• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Bitcoin - Understanding and Assessing potential Opportunities
 

Bitcoin - Understanding and Assessing potential Opportunities

on

  • 45,349 views

Analysis on Bitcoin's technology, its evolution and ecosystem, focusing on potential opportunities to capture.

Analysis on Bitcoin's technology, its evolution and ecosystem, focusing on potential opportunities to capture.

Statistics

Views

Total Views
45,349
Views on SlideShare
24,089
Embed Views
21,260

Actions

Likes
142
Downloads
9
Comments
6

63 Embeds 21,260

http://www.fabricegrinda.com 11973
http://www.coindesk.com 6369
http://quasar-ventures.com 1944
http://www.scoop.it 123
https://twitter.com 109
http://truep2.wordpress.com 89
http://anneljostad.tumblr.com 75
http://feedly.com 57
http://assets.txmblr.com 53
http://ahabitcoin.com 49
http://jurnal.me 46
http://fjlabs.com 46
http://translate.googleusercontent.com 45
http://www.onlinemarketing-trends.com 42
https://way2-jabbr.azurewebsites.net 40
http://www.linkedin.com 26
http://digg.com 23
http://thiswillbeouryear.tumblr.com 14
http://tkrobotng.meltwater.com 14
http://www.labocacabarete.com 10
http://labocacabarete.com 10
http://ageonations.com 7
http://www.claessens.be 7
http://claessens.be 6
http://www.google.com 6
http://siliconcabarete.com 6
http://www.google.fr 6
http://www.fjlabs.com 4
http://www.canfieldpress.com 4
http://editor.daum.net 4
http://media.coindesk.com 3
http://www.thesellitapp.com 3
https://www.google.com 3
http://cluster1.cafe.daum.net 3
http://www.feedspot.com 3
http://fabriceland.com 2
http://131.253.14.98 2
http://sellitapp.org 2
http://www.google.co.uk 2
http://127.0.0.1 2
http://www.edgeconsul.org 2
http://qukuai.io 2
http://fabricegrinda.com 2
http://inoreader.com 2
https://www.rebelmouse.com 2
http://www.hanrss.com 1
http://www.sellitapp.org 1
http://www.ageonations.com 1
http://www.google.com.br 1
http://thesellitapp.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

