Research Paper on Blockchain - Information Systems
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used? Your paper should meet the following requirements: Be approximately four to six pages in length, not including the required cover page and reference page. Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Impact of Blockchain on IT Audit Blockchain Technology Overview Three Levels of Blockchain, Tokens Alliances and Industry Adoption Smart Contracts Identity Management Criticism and Challenges Impact on the IT Audit Function Learning and Engagement Agenda 2 Blockchain technology is a digital innovation that is poised to significantly alter financial markets within the next few years, within a cryptographic ecosystem that has the potential to also significantly impact trusted computing activities and therefore cybersecurity concerns as a whole. Blockchain Overview . 3 How many of you: Have heard of bitcoins? Own cryptocurrency? Feel you understand the underlying blockchain technology? Feel you can summarize for us the benefits of the “trust economy”? Are involved in projects that involve blockchain technology implementation or related activities? Student Exposure 4 Where It All Started Blockchain technology was first introduced in a whitepaper entitled: “Bitcoin: A Peer-to-Peer Electronic Cash System,” by Satoshi Nakamoto in 2008. No reliance on trust Digital signatures Peer-to-peer network Proof-of-work Public history of transactions Honest, independent nodes control majority of CPU computing power Nodes vote with CPU computing power Rules and incentives enforced through consensus mechanism https://bitcoin.org/bitcoin.pdf 5 Cryptocurrency Summarized Bitcoin was the first digital, i.e., cryptocurrency A maximum of 21 million Bitcoins can be generated Just as with real world mining, energy must be invested to solve complex mathematical problems by which systems earn Bitcoins https://www.cryptocoincharts.info/coins/info claims to be indexing 4,220 cryptocurrencies Most circulated: Bitcoin, Ethereum, Litecoin 6 The Technology Behind Bitcoin Think of Bitcoin as an electronic asset (as well as a digital currency) A network of computers keeps track of Bitcoin payments, and adds them to an ever-growing list of all the Bitcoin payments that have been made, called “The Bitcoin Blockchain” The file that contains data about all the Bitcoin transactions is often called a “ledger” Bitcoin value is created through transaction processing, referred to as “mining,” which is performed by distributed processors called “nodes” of the peer-to-peer network A Gentle Introduction to Bitcoin by Antony Lewis, https://bravenewcoin.com/assets/Reference-Papers/A-Gentle-Introduction/A-Gentle-Introduction-To-Bitcoin-WEB.pdf 7 Mining Evolution Mining is the process whereby value is created through transaction processing that occurs on nodes of the network. In 2009, one could mine 200 Bitcoins with a personal, home computer. In 2015, it would take about 98 years to mine just 1 Bitcoin. Today there is almost no money to be made through traditional home mining. ASIC (Application Specific Integrated Circuit) has been designed strictly for mining Bitcoins. Groups of miners have formed mining pools, with each being paid their relative share for their contribution to the work performed. My Dirty Little Bitcoin Secrets by Ofir Beigel, www.99bitcoins.com 8 Storage for digital records Exchanging digital assets (called tokens) Executing smart contracts Ground rules – Terms & conditions recorded in code Distributed network executes contract & monitors compliance Outcomes are automatically validated without third party Tech Trends 2017, The Kenetic Enterprise, “Blockchain: Trust economy”, Deloitte University Press, 2017 Three “Levels” of Blockchain 9 A broader use is supported by the digital infrastructure introduced through Bitcoin, as represented by “tokens”. A “token” can be defined as a “scarce digital asset based on underlying technology inspired by Bitcoin.” Tokens may use similar codebases but different blockchain databases. Ethereum was Bitcoin-inspired but has its own blockchain and is engineered to be more programmable. Tokens can be issued on top of the Ethereum blockchain. Token buyers are buying private keys, which are similar to API keys, but can be transferred to other parties without consent. “Thoughts on Tokens”, Balaji S. Srinivasan and Naval Ravikant A General Discussion about Tokens 10 Tokens have a value and therefore a price. Tokens are a new model for technology and can be an alternative to equity-based financing. Tokens do not dilute capital. They introduce a huge increase to buyer base and time-to-liquidity. Token launches differ from equity sales; however, they can be issued as a way to share profits. Tokens can be sold internationally over the internet and are always open for business. Tokens decentralize the process of funding technology. Thoughts on Tokens, Balaji S. Srinivasan and Naval Ravikant Tokens, continued 11 Tokens enable a better-than-free new business model. Tokens will introduce the rise of the “tech savvy senior executive.” Tokens accommodate immediate custody without an intermediary. Tokens can be extended to hardware, as part of the internet of things. Thoughts on Tokens, Balaji S. Srinivasan and Naval Ravikant Tokens, continued 12 Smart Contracts Consensus protocols are key to determining the sequence of actions resulting from the contract’s code. This enables peer-to-peer trading of everything from renewable energy to automated hotel room bookings. “Contracts Get Smarter with Blockchain”, CIO Journal, The Wall Street Journal, World Trade Organization, International Trade Statistics 2015, 2015, p. 41. Current paper-based systems drive $18 trillion in transactions per year. 13 Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing, and technology. Business Blockchain Frameworks are hosted with Hyperledger. Hyperledger addresses important features for a cross-industry open standard for distributed ledgers. The Linux Foundation hosts Hyperledger as a Collaborative Project under the foundation.  