What is cryptocurrency?, Blockchain, Bitcoin, Bitcoin Mining, Facts about Bitcoin Different types of cryptocurrencies, Cryptocurrency in India, Supreme court on cryptocurrency. Advantages and disadvantages of cryptocurrencies, Do we Invest?, Conclusion.
It was my first presentation on cryptocurrency during my sophomore year in college. This presentation covers the basic understanding of cryptocurrency, working of cryptocurrency, bitcoin, blockchain and it's the difference between normal currency and cryptocurrency.
What is cryptocurrency?, Blockchain, Bitcoin, Bitcoin Mining, Facts about Bitcoin Different types of cryptocurrencies, Cryptocurrency in India, Supreme court on cryptocurrency. Advantages and disadvantages of cryptocurrencies, Do we Invest?, Conclusion.
It was my first presentation on cryptocurrency during my sophomore year in college. This presentation covers the basic understanding of cryptocurrency, working of cryptocurrency, bitcoin, blockchain and it's the difference between normal currency and cryptocurrency.
Among the learning objectives:
A. Crypto-currencies :
• The definition, history and evolution of the thousands of
crypto-currencies in the market, with their pros and
cons.
• Getting, mining and trading using cryptocurrencies.
• The legal status of this new technology in Lebanon and
different countries of the world.
• The possible future of crypto-currencies.
B. Blockchain :
• The technology behind crypto-currencies : concepts,
history, security, pros and cons.
• Examples and case studies of Blockchain applications.
C. ICOs :
• A new way for raising capital for companies and start-
ups.
• History and ICO phases.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
A cryptocurrency (or crypto currency) is digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.
presention about crypto currencies and bitcoins. A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange that uses cryptography to secure its transactions, to control the creation of additional units, and to verify the transfer of assets.
Welcome to our channel,
A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions,
control the creation of additional units, and verify the transfer of assets. Cryptocurrencies use decentralized control as opposed to centralized digital currency and central banking systems. This channel was created to share news and opportunities related to crypto space.
Check our website: https://www.everythingcrypto.club/
Join our private channel group: http://bit.ly/2YoWzFr
Follow us on social media :
Youtube : https://bit.ly/3bkoeiE
Instagram: https://www.instagram.com/everythingincrypto
Telegram : https://t.me/everythingincrypto
vkontakte : https://vk.com/public184024328
Twitter : https://twitter.com/everythingcryp5
Medium : https://medium.com/everythingincrypto
Linkedin: https://www.linkedin.com/company/everythingcrypto
what's cryptocurrency all about?
What's cryptocurrency?
What does cryptocurrency mean?
What does crypto mean?
#everythingcrypto #whatscryptocurrency #cryptocurrency #bitcoin #crypto #ethereum #freecrypto #freebitcoin #earnfreetoken #earnfreebitcoin
Cryptocurrency is the future of money or the next generation of money. Cryptocurrencies investments have seen a gradual rise over the years which depicts the general acceptance. Currently, as per the latest crypto news, we are seeing a big change in cryptocurrencies due to the emergence of institutional and smart money.
https://www.cryptoknowmics.com/
Among the learning objectives:
A. Crypto-currencies :
• The definition, history and evolution of the thousands of
crypto-currencies in the market, with their pros and
cons.
• Getting, mining and trading using cryptocurrencies.
• The legal status of this new technology in Lebanon and
different countries of the world.
• The possible future of crypto-currencies.
B. Blockchain :
• The technology behind crypto-currencies : concepts,
history, security, pros and cons.
• Examples and case studies of Blockchain applications.
C. ICOs :
• A new way for raising capital for companies and start-
ups.
• History and ICO phases.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
A cryptocurrency (or crypto currency) is digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.
presention about crypto currencies and bitcoins. A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange that uses cryptography to secure its transactions, to control the creation of additional units, and to verify the transfer of assets.
Welcome to our channel,
A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions,
control the creation of additional units, and verify the transfer of assets. Cryptocurrencies use decentralized control as opposed to centralized digital currency and central banking systems. This channel was created to share news and opportunities related to crypto space.
