SlideShare a Scribd company logo
1 of 55
Download to read offline
Towards a
Practice of
Token Engineering
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
Early
iterations
Early iterations:
Flailing
Can we
structure this
better?
Realization: Tokenized Ecosystems
Are a Lot Like Evolutionary Algorithms!
What Tokenized ecosystem Evolutionary Algorithm
Goals Block reward function
E.g. “Maximize hash rate”
Objective function
E.g. “Minimize error”
Measurement
& test
Proof
E.g. “Proof of Work”
Evaluate fitness
E.g. “Simulate circuit”
System agents Miners & token holders (humans)
In a network
Individuals (computer agents)
In a population
System clock Block reward interval Generation
Incentives &
Disincentives
You can’t control human,
Just reward: give tokens
And punish: slash stake
You can’t control individual,
Just reward: reproduce
And punish: kill
We can approach token design
as optimization design.
Optimization Design
Steps in Optimization Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing solver. If needed, try different
problem formulations or solvers.
3. Design new solver?
1. Formulation of an optimization problem
Objectives & constraints in a design space
2. Try an existing solver. Does it converge?
3. Design new solver
Example of a Successful Outcome
Token Design
as Optimization
Design
Steps in Token Design
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
1. Formulate the Problem
(a) Ask
•Who are my potential stakeholders?
•And what do each of them want?
•What are possible attack vectors?
(b) Translate those into objectives and constraints.
2. Try Existing Patterns
1. Curation
2. Proofs of human or compute work
3. Identity
4. Reputation
5. Governance / software updates
6. Third-party arbitration
7. …
2.1 Patterns for Curation
•Binary membership: Token Curated Registry (TCR)
•Discrete-valued membership: Stake Machines
•Continuous-valued membership: Curation Markets
characterized by bonding curve
•Hierarchical membership: each label gets a TCR
•Work tied to membership: Proofed Curation Market
•Non-fungible tokens: Re-Fungible Tokens
2.2 Patterns for Proofs of Compute Work
Case Study:
Analysis of Bitcoin
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
Bitcoin objective function
Objective: Maximize security of network
• Where “security” = compute power
• Therefore, super expensive to roll back changes to the transaction log
E(Ri) α Hi * T
E() = expected
value
# tokens (BTC)
dispensed each
block
block
rewards
hash power of actor
= contribution to
“security”
Result of Bitcoin’s objective function:
People are maximizing security! = Maximizing electricity
More power than USA by mid 2019
Case Study:
Design of Ocean
1. Formulate the Problem:
(a) Who are stakeholders? What do they want?
Objective function: maximize supply of relevant data
Token rewards if: supply relevant data
Token rewards if: supply data, and curate it
1. Formulate the problem:
(b) Translate into objectives and constraints
Constraints = checklist:
• For priced data, is there incentive for supplying more? Referring?
• For priced data, good spam prevention?
• For free data, is there incentive for supplying more? Referring?
• For free data, good spam prevention?
• Does the token give higher marginal value to users of the network versus external
investors? Eg Does return on capital increase as stake increases?
• Are people incentivized to run keepers?
• Is it simple? Is onboarding low-friction?
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints
1. Formulate the problem:
(b) Translate into objectives & constraints – values too!
2. Try Existing Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market.
Curation: Pay tokens to listen.
Key Question 1 2 3 4 5
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔
2. Try existing patterns: evaluate on objectives &
constraints. None passed…
3. Try New Patterns
Some patterns:
1. Actor registry
2. Data registry
3. Actor registry + data registry
4. Data registry + free-as-in-beer data curation market. Curation:
Pay tokens to listen.
5. Data registry + free data curation market. Curation: Stake
tokens as belief in reputation. Auto CDN.
6. Actor registry + free&priced data curation market. Curation:
Stake tokens as belief in reputation. Auto CDN. “Proofed
Curation Market”
Key Question 1 2 3 4 5 6
For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔
For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔
For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔
For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔
Does token give higher marginal value to users of the
network, vs external investors? Eg Does return on capital
increase as stake increases?
✔ ✔ ✔ ✔ ✔ ✔
Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔
It simple? Is onboarding low-friction? Where possible, do we
use incentives/crypto rather than legal recourse?
✔ ✔ ≈ ≈ ✔ ✔
3. Try new patterns: evaluate on objectives &
constraints
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: Proofed Curation Market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
#TokenEngineering
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Design of Tokenized Ecosystems
From Mechanism Design to Token Engineering
Analysis: Synthesis:
Game theory Mechanism Design
Optimization Design
Practical
constraints
Engineering theory,
practice and tools
+ responsibility
Token Engineering for Analysis & Synthesis
Conclusion
Trent McConaghy
@trentmc0
• Token design ≈ optimization design
• So, approach token design as optimization design!
1. Formulate problem. Objectives, constraints.
2. Try existing patterns. Iterate.
3. If needed, try new design.
• This process helped a lot for designing Ocean (so far)
• Token Engineering = Theory + practice + tools + responsibility
Conclusion:
Towards a Practice of #TokenEngineering