To learn more, visit: https://www.hyperledger.org /. www.hyperledger.org Hyperledger 14 Hyperledger Projects A few of the Hyperledger Projects include: Hyperledger Burrow – Permissible smart contract machine with a modular blockchain client, built in part to the specification of the Ethereum Virtual Machine (EVM) Hyperledger Fabric – Foundation for developing plug-n-play solutions within a modular architecture Hyperledger Iroha – Simple and easy blockchain framework designed to be incorporated into infrastructure projects requiring distributed ledger technology Hyperledger Sawtooth – A modular platform for building, deploying, and running distributed ledgers 15 Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud, or third party interference. The Ethereum project was bootstrapped via an ether pre-sale during August 2014 by fans all around the world. It is developed by the Ethereum Foundation, a Swiss nonprofit, with contributions from individuals and organizations across the globe. www.ethereum.org Ethereum Alliance 16 Several Ethereum offerings include: The  Ethereum Wallet, which is a gateway to decentralized applications on the Ethereum blockchain, allowing users to hold and secure ether and other crypto-assets built on Ethereum, as well as write, deploy and use smart contracts Design and issue your own cryptocurrency/traceable token Kickstart a project with Crowdsale www.ethereum.org Ethereum Tools 17 Ether is the crypto-fuel for the Ethereum network. Ether is a necessary element – a fuel – for operating the distributed application platform Ethereum. It is a form of payment made by the clients of the platform to the machines executing the requested operations, functioning as the incentive that ensures that developers will write quality applications, and that the network remains healthy. The total supply of ether and its rate of issuance was decided by the donations gathered on the 2014 presale. Developers who intend to build apps that will use the Ethereum blockchain need ether. Users who want to access and interact with smart contracts on the Ethereum blockchain also need ether. www.ethereum.org What is Ether? 18 Cross-Industry Adoption Sectors leading the way in blockchain implementation: Consumer products Manufacturing Technology Media Telecommunications Health care Life sciences Thirty-nine percent of the senior executives at large U.S. companies initially surveyed indicate they have little or no knowledge about blockchain technology. Many deemed it to be crucial for their companies and industries. Forty-two percent believe it will disrupt their industries. “Blockchain Adoption Varies by Industry”, CIO Journal, The Wall Street Journal 19 Financial Services Industry As noted by A. Michael Smith in “Creating Assurance in Blockchain,” trust and efficiency are the main value drivers for any use case. The finance world is driven by technology. Tracking risk and monitoring compliance with laws and regulations within an increasingly complex cybersecurity environment requires considerable time and resources. The financial services industry immediately saw opportunities in blockchain and has been investing heavily in its usage, primarily as a part of private implementations. Creating Assurance in Blockchain, Volume 2, 2017, by A. Michael Smith Banking on change: How to respond to new expectations for audit committees by PWC Internal Audit Foundation, Douglas Anderson, CIA, CRMA, Cassian Joe, and Klaas J. Westerling 20 Identity Management The IT audit is broadly concerned with identity management concerns. Protecting access to data, and the systems that are in place to process, store, and report on that data, requires ongoing resource dedication. Multiple solutions are available, all of which require configuring and managing multiple identifiers for an individual’s various identities. Identity management is an area that will certainly be impacted by widespread use of private keys to secure transactions. 21 Distributed Access Management Creating an identity on blockchain can give individuals greater control over who has their personal information and how they access it Areas impacted include passports, e-residency, birth certificates, wedding certificates, IDs, online account logins, etc Digital ID’s can provide digital watermarks that can be assigned to every online transaction of any asset “21 Companies Leveraging Blockchain for Identity Management and Authentication” by Elena Mesropyan, https://letstalkpayments.com/22-companies-leveraging-blockchain-for-identity-management-and-authentication/ 22 Protecting Private Keys Within the blockchain, trust relies on the safekeeping of private keys, in support of a truly distributed identity management Ultimately, that safekeeping resides with the actions taken by individuals to secure their private key For cryptocurrency traders, one frequently sees the recommendation to write one’s private key down on a piece of paper and put it up for safekeeping in, for example, a safe deposit box 23 Digital ID Solutions May 24, 2017, saw the release of a Digitial ID solution by Netki, a California blockchain startup Released at Consensus 2017, this is a highly-anticipated Digital ID smartphone app that uses Hyperledger blockchain to provide decentralized, open-source identity management Approved by governments, fully Anti-Money Laundering (AML) and Know Your Customer (KYC) inclusive https ://bravenewcoin.com/news/netki-launches-digital-id-solution-which-bitt-is-using-with-central-banks-in-the-caribbean/ 