{"id":2902,"date":"2018-04-25T16:51:30","date_gmt":"2018-04-25T19:51:30","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2902"},"modified":"2018-04-25T16:51:30","modified_gmt":"2018-04-25T19:51:30","slug":"podrian-computadoras-del-tamano-de-un-grano-usar-redes-de-cadenas-de-bloques-para-frustrar-a-los-falsificadores","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2902","title":{"rendered":"\u00bfPodr\u00edan computadoras del tama\u00f1o de un grano usar redes de cadenas de bloques para frustrar a los falsificadores?"},"content":{"rendered":"<p>Investigadores de IBM han creado computadoras del tama\u00f1o de un grano de sal que podr\u00eda integrarse a un producto enviado y ser utilizado para rastrearlo y mantener su autenticidad.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/03\/worlds-smallest-computer-300x200-100752727-large.jpg\" alt=\"worlds smallest computer\" width=\"398\" height=\"265\" \/>Within five years, IBM researchers hope to deploy granular microcomputers that, in conjunction with\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3191077\/security\/what-is-blockchain-the-most-disruptive-tech-in-decades.html\" target=\"_blank\" rel=\"noopener noreferrer\">a blockchain electronic ledger<\/a>, could be used to verify and track goods all over the world.<\/p>\n<p>IBM has created a microcomputer technology\u00a0<a href=\"https:\/\/www.research.ibm.com\/5-in-5\/crypto-anchors-and-blockchain\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">called cryptographic anchors<\/a>\u00a0(abbreviated: crypto-anchors) and says they could be used to authenticate anything from pharmaceuticals to luxury goods, such as diamonds, from point of origin to merchant.<\/p>\n<p>Fraud costs the global economy more than $600 billion a year, according to IBM, and in some countries, nearly 70% of certain drugs are counterfeit.<\/p>\n<p>Supply chains can be made up of dozens of entities \u2013 from shipper to exporter, importer and freight forwarders \u2013 all from multiple countries. As goods move from port to port, criminals have numerous opportunities to tamper with products.<\/p>\n<aside id=\"\" class=\"nativo-promo nativo-promo-1 smartphone\"><\/aside>\n<figure class=\"large\">\n<div class=\"embed-wrapper\">\n<div class=\"embed-container embed-youtube\"><iframe loading=\"lazy\" id=\"791864294\" src=\"https:\/\/www.youtube.com\/embed\/LUFWk55w5o0?enablejsapi=1&amp;origin=https%3A%2F%2Fwww.computerworld.com\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\" data-gtm-yt-inspected-1279228_154=\"true\"><\/iframe><\/div>\n<\/div>\n<\/figure>\n<p>In addition, there is also an enormous amount of documentation associated with cross-border transactions, according to Paul Brody, Ernst &amp; Young&#8217;s (EY) Global Innovation Leader for Blockchain Technology.<\/p>\n<p>Although the supply chain and shipping industries have moved on from an all paper-based system to more of an electronic exchange, those systems continue to be siloed within a single company.<\/p>\n<p>&#8220;And what is going on is that we all have this digital information but we need a more efficient way to bring it under a single infrastructure,&#8221; Brody said. &#8220;And that is what blockchain is doing \u2013 managing the physical aspect, financial aspect, legal contracts and operations in a single digital contract.&#8221;<\/p>\n<p>IBM&#8217;s crypto-anchors \u2013 such as ink dots or tiny computers smaller than a grain of salt \u2013 could be embedded in everyday objects and devices, Arvind Krishna, head of IBM Research, wrote in\u00a0<a href=\"https:\/\/www.ibm.com\/blogs\/research\/2018\/03\/ibm-research-5-in-5-2018\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">a blog post<\/a>. &#8220;They&#8217;ll be used in tandem with blockchain&#8217;s distributed ledger technology to ensure an object&#8217;s authenticity from its point of origin to when it reaches the hands of the customer,&#8221; he said.<\/p>\n<p>Essentially, the crypto-anchors will not only serve as mobile sensors or transmitters but would also contain unique hashes that can authenticate a product&#8217;s origin and contents, ensuring it matches the electronic blockchain record.<\/p>\n<p>In the case of liquids or metals that can expand with heat, the crypto-anchors can be outfitted with a special optical device and artificial intelligence algorithms to learn and identify the optical structure and features of certain objects. They can also identify the presence of DNA sequences in minutes, IBM said.<\/p>\n<p>The product-tracking technology, Krishna said, will open the door to new ways of handling food safety, documenting the authenticity of manufactured components, tracking genetically modified products, identifying counterfeit objects and guarding the provenance of luxury goods.<\/p>\n<p>Blockchain electronic ledgers are\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3249252\/emerging-technology\/blockchain-will-be-the-killer-app-for-supply-chain-management-in-2018.html\" target=\"_blank\" rel=\"noopener noreferrer\">already being piloted in supply chains<\/a>\u00a0to track in real time goods as they transit the globe or simply move between a company and its suppliers.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3236480\/emerging-technology\/the-top-5-problems-with-blockchain.html\" target=\"_blank\" rel=\"noopener noreferrer\">Challenges with blockchain remain<\/a>, however, according to Brody.<\/p>\n<p>For example, data immutability on a blockchain makes it ideal for auditing purposes, but it that data is incorrect, it&#8217;s also guaranteed to proceed forward on the ledger in an incorrect manner, Brody said.<\/p>\n<p>&#8220;You need to make sure that data is accurate, because that will be very important,&#8221; Brody said.<\/p>\n<p>Blockchains themselves are incredibly resilient in that they are a distributed, decentralized network of independent nodes \u2013 making them extremely hard to take down as a whole. But the distributed ledger tech does have a weakness associated with the custom software built on top of it and on the edges of the network.<\/p>\n<aside id=\"\" class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\"><\/aside>\n<p>&#8220;From a cybersecurity perspective, protecting the edges of the network from attack will be key,&#8221; Brody said. &#8220;Attacks tend to flow toward the weakest points of the network, so even if the blockchain itself is resilient, if there are significant weaknesses in the IoT connectivity, those will be exploited.&#8221;<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.computerworld.com\/article\/3263456\/blockchain\/could-these-grain-sized-computers-using-blockchain-networks-thwart-counterfeiters.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.computerworld.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores de IBM han creado computadoras del tama\u00f1o de un grano de sal que podr\u00eda integrarse a un producto enviado y ser utilizado para rastrearlo&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2902"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2902"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2902\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}