More Related Content

What's hot

DOA TOKENOMICS FOR BUSINESS.pptx
DOA TOKENOMICS FOR BUSINESS.pptxDOA TOKENOMICS FOR BUSINESS.pptx
DOA TOKENOMICS FOR BUSINESS.pptxAndy Martin
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainJitendra Chittoda
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...Stephen Peters
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Edureka!
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technologyyaminisindhurabandar
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Edureka!
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Decentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesDecentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesJan Brejcha
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 

What's hot (20)

Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Blockchain
BlockchainBlockchain
Blockchain
 
Tokenomics
TokenomicsTokenomics
Tokenomics
 
DOA TOKENOMICS FOR BUSINESS.pptx
DOA TOKENOMICS FOR BUSINESS.pptxDOA TOKENOMICS FOR BUSINESS.pptx
DOA TOKENOMICS FOR BUSINESS.pptx
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & Blockchain
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technology
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction Bitcoin
Introduction BitcoinIntroduction Bitcoin
Introduction Bitcoin
 
Tokenomics Overview
Tokenomics OverviewTokenomics Overview
Tokenomics Overview
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Decentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesDecentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical Examples
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 

Similar to Towards a Practice of Token Engineering

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolTrent McConaghy
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTrent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolTrent McConaghy
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInKrishnaram Kenthapadi
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...blockchainexe
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)Amazon Web Services
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationUlf Mattsson
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...Athens Big Data
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...PAPIs.io
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET Journal
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMarion DE SOUSA
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Boris Adryan
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageq-Maxim
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfssuser3ee399
 
Why Big and Small Data Is Important by Google's Product Manager
Why Big and Small Data Is Important by Google's Product ManagerWhy Big and Small Data Is Important by Google's Product Manager
Why Big and Small Data Is Important by Google's Product ManagerProduct School
 

Similar to Towards a Practice of Token Engineering (20)

Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean ProtocolCurated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
 
Tokens, Complex Systems, and Nature
Tokens, Complex Systems, and NatureTokens, Complex Systems, and Nature
Tokens, Complex Systems, and Nature
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
AWS re:Invent 2016: Getting to Ground Truth with Amazon Mechanical Turk (MAC201)
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
900 keynote abbott
900 keynote abbott900 keynote abbott
900 keynote abbott
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
17th Athens Big Data Meetup - 2nd Talk - Data Flow Building and Calculation P...
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
 
Machine Learning in e commerce - Reboot
Machine Learning in e commerce - RebootMachine Learning in e commerce - Reboot
Machine Learning in e commerce - Reboot
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Data mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid languageData mining and Machine learning expained in jargon free & lucid language
Data mining and Machine learning expained in jargon free & lucid language
 
danmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdfdanmcclary-pspresentation-katieboyle-171030115522.pdf
danmcclary-pspresentation-katieboyle-171030115522.pdf
 
Why Big and Small Data Is Important by Google's Product Manager
Why Big and Small Data Is Important by Google's Product ManagerWhy Big and Small Data Is Important by Google's Product Manager
Why Big and Small Data Is Important by Google's Product Manager
 

More from Trent McConaghy

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolTrent McConaghy
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsTrent McConaghy
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolTrent McConaghy
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainTrent McConaghy
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateTrent McConaghy
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...Trent McConaghy
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTrent McConaghy
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolTrent McConaghy
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Trent McConaghy
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainTrent McConaghy
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetTrent McConaghy
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonTrent McConaghy
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTrent McConaghy
 

More from Trent McConaghy (14)

Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
An Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real EstateAn Intro to AI With Applications in Real Estate
An Intro to AI With Applications in Real Estate
 
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
 
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design MethodologiesTop-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
Top-Down? Bottom Up? A Survey of Hierarchical Design Methodologies
 
Data, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean ProtocolData, AI, and Tokens: Ocean Protocol
Data, AI, and Tokens: Ocean Protocol
 
Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]Blockchains for AI [With New Applications]
Blockchains for AI [With New Applications]
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
IPDB: A Public Database for the Planet
IPDB: A Public Database for the PlanetIPDB: A Public Database for the Planet
IPDB: A Public Database for the Planet
 
BigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In PythonBigchainDB: A Scalable Blockchain Database, In Python
BigchainDB: A Scalable Blockchain Database, In Python
 
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDBTools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
Tools to Help *You* Rewire Music: OMI & COALA IP | IPDB | BigchainDB
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Towards a Practice of Token Engineering

