SlideShare a Scribd company logo
1 of 43
Download to read offline
From bits to bitcoin
Understanding the Blockchain and Digital Currencies
March 2016, by Marshall Swatt
marshallswatt@gmail.com
@marshallswatt
linkedin.com/in/marshallswatt
I. What is Bitcoin & Digital Currency? Backstory
II. State of the Industry
III. The Technology (Blockchain & P2P network)
• Q & A
• Resources
Outline
1. What is Bitcoin & Digital
Currency?
1CC3X2gu58d6wXUWMffpuzN9JAfTUWu4Kj
What Problems Is It Trying to Solve?
• Speculation about Fiat currency’s long-term stability
• Inflation
• ACH, Wire transfers take several days. Why?
• Financial Settlements take minimum T2. Why?
• Remittances are costly and retrieving funds is often
inconvenient
• Person-to-person transactions require intermediaries
• Feeds
• Privacy
• Privacy of personal data held by companies
• theft of personal data held by companies
1CC3X2gu58d6wXUWMffpuzN9JAfTUWu4Kj
1. A	currency	
2. Peer	to	Peer	Network,	built-in	support	for	payment	processing	
3. The	“blockchain”	ledger	&	its	technology
• ecache (David Chaum)
• hashcash - important ‘proof-of-work’ (Adam Back)
• b-money (Wei Dai)
• bit gold (Nick Szabo)
• RPOW (Hal Finney)
Prior Experiments
See https://en.wikipedia.org/wiki/History_of_Bitcoin
Strengths
• Anyone,	anywhere	can	parEcipate	&	use	
• Low/Zero	transacEon	costs,	enErely	market	driven	
• micro-transacEons	(.00000001BTC	=	a	‘Satoshi’)	
• No	intermediaries,	apart	from	the	network	itself	
• No	proof	of	idenEty	or	disclosure	of	private	details	
• “pseudo	anonymous”	-	does	not	guarantee	anonymity	
• Secure	transacEons	(SHA-256,	RSA	public/private	key)	
• All	transacEons	are	public	
• Irreversible,	no	charge-backs	like	credit	cards	
• ‘Complementary’	currency	
• No	‘Goldilocks’	currency	(either	inflaEonary	or	deflaEonary)	
• Compared	to	FIAT,	it	is	deflaEonary.	
• Rate	of	growth	declines	to	zero	(approx.	year	2140)	
• Widest	adopEon	of	any	digital	currency	to	date
• No inherent value? The cost of the network
• Apolitical, not subject to gov’t or private manipulation
Strengths
• Solves	the	‘ByzanEne	General’s	Dilemma’	
• Overcomes	‘ByzanEne’	faults	and	failures	
• Traitorous	Generals	
• IntercepEon,	forgery	
• Loss	of	a	general	
• Loss	of	message	
• No	double-spending	
• Open-source,	open-protocol,	capable	of	evolving	
• TransacEons	are	relaEvely	fast	
• Scriptable	transacEons	
• MulE-signature	(Security,	Escrow,	other)
Technical Features
Weaknesses
• Governance
• problem: the blocksize debate
• solved: “Transaction Malleability”
• User-Friendliness
• Small Market Size
• Price Volatility
• Gov’t Resistance
• Banking Resistance
• Incompatible Legal/Regulatory Framework
• Irreversible
• 51% Attack
• Supply Limitations
• Loss (of private key)
• Miner self-underpayment
• Willful destruction
Public Key (address) - receives funds and has a balance
publicly recorded on the ledger
Private Key - used to transact and move funds from the
corresponding public key to another public key
1CC3X2gu58d6wXUWMffpuzN9JAfTUWu4Kj
E9	87	3D	79	C6	D8	7D	C0	FB	6A	57	78	63	33	89	F4	
45	32	13	30	3D	A6	1F	20	BD	67	FC	23	3A	A3	32	62
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
or
Wallet
address 1
address 2
address 3
…
• Desktop, Laptop
• Server
• Raspberry Pi
• USB Thumb Drive stored in a vault
• Paper format
A Wallet is just a File
Initiate a Transaction
Your Laptop
Node Software
Your Wallet
address 1
address 2
address 3
…
Transaction
node
node
node
TCP
TCP
TCP
Transaction Recorded
Node n
Block 2
block n
…
Blockchain Ledger
Block 1
your transaction
transaction
transaction
transaction
transaction
transaction
transaction
…
Transaction
Pool
node
node
node
TCP
node
node
node
TCP
node
node
node
TCP
node
node
node
TCP
Mining
ASICASIC
ASIC
ASIC
ASIC
Pizzas and Exchanges
Media Coverage
1. Price Growth
2. Misconduct (Frauds, Scams, Improper Behavior)
Price
Media Coverage
Losses, Frauds, Scams &/or Incompetence
• Hard drive thrown out with $7.5MM bitcoin
• Disreputable Exchanges (Mt. Gox)
• Black Markets for illegal goods (Silk Road)
• Disreputable Mining Hardware, Cloud Mining
• Disreputable Mining Pools
• Disreputable Wallet Vendors, software vendors
2. State of the Industry
Regulation & Integration
• Gov’t regulations
• restrict growth and innovation
• prohibitively expensive hurdles for startups
• Resistance in some countries
• federal clarity, confusion (IRS, FinCen, Treasury,
CFTC, SEC, …)
• MT state level licensing/bonding (NY BitLicense, NJ,
CA)
• Lack of Bank Support of bitcoin businesses
• Severely restricts growth and innovation
• (Risk/Compliance, Understanding)
2010-2013
