Training & Concepts
Bas Wisselink (@damelon, https://nl.linkedin.com/in/bwisselink) and Henk van Cann (@henkvancann, https://nl.linkedin.com/in/henkvancann) is co-founder of Blockchain Workspace that trains teams of experts and end-customer. We fulfill POC projects too. We are determined to explain complex technology in comprehensible terms. We develop training programs ranging from one day to one month.
Blockchain Workspace works together with 2Value. 2Value supplies the selection, hiring of experts and framework to do training and projects in a team constellation with customers.
The venture's focus is on blockchain training (architecture, engineering, development) and proof of concepts for/with customers. It is a globally operating enterprise that intends to expand via local distributors of training and methods to become knowledgeable and to explore the blockchain field for a specific application (POC: proof of concepts).The venture trains the trainers. The trainers train end-customers and fulfill POC projects.
Projects may run in a workspace and in a workplace (physically working together). The team consists of end-customers and blockchain-related experts. Scrum is a suitable project management method; POCs could take one week full time to three months part time.The unique character of our venture is build through realism about the abilities of blockchain technology now and in the future.
There is a lot of hype out there that has to be managed to save the good reputation the container concept 'blockchain' has in the outside world.Identity is the new subject for the old school third parties (banks, notaries, mobile phone operators, insurance companies, healthcare institutes, etc) that will lose power and influence over storing and transferring value.
The venture focuses on an elegant and effective combination of blockchain tech and e-identity by means of its training programs and project method. The training and methods can be adopted by local operators to service customers.Why has the blockchain been designed? We exclude the possibility of being corrupted. So we do have trust, but we take away the risk of being compromised.