Kaizen: Building a Performant Blockchain System Verified for Consensus and Integrity

Total Page:16

File Type:pdf, Size:1020Kb

Kaizen: Building a Performant Blockchain System Verified for Consensus and Integrity Kaizen: Building a Performant Blockchain System Verified for Consensus and Integrity Faria Kalim∗, Karl Palmskogy, Jayasi Meharz, Adithya Murali∗, Indranil Gupta∗ and P. Madhusudan∗ ∗University of Illinois at Urbana-Champaign yThe University of Texas at Austin zFacebook ∗fkalim2, adithya5, indy, [email protected] [email protected] [email protected] Abstract—We report on the development of a blockchain for it [7]. This protocol can then be automatically translated to system that is significantly verified and performant, detailing equivalent code in a functional language and deployed using the design, proof, and system development based on a process of a shim layer to a network to obtain working reference imple- continuous refinement. We instantiate this framework to build, to the best of our knowledge, the first blockchain (Kaizen) that is mentations of the basic protocol. However, there are several performant and verified to a large degree, and a cryptocurrency drawbacks to this—it is extremely hard to work further on protocol (KznCoin) over it. We experimentally compare its the reference implementation to refine it to correct imperative performance against the stock Bitcoin implementation. and performant code, and to add more features to it to meet practical requirements for building applications. I. INTRODUCTION The second technique, pioneered by the IronFleet sys- Blockchains are used to build a variety of distributed sys- tems [8], is to use a system such as Dafny to prove a system tems, e.g., applications such as cryptocurrency (Bitcoin [1] and correct with respect to its specification via automated theorem altcoins [2]), banking, finance, automobiles, health, supply- proving (using SMT solvers) guided by manual annotations. chain, and others [3], [4], [5]. In scenarios where there is In this paper, we develop our Kaizen approach for traditionally a central ledger, blockchain-based approaches blockchain protocols using a synergistic blend of the two tech- provide a democratized and decentralized alternative. niques above. Kaizen is a variant of the IronFleet approach. At the heart of any blockchain system is a distributed Our approach is to start with an abstract distributed protocol consensus protocol. This protocol ensures that the ledger is (a consensus protocol for blockchain in our case) and prove sharded into blocks, and that all nodes in the system agree correctness properties using an interactive theorem prover. We on the order, content, and dependency verification of the then refine the protocol to an imperative program using a blocks. Yet, today all blockchain and cryptocurrency with large program verifier that supports more automated verification, deployments remain largely unverified implementations. like Dafny, and similar to IronFleet. Interactive higher-order Formally verifying blockchains, and more broadly dis- theorem provers such as Coq are extremely powerful, capable tributed systems, is extremely challenging, especially due to of virtually proving/checking any proof written by humans. concurrency and asynchrony. Implementations of distributed IronFleet showed that correctness of several distributed proto- systems running in production are large pieces of code with cols can be coaxed into first-order systems with standard theo- several features, functionalities, and optimizations, making ries as supported by Dafny (using ghost code and tactics). Yet, them hard to verify ex-post. Consequently, the only techniques we believe that the flexibility afforded by interactive theorem that are viable for realizing verified systems involve designing provers significantly enlarge the scope of correctness proofs. them correct by construction. Interactive theorem provers such as Coq have been used to The main contribution of this paper is to build a blockchain prove complex properties involving cryptography and game- system, and an associated cryptocurrency system that are based proofs, pseudorandomess and probability [9], [10], [11]. both performant and have a verified consensus protocol at The idea that building verified systems need both automated their core. Our approach ensures both safety and liveness SMT reasoning (for speed and less manual annotation) and properties of the blockchain and cryptocurrency system. We expressive logics (for proving more complex theorems that build this system using a novel iterative refinement process cannot be easily reduced to SMT reasoning) is not new. that combines interactive theorem proving and refinement The Everest project [12] at Microsoft Research that aims verification using automated Floyd-Hoare style techniques. to build a verified HTTPS ecosystem uses F∗, and F∗ has The Kaizen refinement framework: There are two main tech- grown over the years to support interactive theorem proving niques for constructing correct distributed software today. The in addition to automated SMT-based reasoning [13]. Similarly, first is a set of techniques based on using interactive theorem the newly designed Lean proof assistant [14] also combines provers, such as Coq [6], where Coq type theory experts write SMT reasoning with interactive theorem proving. a high-level abstract protocol and prove correctness properties The Kaizen blockchain and KznCoin: We build a blockchain yThe first two authors contributed equally to this work. system and a cryptocurrency over it by using a refinement zWork done while at University of Illinois at Urbana-Champaign. framework as the one described above. Our starting point is a recently developed formalization of the blockchain/blockforest Sergey [15], preserving all their safety and liveness prop- protocol in Coq by Pirlea and Sergey [15], where the abstract erties. We then add at the deployment layer a network shim distributed protocol works in an asynchronous out-of-order and carefully argued (but not formally verified) refinements message-passing environment and where several properties are to gain further performance. proved regarding validity of the reachable global states of the • An evaluation of the cryptocurrency against a reference system as well as an eventual consistency property. The goal Bitcoin implementation on a real network that shows that we set for ourselves is to take this protocol expressed in Coq the system can be used as a backbone for a full-fledged and to continuously refine it to a usable performant imperative Bitcoin-like cryptocurrency that uses standard proof-of implementation of an altcoin, with proven refinement guaran- work measures for controlling the growth of the chain. tees. The proven refinement ensures that our core protocol We provide artifacts and supplementary material at this URL: implementation inherits all the safety and liveness (eventual https://madhu.cs.illinois.edu/kaizen consistency) properties proved for the abstract protocol in Coq. We develop our KznCoin cryptocurrency on top of the II. BACKGROUND Kaizen blockchain and evaluate its performance against A. Blockchains and Bitcoin the stock Bitcoin implementation [16]. We argue that the blockchain can be used as a backbone for a full-fledged A blockchain is an open, distributed ledger that can record Bitcoin-like cryptocurrency that uses standard proof-of work transactions between two parties in serializable order, in a measures for controlling the growth of the chain. verifiable and permanent way [17], [18]. Bitcoin is a de- In our experience in this project, we found our refinement centralized cryptocurrency that uses Nakamoto consensus [1] methodology to be friendly to systems developers, as it allows to maintain a blockchain of transactions across an untrusted teams with different expertise to collaboratively build a com- peer-to-peer network [18]. The peers in the network generally plex verified system. Experts in interactive theorem provers belong to different organizations or companies so that there is can work on designing abstract distributed protocols and no single point of authority. These peers use gossip protocols prove complex properties. Meanwhile, systems engineers who to propagate transactions and blocks further in the network. are not necessarily trained in formal verification or abstract A node in the network can transfer currency from their ad- specification languages, can work on refining the protocol dress to another by creating a digitally signed transaction. Any using imperative code using automated verification techniques, new transaction must pass a reference to a previous transaction and concentrate their efforts on instantiating the protocol for that the node might have received from another address. This particular applications and making them more performant, ensures that all nodes in the network can cryptographically keeping control of the design at all times. verify the creator of the transaction. Tamper-proof chain: We focus our verification on the core blockchain consensus Each block has a unique hash and properties under crash failures and eventual message delivery. contains the hash of the preceding block, as well as the Merkle Proving correctness under Byzantine models remains an open hash of its transactions. The first block in the chain, called problem in the community (see Section IX on related work the genesis block, is defined in the protocol. To effectively and the discussion in Section VIII). tamper with a transaction in the middle of the chain, an adversary would have to tamper with the transaction’s hash in Our work can also be seen as exploring a new point in the block. This would cause the hash of the block to change. distributed systems verification,
Recommended publications
  • The Lean Theorem Prover
    The Lean Theorem Prover Jeremy Avigad Department of Philosophy and Department of Mathematical Sciences Carnegie Mellon University June 29, 2017 Formal and Symbolic Methods Computers open up new opportunities for mathematical reasoning. Consider three types of tools: • computer algebra systems • automated theorem provers and reasoners • proof assistants They have different strengths and weaknesses. Computer Algebra Systems Computer algebra systems are widely used. Strengths: • They are easy to use. • They are useful. • They provide instant gratification. • They support interactive use, exploration. • They are programmable and extensible. Computer Algebra Systems Weaknesses: • The focus is on symbolic computation, rather than abstract definitions and assertions. • They are not designed for reasoning or search. • The semantics is murky. • They are sometimes inconsistent. Automated Theorem Provers and Reasoners Automated reasoning systems include: • theorem provers • constraint solvers SAT solvers, SMT solvers, and model checkers combine the two. Strengths: • They provide powerful search mechanisms. • They offer bush-button automation. Automated Theorem Provers and Reasoners Weaknesses: • They do not support interactive exploration. • Domain general automation often needs user guidance. • SAT solvers and SMT solvers work with less expressive languages. Ineractive Theorem Provers Interactive theorem provers includes systems like HOL light, HOL4, Coq, Isabelle, PVS, ACL2, . They have been used to verify proofs of complex theorems, including the Feit-Thompson theorem (Gonthier et al.) and the Kepler conjecture (Hales et al.). Strengths: • The results scale. • They come with a precise semantics. • Results are fully verified. Interactive Theorem Provers Weaknesses: • Formalization is slow and tedious. • It requires a high degree of commitment and experise. • It doesn’t promote exploration and discovery.