Exchanges, Wallet Vendors, Payment Providers, Mining Hardware
Manufacturers
Very early stage businesses (Core Infrastructure)
2015
ATMs, Micropayment, remittances, gambling, prediction markets,
payroll processing, basic lending/margin
Next Stage Businesses (leveraging Infrastructure)
New Companies: 21Inc
$113MM+ raised
$400USD
bitcoin computer
Around the Corner
Remittance Growth
Transparent Voting Systems
Transparent Accounting/Auditing Systems
T0 Settlement of Financial Transactions
Digital Identity (individuals and businesses)
Internet of Things (IOT)
Proof of ownership
Other Digital Currencies
Ethereum’s Ether (Smart Contracts) $10
Ripple’s XRP (faster transactions) $.008
Doge, Litecoin (traction) $.0002, $3.30
Side chains (augment bitcoin)
Plumbing?
Killer Consumer App?
Decentralized Autonomous Corporations?
Further in the Future
3. The Technology
(Blockchain & P2P network)
Standards
SSL/TLS,
HTTPS,
SSH
MD5,
DES,
SHA,
AES
DSS/DSA,
RSA, PGP
X.509
WEP,WPA
• Caesar Cipher (Substitution)
• Dictionary Code Cipher
• Enigma
• One-Time Pad
• RSA Public/Private Key (Asymmetric)
• Undergirds almost all modern encryption
Symmetric vs. Asymmetric Encryption
Choose	two	disEnct	prime	numbers	
p	=	61	and	q	=	53	
Compute	n	=	p	X	q	=	(61	X	53)	=	3233	
Compute	the	‘to#ent’	of	the	product	as	φ(n)	=	(p	−	1)(q	−	1)	
(61	-	1)(53	-	1)	=	3120	
Choose	a	number	1	<	e	<	3120	that	is	‘coprime’	to	3120		
Let	e	=	17,	prime	number.	Check	that	e	is	not	a	divisor	of	3120	
Compute	d,	the	‘modular	mul#plica#ve	inverse’	e	(mod	φ(n))	
d	=	2753	
The	public	key	is	(n	=	3233,	e	=	17)	
EncrypEon	funcEon:	c(m)	=	m17	mod		3233	
The	private	key	is	(n	=	3233,	d	=	2753)	
DecrypEon	funcEon:	m(c)	=	c2753	mod	3233	
To	encrypt	m	=	65	(the	ASCII	code	‘A’)	
c	=	6517	mod	3233	=	2790	
To	decrypt	c	=	2790	
m	=	27902753	mod	3233	=	65
Two	large	prime	numbers	(155	digits	each)
13144131834269512219260941993714669605006625743172006030529504645527800951523697620149903055663251854220067020503783524785523675819158836547734770656069477
13144131834269512219260941993714669605006625743172006030529504645527800951523697620149903055663251854220067020503783524785523675819158836547734770656069477
P
Q
Their Product
PQ
16152174667064029642647365822885998430666314431815268152405470907824573659036629724837729808265693933067328649323033626199146693859669107311296862671079214
8904239628873374506302653492009810626437582587089465395941375496004739918498276676334238241465498030036586063929902368192004233172032080188726965600617167
Data	“Sweet	are	the	uses”	->	4ABC272B4DD	
Data	“Sweet	are	the	buses”	->	7E880092CC1
Hash Functions
OP_RETURN <data>
• Piece	of	Data	represents	an	unspendable	UTXO	
• Recorded	into	the	blockchain	
• Not	stored	in	the	transacEon	pool	
• Up	to	40	characters	in	length	
• Ideal	for	storing	a	hash	code	pointer	
• view	real	examples:	hsp://coinsecrets.org/
Security
• Bitcoin has not been ‘hacked’
• Media reports of ‘hack,’ ‘theft,’ fraud, etc. all due
in specific business misconduct
• Integer Factoring
• Quantum Computers (Shor’s Algorithm)
• Threatens much more than Bitcoin
• Security of wallets and funds held by third parties
Practical Wallet Security (not so simple)
• Encrypted Wallet, long random wallet passphrase
• password manager
• Use Hierarchical Deterministic Wallet
• Multi-Signature Wallet Transactions (Begins with ‘3’ in the address)
• Multiple Backups (Digital and paper)
• MofN format digital & paper (Shamir’s Secret Sharing)
• Third party wallet vendors w/ Insurance
• *Most exchanges are not adequately insured*
• Theft: Hacking of your wallet passphrase, private key
• Loss: wallet file, wallet key, send to invalid address
Thank You
Q & A, Resources• “Bitcoin: A Peer-to-Peer Electronic Cash System” - introductory Whitepaper by
Satoshi Nakamoto (https://bitcoin.org/en/bitcoin-paper)
• “Why Bitcoin Matters” - NYTimes article by Marc Andreessen of Andreessen
Horowitz Venture Capital. (http://dealbook.nytimes.com/2014/01/21/why-
bitcoin-matters/)
• “Morgan Spurlock Inside Man” - episode Feb 19th 2015 (http://www.cnn.com/
shows/inside-man)
• Khan Academy - video series (https://www.khanacademy.org/economics-
finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-what-is-it)
• Mastering Bitcoin - Andreas Antonopoulous (amazon.com)
• www.CoinDesk.com - Reporting and News Coverage about Bitcoin & Digital
Currency
• www.blockchain.info - data and analysis of bitcoin
• BitcoinWiki - information resource, including technical
• US Exchanges: Coinbase, Gemini
• Wallet Vendors: BlockChain, Xapo, Armory, Various US Exchanges, others
Contact
marshallswatt@gmail.com
@marshallswatt
linkedin.com/in/marshallswatt

