SlideShare une entreprise Scribd logo
1  sur  12
Author
www.WECAI.orgwww.WECAI.org
 Bitcoins are exchanged and
transferred digitally through a
computer generated code.
 To ensure that these
transactions are completed
safely and securely users use
keys.
www.WECAI.orgwww.WECAI.org
 Two keys are always required
for any transaction:
 1. Public Key
 2. Private Key
www.WECAI.orgwww.WECAI.org
 The public key is the one that
is used for the actual transfer
of the Bitcoin.
 This first verification step
prevents anyone from trying
to send the same transaction
to two different people at the
same time.
www.WECAI.orgwww.WECAI.org
 The end user then uses their
private key to unlock the
transaction, once it has been
verified.
 The Bitcoin then gets
deposited into their Wallet. A
wallet is simply an online bank
account.
www.WECAI.orgwww.WECAI.org
 Because the system uses two
keys all activity in the network
can be easily traced.
 The process of verification
often occurs multiple times
before the receiver deposits
the Bitcoin.
www.WECAI.orgwww.WECAI.org
How the Blockchain is
Created
 It takes several verifications
for each transaction to
proceed. At this time the
current number of
verifications required is six.
 Before a transaction enters
into the Blockchain a new
block is formed first.
www.WECAI.orgwww.WECAI.org
How the Blockchain is
Created
 To create a block a process
known as hash creation has
to occur.
 Think of this as small nodes
that are attached to a block
each time it is verified.
 The original block gets a little
longer.
www.WECAI.orgwww.WECAI.org
How the Blockchain is
Created
www.WECAI.orgwww.WECAI.org
 As this is all done on via a
mathematical software program
zeros are added at the
beginning of the block.
 As each new block, verification,
is completed more zeros are
added on.
 The largest block is always taken
to be the authenticated block.
How the Blockchain is
Created
www.WECAI.orgwww.WECAI.org
 Once this verification process
has occurred six times this
block enters into the
BlockChain.
 As it enters a timestamp is
associated with it.
How the Blockchain is
Created
www.WECAI.orgwww.WECAI.org
 No records are ever
removed from the
Blockchain and it will
continue to grow in size
WANT TO LEARN
MORE?
www.WECAI.orgwww.WECAI.org
 Visit http://bit.ly/BITCOIN2014
 Get a FREE ebook – BITCOIN
BUZZ when you RSVP!

Contenu connexe

Plus de Heidi Richards Mooney

Social Media - Finding and Maximizing the Right Channel(s) For Your Business
Social Media - Finding and Maximizing the Right Channel(s) For Your BusinessSocial Media - Finding and Maximizing the Right Channel(s) For Your Business
Social Media - Finding and Maximizing the Right Channel(s) For Your BusinessHeidi Richards Mooney
 
Cpc classification - Inventors Society Oct. 3 2015
Cpc classification - Inventors Society Oct. 3 2015Cpc classification - Inventors Society Oct. 3 2015
Cpc classification - Inventors Society Oct. 3 2015Heidi Richards Mooney
 
Leverage Social Media To Promote Your Business
Leverage Social Media To Promote Your BusinessLeverage Social Media To Promote Your Business
Leverage Social Media To Promote Your BusinessHeidi Richards Mooney
 
How to Leverage Blogging to Grow Your Business by Heidi Richards Mooney
How to Leverage Blogging to Grow Your Business by Heidi Richards MooneyHow to Leverage Blogging to Grow Your Business by Heidi Richards Mooney
How to Leverage Blogging to Grow Your Business by Heidi Richards MooneyHeidi Richards Mooney
 
Social Media Internet Marketing - 30 Tips in 30 Minutes
Social Media Internet Marketing - 30 Tips in 30 MinutesSocial Media Internet Marketing - 30 Tips in 30 Minutes
Social Media Internet Marketing - 30 Tips in 30 MinutesHeidi Richards Mooney
 
Social Media For Authors and Publishers
Social Media For Authors and PublishersSocial Media For Authors and Publishers
Social Media For Authors and PublishersHeidi Richards Mooney
 
Women in Ecommerce presents: Bitcoin The internet of money
Women in Ecommerce presents: Bitcoin The internet of moneyWomen in Ecommerce presents: Bitcoin The internet of money
Women in Ecommerce presents: Bitcoin The internet of moneyHeidi Richards Mooney
 
The State of Email and Social Media Marketing with Alex de Carvalho
The State of Email and Social Media Marketing with Alex de CarvalhoThe State of Email and Social Media Marketing with Alex de Carvalho
The State of Email and Social Media Marketing with Alex de CarvalhoHeidi Richards Mooney
 