Check our website: https://www.everythingcrypto.club/
Join our private channel group: http://bit.ly/2YoWzFr
Follow us on social media :
Youtube : https://bit.ly/3bkoeiE
Instagram: https://www.instagram.com/everythingincrypto
Telegram : https://t.me/everythingincrypto
vkontakte : https://vk.com/public184024328
Twitter : https://twitter.com/everythingcryp5
Medium : https://medium.com/everythingincrypto
Linkedin: https://www.linkedin.com/company/everythingcrypto
what's cryptocurrency all about?
What's cryptocurrency?
What does cryptocurrency mean?
What does crypto mean?
#everythingcrypto #whatscryptocurrency #cryptocurrency #bitcoin #crypto #ethereum #freecrypto #freebitcoin #earnfreetoken #earnfreebitcoin
Cryptocurrency is the future of money or the next generation of money. Cryptocurrencies investments have seen a gradual rise over the years which depicts the general acceptance. Currently, as per the latest crypto news, we are seeing a big change in cryptocurrencies due to the emergence of institutional and smart money.
https://www.cryptoknowmics.com/
Blockchain technology is currently taking over the world with its amazing features. This presentation covers all you need to know about the basics of blockchain technology with beautiful animations
Presentation Titled " Bitcoin and Ransomware Analysis " we discuss ransomware and how bitcoin are being utlized in cyber crime. we also have look at Bitcoin mining, Bitcoin trading market and block chain concept.
In the presentation Titled " Bitcoin and Ransomware Analysis " we discuss ransomware and how bitcoin are being utlised in cyber crime. we also have look at Bitcoin mining, trading and block chain concept.
Over the past year, we have seen a rapid increase of interest in regards to the Blockchain Technology. During this presentation, we will break down the very basics of what the mysterious Blockchain actually is. We will cover what the Blockchain comprises of, hashing and proof of work, what happens during a transaction and the case for a global currency.
Main points covered:
• Outline potential uses for the technology and what it means for you.
• Secured Hash Algorithm 256 and the proof of work concept.
• What happens during a transaction?
• Breakdown the beginnings of bitcoin.
Presenter:
Our presenter for this webinar will be Kenneth Kimbel who is a cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Kenneth has knowledge on both current technical and legal issues in security.
Link to the recorded webinar: https://youtu.be/mSiAqOZ6fNs
A short 101 on blockchain and cryptocurrencies - What is blockchain? How to get started investing in crypto? Tactical tips for keeping your investment secure. Presentation for Blockchain & Cryptocurrency Meetup at WeWork San Francisco, Oct 23 2017.
During this presentation, we will cover a brief introduction into Blockchain technology, historic use cases & emerging trends for Blockchain technology. We will also touch on what to expect from Blockchain technology in 2019. It is important to understand the progress that is being achieved every day with every single step we take towards real use cases for Blockchain projects. 2019 might be the first year where the Blockchain starts to become a central part in people’s lives and in some industries.
Main points covered:
• Conduct a brief introduction to Blockchain technology;
• Discuss both historic use cases and emerging trends for Blockchain technology;
• What to expect from Blockchain technology in 2019
Presenter:
Our presenter for this webinar is Kenneth Kimbel, a Cybersecurity professional with over five years of overall experience providing diverse technology services in client-facing roles. Recent Master’s in Cybersecurity Risk Management as well as a JD with a Cybersecurity Law focus. Currently, Kenneth is a data privacy and Cybersecurity Advisory Consultant with Deloitte. He is also knowledgeable on both current technical and legal issues in security.
Date: March 27th, 2019
Recorded webinar: https://youtu.be/fLjVgj6MAPY
Michael bowen | High risk specialist |Card not present transaction expert JayWigdore
In a day that more and more banks are shying away from the risk, Go Payment Pros has continued to fight for their clients to stay profitable. Go Payment Pros can place you High Risk Merchant Account with all the risk factors in mind. They don’t just place accounts, they help keep them alive. Call Go Payment Pros today and see the difference in true High Risk Payment Proces
An introductory presentation discussing the basics of technology behind blockchain, cryptocurrency mining, and an attempt to value a cryptocurrency. Further discussion on altcoins, and a preview on ICOs.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