More Related Content

Similar to From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016

201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...Paperchain
 
201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications
201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications
201803 Daniel Dewar NYC Bar - Blockchain & Fintech ApplicationsPaperchain
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
 
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletNemanja Nikodijević
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinHugo Rodrigues
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconIoannis Psaras
 
Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinJim McKeeth
 
Introduction to Lightning Network
Introduction to Lightning NetworkIntroduction to Lightning Network
Introduction to Lightning NetworkAlan Carbery
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by BlockchainSlash
 
Ethereum Blockchain and DApps - Workshop at Software University
Ethereum Blockchain and DApps  - Workshop at Software UniversityEthereum Blockchain and DApps  - Workshop at Software University
Ethereum Blockchain and DApps - Workshop at Software UniversityOpen Source University
 
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Arjan
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
 
Tokenization: Life beyond the Information Age
Tokenization: Life beyond the Information AgeTokenization: Life beyond the Information Age
Tokenization: Life beyond the Information AgeShannon Code
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the BankerBohdan Szymanik
 
Blockchain explained (Technology running Bitcoin)
Blockchain explained (Technology running Bitcoin)Blockchain explained (Technology running Bitcoin)
Blockchain explained (Technology running Bitcoin)Qais Ammari
 
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...Christian Götz
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signatureKishankant Yadav
 
EthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxEthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxWijdenBenothmen1
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain FundamentalsBruno Lowagie
 

Similar to From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016 (20)

201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
 
201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications
201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications
201803 Daniel Dewar NYC Bar - Blockchain & Fintech Applications
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentation
 
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness Beacon
 
Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond Bitcoin
 
Introduction to Lightning Network
Introduction to Lightning NetworkIntroduction to Lightning Network
Introduction to Lightning Network
 
Crypto
CryptoCrypto
Crypto
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
Ethereum Blockchain and DApps - Workshop at Software University
Ethereum Blockchain and DApps  - Workshop at Software UniversityEthereum Blockchain and DApps  - Workshop at Software University
Ethereum Blockchain and DApps - Workshop at Software University
 
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
 
Tokenization: Life beyond the Information Age
Tokenization: Life beyond the Information AgeTokenization: Life beyond the Information Age
Tokenization: Life beyond the Information Age
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
 
Blockchain explained (Technology running Bitcoin)
Blockchain explained (Technology running Bitcoin)Blockchain explained (Technology running Bitcoin)
Blockchain explained (Technology running Bitcoin)
 
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signature
 
EthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxEthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptx
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016