    [Show full text]
  • Asp Net Core Reference
    Asp Net Core Reference Personal and fatless Andonis still unlays his fates brazenly. Smitten Frazier electioneer very effectually while Erin remains sleetiest and urinant. Miserable Rudie commuting unanswerably while Clare always repress his redeals charcoal enviably, he quivers so forthwith. Enable Scaffolding without that Framework in ASP. API reference documentation for ASP. For example, plan content passed to another component. An error occurred while trying to fraud the questions. The resume footprint of apps has been reduced by half. What next the difference? This is an explanation. How could use the options pattern in ASP. Net core mvc core reference asp net. Architect modern web applications with ASP. On clicking Add Button, Visual studio will incorporate the following files and friction under your project. Net Compact spare was introduced for mobile platforms. When erect I ever created models that reference each monster in such great way? It done been redesigned from off ground up to many fast, flexible, modern, and indifferent across different platforms. NET Framework you run native on Windows. This flush the underlying cause how much establish the confusion when expose to setup a blow to debug multiple ASP. NET page Framework follows modular approaches. Core but jail not working. Any tips regarding that? Net web reference is a reference from sql data to net core reference asp. This miracle the nipple you should get if else do brought for Reminders. In charm to run ASP. You have to swear your battles wisely. IIS, not related to your application code. Re: How to reference System. Performance is double important for us.
    [Show full text]
  • Designing SUPPORTABILITY Into Software by Prashant A
    Designing SUPPORTABILITY into Software by Prashant A. Shirolkar Master of Science in Computer Science and Engineering (1998) University of Texas at Arlington Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology November 2003 C 2003 Massachusetts Institute of Technology All rights reserved Signature of Author Prashant Shirolkar System Design and Management Program February 2002 Certified by Michael A. Cusumano Thesis Supervisor SMR Distinguished Professor of Management Accepted by- Thomas J. Allen Co-Director, LFM/SDM Howard W. Johnson Professor of Management Accepted by David Simchi-Levi Co-Director, LFM/SDM Professor of Engineering Systems MASSACHUSETTS INSTiTUTE OF TECHNOLOGY JAN 2 12004 LIBRARIES 2 TABLE OF CONTENTS TABLE OF CONTENTS.......................................................................................................... 2 LIST OF FIGURES ........................................................................................................................ 6 LIST OF TABLES.......................................................................................................................... 8 ACKNOW LEDGEM ENTS...................................................................................................... 9 ACKNOW LEDGEM ENTS...................................................................................................... 9 1. INTRODUCTION ...............................................................................................................
    [Show full text]
  • Elaboration in Dependent Type Theory
    Elaboration in Dependent Type Theory Leonardo de Moura, Jeremy Avigad, Soonho Kong, and Cody Roux∗ December 18, 2015 Abstract To be usable in practice, interactive theorem provers need to pro- vide convenient and efficient means of writing expressions, definitions, and proofs. This involves inferring information that is often left implicit in an ordinary mathematical text, and resolving ambiguities in mathemat- ical expressions. We refer to the process of passing from a quasi-formal and partially-specified expression to a completely precise formal one as elaboration. We describe an elaboration algorithm for dependent type theory that has been implemented in the Lean theorem prover. Lean’s elaborator supports higher-order unification, type class inference, ad hoc overloading, insertion of coercions, the use of tactics, and the computa- tional reduction of terms. The interactions between these components are subtle and complex, and the elaboration algorithm has been carefully de- signed to balance efficiency and usability. We describe the central design goals, and the means by which they are achieved. 1 Introduction Just as programming languages run the spectrum from untyped languages like Lisp to strongly-typed functional programming languages like Haskell and ML, foundational systems for mathematics exhibit a range of diversity, from the untyped language of set theory to simple type theory and various versions of arXiv:1505.04324v2 [cs.LO] 17 Dec 2015 dependent type theory. Having a strongly typed language allows the user to convey the intent of an expression more compactly and efficiently, since a good deal of information can be inferred from type constraints. Moreover, a type discipline catches routine errors quickly and flags them in informative ways.
