SlideShare a Scribd company logo
1 of 5
Non-Fungible Token (NFT)
What is a Non-Fungible Token? NFT
Unique Metadata describes what makes this asset different from others
Transferable NFT can be freely traded on specific markets
Ownable Blockchain technology helps improve ownership
Indivisible NFT cannot be split into smaller denominations
Current misuse of Non-Fungible Token
(NFT) digital file sold for $500
What was brought?
Ownership?
IP Rights?
Someone paid $500 to buy an entry on a ledger
Who paid whom? – identity matters
Purchasing the NFT does not mean the NTF holder has full rights of intellectual property ownership:
There is no:
Digital rights management
Copy protection
Guarantee of availability
Benefits of Non-Fungible Token (NFT)
Traceability
Proof of authenticity
Cost reduction
Value Non-Fungible Token (NFT) bring
Ownership
Traceability
Authenticity
Security
Safety

More Related Content

Similar to Non-Fungible Token (NFT).pptx

Non-fungible token
Non-fungible tokenNon-fungible token
Non-fungible tokenBlock Coders
 
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)Linda John
 
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...RoyknArt
 
NFT in Supplychain.pptx
NFT in Supplychain.pptxNFT in Supplychain.pptx
NFT in Supplychain.pptxNickjohn33
 
nft development company (4).pdf
nft development company (4).pdfnft development company (4).pdf
nft development company (4).pdfRuhi Grover
 
Non-fungible tokens (nfts)
Non-fungible tokens (nfts)Non-fungible tokens (nfts)
Non-fungible tokens (nfts)Gene Leybzon
 
What are fractionalized NFTs and how do they work.pdf
What are fractionalized NFTs and how do they work.pdfWhat are fractionalized NFTs and how do they work.pdf
What are fractionalized NFTs and how do they work.pdfProlitus Technologies
 
Why are so many business owners eager to create their own NFT tokens?
Why are so many business owners eager to create their own NFT tokens?Why are so many business owners eager to create their own NFT tokens?
Why are so many business owners eager to create their own NFT tokens?Brugusoftwaresolutions
 
NFT Development Agency
NFT Development  AgencyNFT Development  Agency
NFT Development AgencyAneesha Rana
 
The Ultimate Guide to NFT What It Is and How It Works.pdf
The Ultimate Guide to NFT What It Is and How It Works.pdfThe Ultimate Guide to NFT What It Is and How It Works.pdf
The Ultimate Guide to NFT What It Is and How It Works.pdfTechugo Inc
 
NON-FUNGIBLE TOKEN(nft).pptx
NON-FUNGIBLE TOKEN(nft).pptxNON-FUNGIBLE TOKEN(nft).pptx
NON-FUNGIBLE TOKEN(nft).pptxiqbaalfozia565
 
Best NFT Marketplace Development (1).pdf
Best NFT Marketplace Development (1).pdfBest NFT Marketplace Development (1).pdf
Best NFT Marketplace Development (1).pdfBlockchainX
 
Nft development company
Nft development companyNft development company
Nft development companyAlladin Nasir
 

Similar to Non-Fungible Token (NFT).pptx (20)

NFT Development
NFT DevelopmentNFT Development
NFT Development
 
NFT Development
NFT DevelopmentNFT Development
NFT Development
 
nft.pptx
nft.pptxnft.pptx
nft.pptx
 
Non-fungible token
Non-fungible tokenNon-fungible token
Non-fungible token
 
Non fungible token(nf ts)
Non fungible token(nf ts)Non fungible token(nf ts)
Non fungible token(nf ts)
 
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
What is NFT? | A Complete Use-Cases of Non-Fungible Token (NFT)
 
NFT
NFTNFT
NFT
 
Understanding nft
Understanding nft Understanding nft
Understanding nft
 
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...
A Guide to Crypto Collectibles and Non-fungible Tokens NFTS (crypto, cryptocu...
 
NFT in Supplychain.pptx
NFT in Supplychain.pptxNFT in Supplychain.pptx
NFT in Supplychain.pptx
 
nft development company (4).pdf
nft development company (4).pdfnft development company (4).pdf
nft development company (4).pdf
 
Non-fungible tokens (nfts)
Non-fungible tokens (nfts)Non-fungible tokens (nfts)
Non-fungible tokens (nfts)
 
NFT Explained
NFT ExplainedNFT Explained
NFT Explained
 
What are fractionalized NFTs and how do they work.pdf
What are fractionalized NFTs and how do they work.pdfWhat are fractionalized NFTs and how do they work.pdf
What are fractionalized NFTs and how do they work.pdf
 
Why are so many business owners eager to create their own NFT tokens?
Why are so many business owners eager to create their own NFT tokens?Why are so many business owners eager to create their own NFT tokens?
Why are so many business owners eager to create their own NFT tokens?
 
NFT Development Agency
NFT Development  AgencyNFT Development  Agency
NFT Development Agency
 
The Ultimate Guide to NFT What It Is and How It Works.pdf
The Ultimate Guide to NFT What It Is and How It Works.pdfThe Ultimate Guide to NFT What It Is and How It Works.pdf
The Ultimate Guide to NFT What It Is and How It Works.pdf
 
NON-FUNGIBLE TOKEN(nft).pptx
NON-FUNGIBLE TOKEN(nft).pptxNON-FUNGIBLE TOKEN(nft).pptx
NON-FUNGIBLE TOKEN(nft).pptx
 
Best NFT Marketplace Development (1).pdf
Best NFT Marketplace Development (1).pdfBest NFT Marketplace Development (1).pdf
Best NFT Marketplace Development (1).pdf
 
Nft development company
Nft development companyNft development company
Nft development company
 

More from The Cryptography Centre For Excellence (13)

Introduction multiparty computation
Introduction multiparty computationIntroduction multiparty computation
Introduction multiparty computation
 
Cryptography is all we can trust
Cryptography is all we can trustCryptography is all we can trust
Cryptography is all we can trust
 
Joe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum CryptographyJoe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
 
fips140-3compliance
fips140-3compliancefips140-3compliance
fips140-3compliance
 
Exemplar of Cryptography Vulnerabilities
Exemplar of Cryptography VulnerabilitiesExemplar of Cryptography Vulnerabilities
Exemplar of Cryptography Vulnerabilities
 
Poor uses of cryptography
Poor uses of cryptographyPoor uses of cryptography
Poor uses of cryptography
 
Quantum Cryptography
Quantum Cryptography  Quantum Cryptography
Quantum Cryptography
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
 
Bitcoins introduction
Bitcoins introduction Bitcoins introduction
Bitcoins introduction
 
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
 
Cryptography Inventory
 Cryptography Inventory Cryptography Inventory
Cryptography Inventory
 

Recently uploaded

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Non-Fungible Token (NFT).pptx

  • 2. What is a Non-Fungible Token? NFT Unique Metadata describes what makes this asset different from others Transferable NFT can be freely traded on specific markets Ownable Blockchain technology helps improve ownership Indivisible NFT cannot be split into smaller denominations
  • 3. Current misuse of Non-Fungible Token (NFT) digital file sold for $500 What was brought? Ownership? IP Rights? Someone paid $500 to buy an entry on a ledger Who paid whom? – identity matters Purchasing the NFT does not mean the NTF holder has full rights of intellectual property ownership: There is no: Digital rights management Copy protection Guarantee of availability
  • 4. Benefits of Non-Fungible Token (NFT) Traceability Proof of authenticity Cost reduction
  • 5. Value Non-Fungible Token (NFT) bring Ownership Traceability Authenticity Security Safety