Print this Page
1.1 Portfolio
37 Export-Import Portfolio
Close this Page

1.1.37. Export-Import Portfolio.
1. The export-import meta data is in support of logistics and distribution company requirements, but a wide range of other customers also use export-import services.   Assets that need to export from one style and be imported into another style are complex and valuable.   It has been said that export-import added-value has some of the greatest business benefits of all portfolios.
2. Export is about converting an asset from its current state to an intermediate or standard style.   Import is about converting an asset from an intermediate state to a bespoke state as required by the business.
3. Data, people, goods, services, finance and products can be subject to an export-import transformation.   While a "copy" function can be said to be a single transformation, an "export-import" function can be said to be a dual transformation.   Export-Import functions can be connected in a series to manage a supply chain of companies that add-value as assets move in one direction and money moves in the oppersite direction.
4. Block-Chain as used by digital currency enables assets that are normally copied to be moved - computers are not very good at moving assets.

Block Chain:
Block Chain technology exists to provide distributed ledgers without any single central authority.
Regardless of where the ledger goes, the integrity of the transactions remain complete and correct.
Digital payments systems like Bitcoin proved block chains are both practical and effective.
Many financial record keeping systems could benefit from using block chain technology that frees ledgers from being owned by any single company or government.
Insurance systems with long complex supply chains would greatly benefit from block chain technology - Eliza.
Export-Import systems with distributed supply chains would greatly benefit from block chain technology - TIES/E2K.
Cyber attacks against block chains may not be possible because so many copies of all block chains exist.

Finance:
Imagine the application service with block chain accounts that cannot be lost, cannot be altered, cannot be fraudulenty changed by criminals and are safe from all malware.   Block chain accounts have that potential and that potential is worth building into all existing financial accounting services.   One day soon, all financial services will be built using block chain integrity - distributed database technology for all payment systems.
Block chain is disruptive technology with focus on risk management, compliance and cost reduction.   Block chain is peer-to-peer without a single point of failure - back office evaporates as it serves no purpose.   "R3" is the consortuim founded by RBS and including Barclays, Goldman Sachs, UBS, JP Morgan, LeXica and many others.   The only job that block chain will do is moving money from one party to another - simple, focused, but so slow and expensive with old ledger systems.

Copy or Move:
Virtually every computer system is good at coping things but not so good at moving things.   When a coin or five pound note is passed from one person to another, the movement of the money is self-evident and fool-proof.   But when a computer tries to move a coin or five pound note from one person to another, the original person still has the original and the other person gets a copy.   Music, films, TV, pictures all suffer the same problem - they are easy to copy but hard to move to the original no longer exists.
Block chain is a mechanism to build ownership into each and every copy.   The block chain keeps detailed records of who had it and who has it now - and this data is replicated thousands or millions of times.

Replicated Data:
One aspect of block chain that is worth further analysis is block data replication.   When data is replicated many thousands of times, the possibility of that data being lost are zero.   The possibility of a criminal attack that could simultaniously change many thousands of copies of the same data is zero.   Replicated data cannot be attacked by a virus or malware - much of the data in a block chain is frozen.
The block chain is compressed and encoded as a kind of encryption that can detect errors, corruption, inserts, updates and deletions.   To add-to a block chain, cooperation from all other block chains or a master block chain is needed.
Policy: all data must be replicated to many distributed secure data centers - just ten copies means the data cannot be lost or altered by criminals or malware.