    [Show full text]
  • Formalized Mathematics in the Lean Proof Assistant
    Formalized mathematics in the Lean proof assistant Robert Y. Lewis Vrije Universiteit Amsterdam CARMA Workshop on Computer-Aided Proof Newcastle, NSW June 6, 2019 Credits Thanks to the following people for some of the contents of this talk: Leonardo de Moura Jeremy Avigad Mario Carneiro Johannes Hölzl 1 38 Table of Contents 1 Proof assistants in mathematics 2 Dependent type theory 3 The Lean theorem prover 4 Lean’s mathematical libraries 5 Automation in Lean 6 The good and the bad 2 38 bfseries Proof assistants in mathematics Computers in mathematics Mathematicians use computers in various ways. typesetting numerical calculations symbolic calculations visualization exploration Let’s add to this list: checking proofs. 3 38 Interactive theorem proving We want a language (and an implementation of this language) for: Defining mathematical objects Stating properties of these objects Showing that these properties hold Checking that these proofs are correct Automatically generating these proofs This language should be: Expressive User-friendly Computationally eicient 4 38 Interactive theorem proving Working with a proof assistant, users construct definitions, theorems, and proofs. The proof assistant makes sure that definitions are well-formed and unambiguous, theorem statements make sense, and proofs actually establish what they claim. In many systems, this proof object can be extracted and verified independently. Much of the system is “untrusted.” Only a small core has to be relied on. 5 38 Interactive theorem proving Some systems with large
    [Show full text]
  • Meta-F‹ Proof Automation with SMT, Tactics, and Metaprograms
    Meta-F‹ Proof automation with SMT, Tactics, and Metaprograms Guido Martínez Danel Ahman Victor Dumitrescu Nick Giannarakis Chris Hawblitzel Catalin Hritcu Monal Narasimhamurthy Zoe Paraskevopoulou Clément Pit-Claudel Jonathan Protzenko Tahina Ramananandro Aseem Rastogi Nikhil Swamy CIFASIS-CONICET Inria Paris University of Ljubljana MSR-Inria Joint Centre Princeton University Microsoft Research University of Colorado Boulder MIT CSAIL 1 / 18 Program Verifiers: Dafny, VCC, Liquid Haskell, ... ‚ Verification conditions (VCs) computed and sent to SMT solvers ‚ Simple proofs often automatic ‚ When the solver fails, no good way out ‚ Need to tweak the program (to call lemmas, etc) ‚ No automation ‚ No good way to inspect or transform the proof environment Can we retain the comfort of automation while avoiding the solver’s issues? Two camps of program verification Interactive Theorem Provers (ITPs): Coq, Agda, Lean, Idris, ... ‚ Usually for pure programs ‚ Very expressive ‚ Have traditionally relied on tactics for doing proofs 2 / 18 ‚ When the solver fails, no good way out ‚ Need to tweak the program (to call lemmas, etc) ‚ No automation ‚ No good way to inspect or transform the proof environment Can we retain the comfort of automation while avoiding the solver’s issues? Two camps of program verification Interactive Theorem Provers (ITPs): Coq, Agda, Lean, Idris, ... ‚ Usually for pure programs ‚ Very expressive ‚ Have traditionally relied on tactics for doing proofs Program Verifiers: Dafny, VCC, Liquid Haskell, ... ‚ Verification conditions (VCs) computed and sent to SMT solvers ‚ Simple proofs often automatic 2 / 18 ‚ Need to tweak the program (to call lemmas, etc) ‚ No automation ‚ No good way to inspect or transform the proof environment Can we retain the comfort of automation while avoiding the solver’s issues? Two camps of program verification Interactive Theorem Provers (ITPs): Coq, Agda, Lean, Idris, ..
