Auto CDN.
6. Actor registry + free&priced data curation market. Curation:
Stake tokens as belief in reputation. Auto CDN. “Proofed
Curation Market”
Key Question 1 2 3 4 5 6
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔ ✔
3. Try new patterns: evaluate on objectives &
constraints
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: Proofed Curation Market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
#TokenEngineering
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Engineering theory,
practice and tools
+ responsibility
Token Engineering for Analysis & Synthesis
Conclusion
Trent McConaghy
@trentmc0
• Token design ≈ optimization design
• So, approach token design as optimization design!
1. Formulate problem. Objectives, constraints.
2. Try existing patterns. Iterate.
3. If needed, try new design.
• This process helped a lot for designing Ocean (so far)
• Token Engineering = Theory + practice + tools + responsibility
Conclusion:
Towards a Practice of #TokenEngineering

Mais conteúdo relacionado

Mais procurados

Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...Edureka!
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Tsasaa Tsas
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionFerdinando Maria Ametrano
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and CryptocurrenciesnimeshQ
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityKevin Cedeño, CISM, CISA
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamPMILebanonChapter
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondMichael Novak
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain TokenizationBellaj Badr
 
Week 3 - Cryptocurrencies
Week 3 - CryptocurrenciesWeek 3 - Cryptocurrencies
Week 3 - CryptocurrenciesRoger Royse
 

Mais procurados (20)

Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An Introduction
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgers
 
Cryptocurrency in real world
Cryptocurrency in real worldCryptocurrency in real world
Cryptocurrency in real world
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Introduction Bitcoin
Introduction BitcoinIntroduction Bitcoin
Introduction Bitcoin
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of Cybersecurity
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain Tokenization
 
Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
Week 3 - Cryptocurrencies
Week 3 - CryptocurrenciesWeek 3 - Cryptocurrencies
Week 3 - Cryptocurrencies
 
Blockchain
BlockchainBlockchain
Blockchain
 

Semelhante a Towards a Practice of Token Engineering

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolTrent McConaghy
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTrent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolTrent McConaghy
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInKrishnaram Kenthapadi
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...blockchainexe
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)Amazon Web Services
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationUlf Mattsson
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...Athens Big Data
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...PAPIs.io
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET Journal
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMarion DE SOUSA
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Boris Adryan
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageq-Maxim
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfssuser3ee399
 

Semelhante a Towards a Practice of Token Engineering (20)

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and Nature
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
900 keynote abbott
900 keynote abbott900 keynote abbott
900 keynote abbott
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - Reboot
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Tokenomics
TokenomicsTokenomics
Tokenomics
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid language
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdf
 

Mais de Trent McConaghy

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolTrent McConaghy
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsTrent McConaghy
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolTrent McConaghy
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainTrent McConaghy
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateTrent McConaghy
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...Trent McConaghy
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTrent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolTrent McConaghy
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Trent McConaghy
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainTrent McConaghy
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetTrent McConaghy
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonTrent McConaghy
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTrent McConaghy
 

Mais de Trent McConaghy (14)

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real Estate
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the Planet
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In Python
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Towards a Practice of Token Engineering

  • 1. Towards a Practice of Token Engineering Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18. Realization: Tokenized Ecosystems Are a Lot Like Evolutionary Algorithms! What Tokenized ecosystem Evolutionary Algorithm Goals Block reward function E.g. “Maximize hash rate” Objective function E.g. “Minimize error” Measurement & test Proof E.g. “Proof of Work” Evaluate fitness E.g. “Simulate circuit” System agents Miners & token holders (humans) In a network Individuals (computer agents) In a population System clock Block reward interval Generation Incentives & Disincentives You can’t control human, Just reward: give tokens And punish: slash stake You can’t control individual, Just reward: reproduce And punish: kill
  • 19. We can approach token design as optimization design.
  • 21. Steps in Optimization Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing solver. If needed, try different problem formulations or solvers. 3. Design new solver?
  • 22. 1. Formulation of an optimization problem Objectives & constraints in a design space
  • 23. 2. Try an existing solver. Does it converge?
  • 24. 3. Design new solver
  • 25. Example of a Successful Outcome
  • 27. Steps in Token Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 28. 1. Formulate the Problem (a) Ask •Who are my potential stakeholders? •And what do each of them want? •What are possible attack vectors? (b) Translate those into objectives and constraints.
  • 29. 2. Try Existing Patterns 1. Curation 2. Proofs of human or compute work 3. Identity 4. Reputation 5. Governance / software updates 6. Third-party arbitration 7. …
  • 30. 2.1 Patterns for Curation •Binary membership: Token Curated Registry (TCR) •Discrete-valued membership: Stake Machines •Continuous-valued membership: Curation Markets characterized by bonding curve •Hierarchical membership: each label gets a TCR •Work tied to membership: Proofed Curation Market •Non-fungible tokens: Re-Fungible Tokens
  • 31. 2.2 Patterns for Proofs of Compute Work
  • 33. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log
  • 34. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log E(Ri) α Hi * T E() = expected value # tokens (BTC) dispensed each block block rewards hash power of actor = contribution to “security”
  • 35. Result of Bitcoin’s objective function: People are maximizing security! = Maximizing electricity More power than USA by mid 2019
  • 37. 1. Formulate the Problem: (a) Who are stakeholders? What do they want?
  • 38. Objective function: maximize supply of relevant data Token rewards if: supply relevant data Token rewards if: supply data, and curate it 1. Formulate the problem: (b) Translate into objectives and constraints
  • 39. Constraints = checklist: • For priced data, is there incentive for supplying more? Referring? • For priced data, good spam prevention? • For free data, is there incentive for supplying more? Referring? • For free data, good spam prevention? • Does the token give higher marginal value to users of the network versus external investors? Eg Does return on capital increase as stake increases? • Are people incentivized to run keepers? • Is it simple? Is onboarding low-friction? 1. Formulate the problem: (b) Translate into objectives & constraints
  • 40. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 41. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 42. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 43. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 44. 1. Formulate the problem: (b) Translate into objectives & constraints – values too!
  • 45. 2. Try Existing Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen.
  • 46. Key Question 1 2 3 4 5 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ 2. Try existing patterns: evaluate on objectives & constraints. None passed…
  • 47. 3. Try New Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen. 5. Data registry + free data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. 6. Actor registry + free&priced data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. “Proofed Curation Market”
  • 48. Key Question 1 2 3 4 5 6 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ ✔ 3. Try new patterns: evaluate on objectives & constraints
  • 49. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: Proofed Curation Market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 50. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 52. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints
  • 53. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints Engineering theory, practice and tools + responsibility Token Engineering for Analysis & Synthesis
  • 55. Trent McConaghy @trentmc0 • Token design ≈ optimization design • So, approach token design as optimization design! 1. Formulate problem. Objectives, constraints. 2. Try existing patterns. Iterate. 3. If needed, try new design. • This process helped a lot for designing Ocean (so far) • Token Engineering = Theory + practice + tools + responsibility Conclusion: Towards a Practice of #TokenEngineering