  • 1. Towards a Practice of Token Engineering Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18. Realization: Tokenized Ecosystems Are a Lot Like Evolutionary Algorithms! What Tokenized ecosystem Evolutionary Algorithm Goals Block reward function E.g. “Maximize hash rate” Objective function E.g. “Minimize error” Measurement & test Proof E.g. “Proof of Work” Evaluate fitness E.g. “Simulate circuit” System agents Miners & token holders (humans) In a network Individuals (computer agents) In a population System clock Block reward interval Generation Incentives & Disincentives You can’t control human, Just reward: give tokens And punish: slash stake You can’t control individual, Just reward: reproduce And punish: kill
  • 19. We can approach token design as optimization design.
  • 21. Steps in Optimization Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing solver. If needed, try different problem formulations or solvers. 3. Design new solver?
  • 22. 1. Formulation of an optimization problem Objectives & constraints in a design space
  • 23. 2. Try an existing solver. Does it converge?
  • 24. 3. Design new solver
  • 25. Example of a Successful Outcome
  • 27. Steps in Token Design 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 28. 1. Formulate the Problem (a) Ask •Who are my potential stakeholders? •And what do each of them want? •What are possible attack vectors? (b) Translate those into objectives and constraints.
  • 29. 2. Try Existing Patterns 1. Curation 2. Proofs of human or compute work 3. Identity 4. Reputation 5. Governance / software updates 6. Third-party arbitration 7. …
  • 30. 2.1 Patterns for Curation •Binary membership: Token Curated Registry (TCR) •Discrete-valued membership: Stake Machines •Continuous-valued membership: Curation Markets characterized by bonding curve •Hierarchical membership: each label gets a TCR •Work tied to membership: Proofed Curation Market •Non-fungible tokens: Re-Fungible Tokens
  • 31. 2.2 Patterns for Proofs of Compute Work
  • 33. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log
  • 34. Bitcoin objective function Objective: Maximize security of network • Where “security” = compute power • Therefore, super expensive to roll back changes to the transaction log E(Ri) α Hi * T E() = expected value # tokens (BTC) dispensed each block block rewards hash power of actor = contribution to “security”
  • 35. Result of Bitcoin’s objective function: People are maximizing security! = Maximizing electricity More power than USA by mid 2019
  • 37. 1. Formulate the Problem: (a) Who are stakeholders? What do they want?
  • 38. Objective function: maximize supply of relevant data Token rewards if: supply relevant data Token rewards if: supply data, and curate it 1. Formulate the problem: (b) Translate into objectives and constraints
  • 39. Constraints = checklist: • For priced data, is there incentive for supplying more? Referring? • For priced data, good spam prevention? • For free data, is there incentive for supplying more? Referring? • For free data, good spam prevention? • Does the token give higher marginal value to users of the network versus external investors? Eg Does return on capital increase as stake increases? • Are people incentivized to run keepers? • Is it simple? Is onboarding low-friction? 1. Formulate the problem: (b) Translate into objectives & constraints
  • 40. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 41. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 42. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 43. 1. Formulate the problem: (b) Translate into objectives & constraints
  • 44. 1. Formulate the problem: (b) Translate into objectives & constraints – values too!
  • 45. 2. Try Existing Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen.
  • 46. Key Question 1 2 3 4 5 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ 2. Try existing patterns: evaluate on objectives & constraints. None passed…
  • 47. 3. Try New Patterns Some patterns: 1. Actor registry 2. Data registry 3. Actor registry + data registry 4. Data registry + free-as-in-beer data curation market. Curation: Pay tokens to listen. 5. Data registry + free data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. 6. Actor registry + free&priced data curation market. Curation: Stake tokens as belief in reputation. Auto CDN. “Proofed Curation Market”
  • 48. Key Question 1 2 3 4 5 6 For priced data: incentive for supplying more? Referring? ✖ ≈ ✔ ≈ ≈ ✔ For priced data: good spam prevention? ≈ ✔ ✔ ✔ ✔ ✔ For free data: incentive for supplying more? Referring? ✖ ≈ ✖ ✔ ✔ ✔ For free data: good spam prevention? ≈ ✔ ≈ ✔ ≈ ✔ Does token give higher marginal value to users of the network, vs external investors? Eg Does return on capital increase as stake increases? ✔ ✔ ✔ ✔ ✔ ✔ Are people incentivized to run keepers? ≈ ≈ ✔ ✔ ✔ ✔ It simple? Is onboarding low-friction? Where possible, do we use incentives/crypto rather than legal recourse? ✔ ✔ ≈ ≈ ✔ ✔ 3. Try new patterns: evaluate on objectives & constraints
  • 49. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: Proofed Curation Market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 50. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 52. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints
  • 53. Design of Tokenized Ecosystems From Mechanism Design to Token Engineering Analysis: Synthesis: Game theory Mechanism Design Optimization Design Practical constraints Engineering theory, practice and tools + responsibility Token Engineering for Analysis & Synthesis
  • 55. Trent McConaghy @trentmc0 • Token design ≈ optimization design • So, approach token design as optimization design! 1. Formulate problem. Objectives, constraints. 2. Try existing patterns. Iterate. 3. If needed, try new design. • This process helped a lot for designing Ocean (so far) • Token Engineering = Theory + practice + tools + responsibility Conclusion: Towards a Practice of #TokenEngineering