1. ENTER THE MATRIX:
THE WORLD OF BITCOIN,
CRYPTOCURRENCY, AND BLOCKCHAIN
BY MAX WHEELOCK
2. WHAT WE’LL DISCUSS
• What it is
• How it began
• How it works
• How it will change the world
3. CREDENTIALS
• Been researching in this space for 7
months
• Been investing for 6 months
• Have made a return of 160% over that
period
• Have introduced into this space and
educated over 50 people
4. WHAT IS IT?
• Bitcoin – a peer-to-peer electronic cash
system
• Deflationary
• Finite amount
• Cryptocurrency – a virtual currency that
uses encryption to prevent “double
spending”
• Blockchain – a decentralized, trustless
ledger (list of transactions), on which only
additions can be made
• The ledger history can never be changed
• All computers on the blockchain have the
ledger
5. WHAT IS IT?
• A system that allows for the digital exchange of tangible
assets
6. HOW IT BEGAN
• Satoshi Nakamoto
• Bitcoin’s anonymous creator
• Believed to be a pseudonym
• Published bitcoin’s white
paper in 2009
• Dive Deeper? Yes/No
• 1990s Cyberpunks
• Digicash, Bitgold and others
• First known experimentation with virtual
currency
• Could not figure out how to make it trustless
• Financial collapse of 2008
• Poor fiscal management by banks, investment
firms, and government
• The world had a need to get away from the
central authority of money
7. BLOCKCHAIN EXPLAINED
• The Yap Tribe
• All tribespeople know and keep track of every
transaction within their village
• They all know who owns what and how much
• Any time a transaction is made all the people in
the tribe are gathered and are told of the
transaction
• Subsequently, they all “update” the database in
their head of who owns what
This giant stone is their
currency
9. HOW IT WORKS
• Hashing – takes input of any
size, performs an operation,
and returns an output of a
fixed size
• Common for password
storage
• This is how the blockchain is
able to securely encrypt
transactions
10. WHERE DOES IT COME FROM?
• Mining (mining rigs) –
computer processors
connected to the blockchain
that validate transactions by
solving complex
cryptographic hashing
algorithms
• Coins are given as rewards
to the machine/person that
solves the algorithm
12. WHAT GIVES IT VALUE?
• It is worth what people will pay for it
• Supply and Demand
• What gives our dollars value?
13. FIAT VS CYRPTOCURRENCY
Fiat (USD, Euro, GBP) Cryptocurrency (Bitcoin, Ethereum, IOTA)
• Controlled by banks and governments
• Created by governments
• Inflationary
• Infinite supply
• Can be created at any time
• Open M – F, 9 to 5
• Controlled by the people that use it
• Created by solving math algorithms
(mined)
• Deflationary
• Finite supply
• Set amount released every year
• Open 24/7/365
14. IS IT SAFE?
• Blockchain is unhackable
• Altering the ledger would require 51%
ownership/takeover of the network
• Personal
• Hashing and cryptography hide
password input
• Private keys are 64 characters long
• XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXX
• Danger still lies in 3rd party
exchanges holding your wallet
Typical Database Security = 1
central point for hackers to focus
on
Blockchain Secutiry = millions of
points, hacker would have to
simultaneously hack every
computer
15. HOW IS IT TAXED
• IRS Notice 2014-21
• https://www.irs.gov/irb/2014-16_IRB#NOT-2014-21
• Has yet to make a formal statement on 1031 exchange
16. HOW IT WILL CHANGE THE WORLD
• People are in control of their money
• Electronic trading of tangible assets
• real estate
• vehicles
• Instantly and extremely cheaply send money abroad
• Avg transaction fee (Ethereum) = $1.10
• Avg transaction fee (Western Union) = 9-10%
• Avg transaction fee (Visa) = 3%
• Give access of the global financial market to the nearly 2 billion people who
do not/cannot get bank accounts
• Prevent fraud
• Voting
• Banking
17. IS IT TOO LATE TO INVEST?
• According to a study
by Cambridge
Center for
Alternative Finance
in May 2017
approximately 3
million people own
cryptocurrency