24 Criticism and Challenges Critics have cited the following blockchain challenges: Nascent technology Uncertain regulatory status Large energy consumption Control, security and privacy Integration concerns Cultural adoption Cost Challenges associated with audit, taxes, and compliance Creating Assurance in Blockchain, Volume 2, 2017, by A. Michael Smith Deloitte’s Blockchain technology: 9 benefits & 7 challenges, https://www2.deloitte.com/nl/nl/pages/innovatie/artikelen/blockchain-technology-9-benefits-and-7-challenges.html 25 An area of heavy criticism has to do with the vast amounts of energy necessary to process and store transactions, especially as the use of blockchain technology increases The Bitcoin blockchain network’s miners are attempting 450 thousand trillion solutions per second in efforts to validate transactions, using substantial amounts of computer power Note that there are also opportunities to decentralize the energy grid Wasted resources: Mining Bitcoin wastes huge amounts of energy ($15million/day) Deloitte’s Blockchain technology: 9 benefits & 7 challenges, https:// www2.deloitte.com/nl/nl/pages/innovatie/artikelen/blockchain-technology-9-benefits-and-7-challenges.html Blockchain in the Energy Sector: Institutional Disruption? By Marius Buchmann http://www.theenergycollective.com/enerquire/2402120/blockchain-energy-sector-institutional-disruption Energy Consumption 26 Summary Although the technology is still in its infancy, boundless usage opportunities exist The identity management landscape is likely to shift dramatically There is sure to be evolution within IT audit as various use cases unfold Features that create trust could drive unachievable overhead costs Compliance burden should eventually be eased as the technology is adopted, but this requires regulatory updates, which could take a while Tech Trends 2017, The Kenetic Enterprise, “Blockchain: Trust economy”, Deloitte University Press, 2017 27 A BRIEF INTRODUCTION TO BLOCKCHAIN The Trust Machine, THE ECONOMIST, Oct. 31, 2015  “To understand the power of blockchain systems, and the things they can do, it is important to distinguish between three things that are commonly muddled up, namely the bitcoin currency, the specific blockchain that underpins it and the idea of blockchains in general.” Phone vs. Blockchain Phone  The idea of a phone network  A specific phone network (e.g., AT&T)  A specific use of the phone network (e.g., fax) Blockchain  The idea of blockchain  The specific blockchain that underlies Bitcoin or another coin offering  Bitcoin or another cryptocurrency What is Blockchain? A technology that: permits transactions to be gathered into blocks and recorded; cryptographically chains blocks in chronological order; and allows the resulting ledger to be accessed by different servers. What is a Distributed Ledger? Centralized Ledger  There are multiple ledgers, but Bank holds the “golden record”  Client B must reconcile its own ledger against that of Bank, and must convince Bank of the “true state” of the Bank ledger if discrepancies arise Distributed Ledger  There is one ledger. All Nodes have some level of access to that ledger.  All Nodes agree to a protocol that determines the “true state” of the ledger at any point in time. The application of this protocol is sometimes called “achieving consensus.” What is a Distributed Ledger? Single Entity Multiple Entities How Might A Distributed Ledger Work? Where Might Blockchain Use Cryptography? The Power of Distributed Ledgers  The degree of trust between users determines the technological configuration of a distributed ledger. The Power of Distributed Ledgers Participation Open Closed Permission Permissionless Permissioned Ledger Design One ledger One ledger or Segregated ledgers Validation Methodology depends on degree of trust between nodes. Where there is no basis for trust, may be achieved through proof of work, which requires the algorithmic solving of a cryptographic hash. Consensus Mechanism Mechanism depends on degree of trust between nodes. Where there is no centralized authority, consensus may be determined algorithmically. References  Burns, S. (2019). Blockchain: Hype Vs Reality. Computer Weekly, 21-24. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138564674&site=eds-live  Carson, B., Romanelli, G., Walsh, P., & Zhumaev, A. (2018). Blockchain beyond the hype: What is the strategic business value? McKinsey Quarterly, (4), 118–127. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=133693412&site=eds-live  Stoyanovich, M., & Tanz, F. E. (2019). Coming to Grips with Blockchain. Benefits Magazine, 56(5), 20-25. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=135900272&site=eds-live  Tarzey, B. (2019). Inside Blockchain and Its Various Applications. Computer Weekly, 16-20. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138681123&site=eds-live  Waldo, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. Retrieved from https://doi.org/10.1145/3303868 http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138564674&site=eds-live http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=133693412&site=eds-live http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=135900272&site=eds-live http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138681123&site=eds-live https://doi.org/10.1145/3303868 A BRIEF INTRODUCTION TO BLOCKCHAIN The Trust Machine, THE ECONOMIST, Oct. 31, 2015 Phone vs. Blockchain What is Blockchain? What is a Distributed Ledger? What is a Distributed Ledger? How Might A Distributed Ledger Work? Where Might Blockchain Use Cryptography? The Power of Distributed Ledgers The Power of Distributed Ledgers References
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident