February 4, 2016 By Larry Loeb 2 min read

Bloomberg recently reported that IBM, along with the Goldman Sachs Group Inc., made a move in the race to commercialize blockchain technology in financial markets. They both have invested in Digital Asset Holdings (DAH), one of a group of startups looking to break into the space. The newest investments bring the total sum raised by the company to $60 million, according to an official statement released on Feb. 2.

DAH Covers Australia

Today, the trading of securities relies on a central authority that coordinates the transfer of cash for traded shares. DAH wants to link all participants to the same database of transactions, which would allow almost real-time asset movement.

DAH is headed by former JPMorgan Chase & Co. banker Blythe Masters. Its products serve the entire financial ecosystem through the creation of tailored business logic applications, which use privately permissioned networks that employ a cryptographically secure shared infrastructure.

Last month, DAH finalized a contract that should greatly speed up settlement for the stock market in Australia. The contract added a layer of stature to the startup since it will be the first operational project of its kind using the blockchain-distributed ledger technology.

DAH hopes to achieve settlement of shares in Australia in mere minutes, compared to the three days now typical in the U.S. The company won out over 400 applicants for the contract to remake the country’s clearing and settlement system.

The Linux Blockchain Framework

This isn’t the first time IBM and DAH have collaborated. In December, they both joined with the Linux Foundation to create an open-source distributed ledger framework.

IBM contributed tens of thousands of lines of its existing code base and corresponding intellectual property to the effort. DAH contributed the Hyperledger mark — which was chosen as the project name — as well as code and developer resources.

“A broad, cross-industry and open-source approach is critical to advance the potential for blockchain and make it mainstream,” said Arvind Krishna, senior vice president and director at IBM Research, at the time. “Even beyond building out standards, creating common code will allow organizations to focus on creating industry-specific applications that enhance the value of this technology.”

A blockchain conference hosted by IBM will be held in February.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today