In this post we will show that Daml’s identity model is able to provide the same degree of security as systems built on a user experience that focuses almost exclusively on cryptographic identity while also providing a superior user experience and better flexibility in terms of deployment options: Decentralized – Entities can run ledger nodes,
Improving renting Renting a property is still quite a manual and cumbersome process because different actors have different views of it and can’t fully trust each other, so paperwork is put in place to mitigate risks. If we were able to solve these paperwork issues, we could apply the same approach to not only rentals
What’s New Diversity is an important initiative at Digital Asset as we work to increase both our own diversity and that of the sectors we work in. As part of that initiative we are holding a virtual panel discussion where some of our top women leaders will be discussing how they got to where they
Introduction What is a Daml party? It’s a great question to which there is a precise technical answer, of course, but that answer would help us as little in designing a multi-party application as a precise technical understanding of database users would help us in designing a web application. In our examples, we often use
What’s New The results of the third community recognition ceremony are in. Congratulations to Emil and Matt for winning and thank you both for your excellent contributions to our community. Daml’s default branch name is changing from master to main to have more inclusive naming. Read more about the steps and the reasoning behind it here. Happy 5 year anniversary to Hyperledger! We’re proud
Our community recognition ceremony is open! Nominate who you think deserves to win! What’s New in The Ecosystem @gyorgybalazsi shared what he, @Gyorgy_Farkas, Janice, and Dani learned from participating in Odyssey and grappling with new problems. From fishing quotas to licenses to matching reports with independent observers it’s thoroughly impressive how much was built in such a short time.
In Part 1 of this blog, we described how to set up a PKI infrastructure and configure the DAML Ledger Server to use secure TLS connections and mutual authentication. This protects data in transit and only authorised clients can connect. An application will need to issue DAML commands over the secure connection and retrieve the
tl;dr If you care about performance, use DAML’s builtin syntax for accessing record fields. Introduction I guess it is no secret that I’m not the biggest fan of lenses, particularly not in DAML. I wouldn’t go as far as saying that lenses, prisms, and the other optics make my eyes bleed but there are definitely better