    [Show full text]
  • Lean Manufacturing Techniques for Garments Industry
    Lean Manufacturing Techniques For Garments Industry Lean Manufacturing Techniques For Ready Made Garments Industry 1 Lean Manufacturing Techniques For Garments Industry Copyright © International Labour Organization 2017 First published (2017) Publications of the International Labour Office enjoy copyright under Protocol 2 of the Universal Copyright Convention. Nevertheless, short excerpts from them may be reproduced without authorization, on condition that the source is indicated. For rights of reproduction or translation, application should be made to ILO Publications (Rights and Licensing), International Labour Office, CH-1211 Geneva 22, Switzerland, or by email: [email protected]. The International Labour Office welcomes such applications. Libraries, institutions and other users registered with a reproduction rights organization may make copies in accordance with the licences issued to them for this purpose. Visit www.ifrro.org to find the reproduction rights organization in your country. ILO Cataloguing in Publication Data/ Lean Manufacturing Techniques for Ready Made Garments Industry/ ILO Cairo, 2017. ISBN: 978-92-2-130768-6 (print), 978-92-2-130769-3 (web pdf) ILO Decent Work Team for North Africa and ILO Country Office for Egypt and Eritrea. The designations employed in ILO publications, which are in conformity with United Nations practice, and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the International Labour Office concerning the legal status of any country, area or territory or of its authorities, or concerning the delimitation of its frontiers. The responsibility for opinions expressed in signed articles, studies and other contributions rests solely with their authors, and publication does not constitute an endorsement by the International Labour Office of the opinions expressed in them.
    [Show full text]
  • Cross Platform Web Application Development Using ASP.NET Core Sanjina Shakya St
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Computer Science and Department of Computer Science and Information Information Technology Technology 5-2018 Cross Platform Web Application Development Using ASP.NET Core Sanjina Shakya St. Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/csit_etds Part of the Computer Sciences Commons Recommended Citation Shakya, Sanjina, "Cross Platform Web Application Development Using ASP.NET Core" (2018). Culminating Projects in Computer Science and Information Technology. 23. https://repository.stcloudstate.edu/csit_etds/23 This Starred Paper is brought to you for free and open access by the Department of Computer Science and Information Technology at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Computer Science and Information Technology by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Cross Platform Web Application Development Using ASP.NET Core by Sanjina Shakya A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science May, 2018 Starred Paper Committee: Jie Hu Meichsner, Chairperson Ezzat Kirmani Mark Schmidt 2 Abstract Cross platform software development is a practice of developing an application which can be run on more than one OS platform such as Windows, Linux, MacOS, etc. Today’s web application development trend is moving towards cross platform frameworks as we can see that the types of web application we build today are very different from the ones we used to build a decade ago.
    [Show full text]
  • Neural Theorem Proving in Lean Using Proof Artifact Co-Training and Language Models
    Neural Theorem Proving in Lean using Proof Artifact Co-training and Language Models Jason Rute Jesse Michael Han Jason Rute Yuhuai Tony Wu Edward Ayers Stanislas Polu Univ. of Pittsburgh CIBO Technologies Univ. of Toronto Univ. of Cambridge OpenAI With thanks to the N2Formal team at Google AI The Lean Theorem Prover Why formal theorem proving? ● Mechanically check mathematical proofs ● Digitize mathematics ● Unify and archive mathematical knowledge ● Prove correctness of software and hardware ● Make mathematics accessible to computers in a new way Why Lean? Popular and newsworthy Extensive and Growing MathLib Library Perfectoid Con(ZFC - CH) Spaces Easy to learn and use Great tools and customization meta Active user base and supportive community IMO Grand Challenge (In Lean 4) Lean versions Version Maintainer Github Repo Website mathlib Lean GPT-f Lean 3.4.2 Microsoft leanprover/lean (archived) leanprover.github.io No No Research Lean 3.27.0c Lean leanprover-community/lean leanprover-community.github.io Yes Yes Community Lean 4.0.0-m1 Microsoft leanprover/lean4 leanprover.github.io No No Research For all Lean (any version), mathlib, and Lean GPT-f questions: https://leanprover.zulipchat.com Demo of Lean and gptf Autoregressive Language Modeling Next word (token) prediction Transformers (GPT-2, GPT-3, etc) Prompt and completion Today, there will be a talk at the New Technologies in Mathematics Seminar on "Neural Theorem Proving in Lean using Proof Artifact Co-training and Language Models". The talk will be delivered by Pascal Dascouet, Assistant Professor at the French Mathematics Centre (CNRS) and the director of the TMEM Group. The talk will explore how applications of machine learning may help in the "proof exploration of elegant theorems", including foundations, differential equations, topology and group theory.
    [Show full text]
  • ASP.NET Core Succinctly by Simone Chiaretta and Ugo Lattanzi Foreword by Daniel Jebaraj
    1 ASP.NET Core Succinctly By Simone Chiaretta and Ugo Lattanzi Foreword by Daniel Jebaraj 2 Copyright © 2017 by Syncfusion, Inc. 2501 Aerial Center Parkway Suite 200 Morrisville, NC 27560 USA All rights reserved. Important licensing information. Please read. This book is available for free download from www.syncfusion.com on completion of a registration form. If you obtained this book from any other source, please register and download a free copy from www.syncfusion.com. This book is licensed for reading only if obtained from www.syncfusion.com. This book is licensed strictly for personal or educational use. Redistribution in any form is prohibited. The authors and copyright holders provide absolutely no warranty for any information provided. The authors and copyright holders shall not be liable for any claim, damages, or any other liability arising from, out of, or in connection with the information in this book. Please do not use this book if the listed terms are unacceptable. Use shall constitute acceptance of the terms listed. SYNCFUSION, SUCCINCTLY, DELIVER INNOVATION WITH EASE, ESSENTIAL, and .NET ESSENTIALS are the registered trademarks of Syncfusion, Inc. Technical Reviewer: James McCaffrey Copy Editor: Tres Watkins, content development manager, Syncfusion, Inc. Acquisitions Coordinator: Hillary Bowling, marketing coordinator, Syncfusion, Inc. Proofreader: Jacqueline Bieringer, content producer, Syncfusion, Inc. 3 Table of Contents The Story Behind the Succinctly Series of Books ................................................................
    [Show full text]
  • Econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Kuchen, Herbert (Ed.); Majchrzak, Tim A. (Ed.); Müller-Olm, Markus (Ed.) Working Paper Tagungsband 16. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS'11): 26. bis 28. September 2011, Schloss Raesfeld, Münsterland Arbeitsberichte des Instituts für Wirtschaftsinformatik, No. 132 Provided in Cooperation with: University of Münster, Department of Information Systems Suggested Citation: Kuchen, Herbert (Ed.); Majchrzak, Tim A. (Ed.); Müller-Olm, Markus (Ed.) (2011) : Tagungsband 16. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS'11): 26. bis 28. September 2011, Schloss Raesfeld, Münsterland, Arbeitsberichte des Instituts für Wirtschaftsinformatik, No. 132, Westfälische Wilhelms- Universität Münster, Institut für Wirtschaftsinformatik, Münster This Version is available at: http://hdl.handle.net/10419/59558 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte.
    [Show full text]
  • PROGRAMME HEADLINE 2021 SPONSOR CONFERENCE Bloomberg Is the Leading Provider of Financial News and Information
    EVENT VIRTUAL Spring ACCU 2021.3.10–13 Pre-Conference tutorials 2021.3.9 2021 CONFERENCE PROGRAMME HEADLINE 2021 SPONSOR CONFERENCE Bloomberg is the leading provider of financial news and information. Our R&Ddepartment consists of 3000 engineers working across WELCOME teams in both London and New York. Terminal is the primary product we are known We are technology people – when we write for – it used to run on custom hardware, but code, we like to understand exactly what the is now a piece of software that runs on a PC – hardware is doing. We live and breathe C++, typically connected to 2 or more monitors. Over and are concerned about cpu performance, 315,000 customers pay a monthly subscription optimizations, memory allocation behaviour, to access our real-time data and news, deep Welcome to ACCU 2021! as well as higher-level software engineering analytic functions and trading functionality principles such as building modular, scalable, through our custom browser. You will see many ACCU Conference is the annual conference developers. Even though the conference in reliable and debuggable code. We write a Bloomberg Terminals on most trading floors of the ACCU membership club, but open 2020 had to be cancelled because of the lot of systems ourselves, but have embraced around the world, and in the offices of influential to any and all who wish to attend. The COVID-19 pandemic, many speakers are the open source community. The Bloomberg decision-makers within financial markets. ACCU Conference has a history founded in happy to give their presentations in 2021. studying and evolving C and C++ – many of So we have our usual mix of keynotes, its members continue to have active roles sessions, quickies and lightning talks.
    [Show full text]