Plus de Heidi Richards Mooney (11)

Social Media - Finding and Maximizing the Right Channel(s) For Your Business
Social Media - Finding and Maximizing the Right Channel(s) For Your BusinessSocial Media - Finding and Maximizing the Right Channel(s) For Your Business
Social Media - Finding and Maximizing the Right Channel(s) For Your Business
 
Cpc classification - Inventors Society Oct. 3 2015
Cpc classification - Inventors Society Oct. 3 2015Cpc classification - Inventors Society Oct. 3 2015
Cpc classification - Inventors Society Oct. 3 2015
 
Leverage Social Media To Promote Your Business
Leverage Social Media To Promote Your BusinessLeverage Social Media To Promote Your Business
Leverage Social Media To Promote Your Business
 
Social Media for Nonprofits
Social Media for NonprofitsSocial Media for Nonprofits
Social Media for Nonprofits
 
Blogging for Nonprofits
Blogging for NonprofitsBlogging for Nonprofits
Blogging for Nonprofits
 
How to Leverage Blogging to Grow Your Business by Heidi Richards Mooney
How to Leverage Blogging to Grow Your Business by Heidi Richards MooneyHow to Leverage Blogging to Grow Your Business by Heidi Richards Mooney
How to Leverage Blogging to Grow Your Business by Heidi Richards Mooney
 
Social Media Internet Marketing - 30 Tips in 30 Minutes
Social Media Internet Marketing - 30 Tips in 30 MinutesSocial Media Internet Marketing - 30 Tips in 30 Minutes
Social Media Internet Marketing - 30 Tips in 30 Minutes
 
Social Media For Authors and Publishers
Social Media For Authors and PublishersSocial Media For Authors and Publishers
Social Media For Authors and Publishers
 
Women in Ecommerce presents: Bitcoin The internet of money
Women in Ecommerce presents: Bitcoin The internet of moneyWomen in Ecommerce presents: Bitcoin The internet of money
Women in Ecommerce presents: Bitcoin The internet of money
 
Blogging for nonprofits
Blogging for nonprofitsBlogging for nonprofits
Blogging for nonprofits
 
The State of Email and Social Media Marketing with Alex de Carvalho
The State of Email and Social Media Marketing with Alex de CarvalhoThe State of Email and Social Media Marketing with Alex de Carvalho
The State of Email and Social Media Marketing with Alex de Carvalho
 

Dernier

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 

Dernier (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

Understanding BITCOIN Transactions Online and Your Bottom Line...

  • 2.  Bitcoins are exchanged and transferred digitally through a computer generated code.  To ensure that these transactions are completed safely and securely users use keys. www.WECAI.orgwww.WECAI.org
  • 3.  Two keys are always required for any transaction:  1. Public Key  2. Private Key www.WECAI.orgwww.WECAI.org
  • 4.  The public key is the one that is used for the actual transfer of the Bitcoin.  This first verification step prevents anyone from trying to send the same transaction to two different people at the same time. www.WECAI.orgwww.WECAI.org
  • 5.  The end user then uses their private key to unlock the transaction, once it has been verified.  The Bitcoin then gets deposited into their Wallet. A wallet is simply an online bank account. www.WECAI.orgwww.WECAI.org
  • 6.  Because the system uses two keys all activity in the network can be easily traced.  The process of verification often occurs multiple times before the receiver deposits the Bitcoin. www.WECAI.orgwww.WECAI.org
  • 7. How the Blockchain is Created  It takes several verifications for each transaction to proceed. At this time the current number of verifications required is six.  Before a transaction enters into the Blockchain a new block is formed first. www.WECAI.orgwww.WECAI.org
  • 8. How the Blockchain is Created  To create a block a process known as hash creation has to occur.  Think of this as small nodes that are attached to a block each time it is verified.  The original block gets a little longer. www.WECAI.orgwww.WECAI.org
  • 9. How the Blockchain is Created www.WECAI.orgwww.WECAI.org  As this is all done on via a mathematical software program zeros are added at the beginning of the block.  As each new block, verification, is completed more zeros are added on.  The largest block is always taken to be the authenticated block.
  • 10. How the Blockchain is Created www.WECAI.orgwww.WECAI.org  Once this verification process has occurred six times this block enters into the BlockChain.  As it enters a timestamp is associated with it.
  • 11. How the Blockchain is Created www.WECAI.orgwww.WECAI.org  No records are ever removed from the Blockchain and it will continue to grow in size
  • 12. WANT TO LEARN MORE? www.WECAI.orgwww.WECAI.org  Visit http://bit.ly/BITCOIN2014  Get a FREE ebook – BITCOIN BUZZ when you RSVP!