16 of 6 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • The Bitcoin System is a decentralized network where each node contains information of all transactions made in the history of the system as ledgers. Nodes update their ledger when they receive the message of a new transaction and pass it on to the next node. So basically, it is a system that allows a group of computers to maintain a unified ledger.
  • How transactions workWhen Alice sends bitcoins to Bob, she broadcast a message with the accounts and the amount sent. To verify that the transaction is authentic a digital signature is used, always different for every new transaction.A digital signature is composed by a private key and a public key. The private key, only known by the owner, is used to create a signature, and the public key is used to verify the authenticity of that signature, without the need of revealing the private key. Public keys are actually the send to addresses in bitcoin.Since the digital signature depends on the private key and the message (transaction):each digital signature is different for every transaction and therefore can´t be reused by someone for a different transaction.the message is original, since any changes to the message would invalidate the signatureThe mathematical algorithms for digital signatures are the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Mathematical Trap Door.Ownership of funds is verified by links to previous transactions, called inputs. Each input must be sent completely in a transaction, so if you try to send an amount that not exactly match one of your inputs, you need to send any remaining amount back to yourself (called change). Therefore, the validity of each transaction is dependent on previous transactions.
  • How transactions workWhen Alice sends bitcoins to Bob, she broadcast a message with the accounts and the amount sent. To verify that the transaction is authentic a digital signature is used, always different for every new transaction.A digital signature is composed by a private key and a public key. The private key, only known by the owner, is used to create a signature, and the public key is used to verify the authenticity of that signature, without the need of revealing the private key. Public keys are actually the send to addresses in bitcoin.Since the digital signature depends on the private key and the message (transaction):each digital signature is different for every transaction and therefore can´t be reused by someone for a different transaction.the message is original, since any changes to the message would invalidate the signatureThe mathematical algorithms for digital signatures are the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Mathematical Trap Door.Ownership of funds is verified by links to previous transactions, called inputs. Each input must be sent completely in a transaction, so if you try to send an amount that not exactly match one of your inputs, you need to send any remaining amount back to yourself (called change). Therefore, the validity of each transaction is dependent on previous transactions.
  • How transactions workWhen Alice sends bitcoins to Bob, she broadcast a message with the accounts and the amount sent. To verify that the transaction is authentic a digital signature is used, always different for every new transaction.A digital signature is composed by a private key and a public key. The private key, only known by the owner, is used to create a signature, and the public key is used to verify the authenticity of that signature, without the need of revealing the private key. Public keys are actually the send to addresses in bitcoin.Since the digital signature depends on the private key and the message (transaction):each digital signature is different for every transaction and therefore can´t be reused by someone for a different transaction.the message is original, since any changes to the message would invalidate the signatureThe mathematical algorithms for digital signatures are the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Mathematical Trap Door.Ownership of funds is verified by links to previous transactions, called inputs. Each input must be sent completely in a transaction, so if you try to send an amount that not exactly match one of your inputs, you need to send any remaining amount back to yourself (called change). Therefore, the validity of each transaction is dependent on previous transactions.
  • How transactions workWhen Alice sends bitcoins to Bob, she broadcast a message with the accounts and the amount sent. To verify that the transaction is authentic a digital signature is used, always different for every new transaction.A digital signature is composed by a private key and a public key. The private key, only known by the owner, is used to create a signature, and the public key is used to verify the authenticity of that signature, without the need of revealing the private key. Public keys are actually the send to addresses in bitcoin.Since the digital signature depends on the private key and the message (transaction):each digital signature is different for every transaction and therefore can´t be reused by someone for a different transaction.the message is original, since any changes to the message would invalidate the signatureThe mathematical algorithms for digital signatures are the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Mathematical Trap Door.Ownership of funds is verified by links to previous transactions, called inputs. Each input must be sent completely in a transaction, so if you try to send an amount that not exactly match one of your inputs, you need to send any remaining amount back to yourself (called change). Therefore, the validity of each transaction is dependent on previous transactions.
  • To prevent double spending, for each input, nodes check every other transaction ever made to make sure that input hasn't already been used before. Outputs are more mathematical puzzles than addresses. Sending money in bitcoin is like putting it in a public locker and attaching a math puzzle that must be solved to open it, and it is specifically designed so only the owner of a specific public key can solve it.So, the “balance of bitcoins” for a given private key are all the outputs that are referenced to its public key, that haven't been used as inputs in later transactions.
  • http://www.forbes.com/sites/kashmirhill/2013/11/06/bitcoin-is-not-broken/http://hackingdistributed.com/2013/11/04/bitcoin-is-broken/https://en.bitcoin.it/wiki/Myths
  • http://motherboard.vice.com/blog/whos-building-bitcoin-an-inside-look-at-bitcoins-open-source-development
  • The technology adoption lifecycle summarises how communities respond to discontinuousinnovation, i.e. new products that require the end user and the marketplace to dramaticallychange their past behaviour to achieve the promise of equally dramatic new benefits. Pastexamples of this are fax machines, personal computers, spreadsheets and electronic mail.The original work from as early as the 1950’s has been extended by Geoffrey Moore in his booksCrossing the Chasm and Inside the Tornado to include his observation of a large gap betweenthe take up of new technology by technology enthusiasts and the majority market.Visionaries (Early Market):IntuitiveSupport RevolutionContrarianBreak away from the packFollow their own dictatesTake RisksMotivated by future opportunitiesPragmatists (Majority Market):AnalyticSupport EvolutionConformistStay with the herdConsult with their colleaguesManage risksMotivated by present problemsThe Chasm Model has a number of key implications for consideration when developing strategyfor innovation. It should be obvious that the majority of the profit and revenue is made by themarket leader in the majority market.What is less obvious, but crucially important, is that market leader in the majority market willprobably be the market leader when the market takes off.The only cost effective way for vendors that are not leading in a majority market (assuming theleader does not make major mistakes) to attain market leadership is to either introduce or rideon the back of a discontinuous innovation i.e. work in a different market.Moore has developed the concepts in Inside the Tornado to identify 6 parts of the lifecycle thatneed to be considered when developing strategy.• The Early Market, a time of great excitement when customers are technology enthusiasts andvisionaries looking to be first to get on board with the new paradigm.• The Chasm, a time of great despair, when the early market’s interest wanes but themainstream market is still not comfortable with the immaturity of the solutions available.• The Bowling Alley, a period of niche-based adoption in advance of the general marketplace,driven by compelling customer needs and the willingness of vendors to craft niche-specificwhole products.• The Tornado, a period of mass market adoption when the general marketplace switches overto the new infrastructure paradigm.• Main Street, a period of aftermarket development, when the base infrastructure has beendeployed and the goal now is to flesh out its potential• End of Life, which can come all too soon in high tech because of the semiconductor enginedriving price/performance to unheard of levels, enabling wholly new paradigms to come tomarket and supplant the leaders who themselves had only just arrived.

Bitcoin - Understanding and Assessing potential Opportunities Bitcoin - Understanding and Assessing potential Opportunities Presentation Transcript