Blockchain 3.0 technologies have moved beyond cryptocurrency to transform applications across sectors, and our client has embraced this revolution. They came up with an idea to build a decentralized network that validates complex datasets. On paper, it looked like it could work, but it has never been seen in operation. Yet, that’s exactly the challenge our client laid before us. 

Here’s how we entered uncharted waters and turned our client’s visionary idea into a real-world solution — a scalable blockchain 3.0 protocol compatible with data management systems.

Our Roles

CONSULTING

BACKEND

COMMUNITY MANAGEMENT

MONITORING

consulting-tools-logos-jira-slack-zoom-github.png

We streamlined the workflow and managed the project.

back-end-tools-aws-scala-cats-http4s.png

We designed a big data architecture that ensured system reliability.

community-management-tools-gitter-discord-telegram.png

We coordinated the activities of node operators.

monitoring-tools-prometheus-grafana-elasticsearch.png

We kept track of metrics to quickly diagnose potential problems.

Background

Every year, we can observe a rapidly increasing volume and complexity of data. In fact, IDC predicts that “the global datasphere will grow from 33 zettabytes in 2019 to 175 zettabytes by 2025.” Data is generated by mobile devices — with every click, swipe, and share — and by the Internet of things — smart TVs, security devices, web cameras, cars, and airplanes. It is the new oil. The most valuable resource. And as such, it needs to be properly protected. 

The existing cybersecurity solutions were developed at different times and with a different set of problems in mind, so now — in response to the emerging technology landscape — we need to take a new approach.

Challenge

Our client, a San Francisco–based company, has risen to the challenge of changing the status quo and preventing data corruption. They’ve come up with a blockchain algorithm and a new paradigm for data processing, which uses a smarter and more autonomous IoT network for increased data protection. Being ahead of the curve has given our client a first-mover advantage — but it has also pushed them into navigating unknown territories.

So, how could we create a system that would protect all the data exchanges... when there was no prior experience to fall back on?

Solution

We joined the visionaries’ club formed by our client and let our creativity and skills shine. We brought to the table our deep technical knowledge. We also took on tasks outside the usual scope of software development companies — community management and workflow management. Let’s see how exactly we put these three elements to work.

Deep Technical Knowledge

The project required not only a solid foundation in data structures and algorithms but also a knack for thinking outside the box. We put together a technical team of three engineers that display such qualities. We brainstormed possible solutions with our client and worked algorithms out on paper. This way, we could have the right solution in concept before starting to write the code.

Our deep understanding of technology combined with novel thinking allowed us to reach the goal — build a stable computing cluster, implement a Directed Acyclic Graph model, and design an efficient reputation-based consensus protocol.

Community Management

The decentralized network on which the project is based consists of node operators — specialists in mathematics, economy, and law. Their task is to maintain and validate state channels. Our team is responsible for managing this community — onboarding node operators, coordinating their activities, and applying rules and regulations.

We’ve developed a close rapport with the group. We’ve reached a milestone of 8,500 community members, and the number is still growing.

Workflow Management

We also offered our project management services to introduce good engineering practices. We structured the workflow — adopting a ticketing system, organizing daily calls, and setting up two-week work plans. Keeping our finger on the pulse of all activities helped us execute the project in a timely manner.

Yet, we didn’t limit ourselves to taking ownership of technological issues. We arranged regular status update meetings that focused on bridging business and technology objectives. Thanks to this holistic approach we could put together a composite picture of what the project is all about.

Results

Together with our client, we’ve built the product through practical implementation of a novel, complex theoretical model. So far, we’ve launched a mainnet — the main network, which is a solid base to work from. It can already be employed to make transactions. When fully developed, the technology will have the potential to set new standards for data protection and the next generation of applications.