Business and employment eft
This presentation is the property of its rightful owner.
Sponsored Links
1 / 20

Business and Employment EFT PowerPoint PPT Presentation


  • 78 Views
  • Uploaded on
  • Presentation posted in: General

Business and Employment EFT. Tim Hanewich. Flowchart. Process. Transaction placed Block Chain Confirmation Private Key Signature Transfer Bitcoin. Device #1 – Smartphone (input). http://phoneappsmag.wordpress.com/2011/12/20/tips-and-tools-for-a-sparkling-clean-smartphone/.

Download Presentation

Business and Employment EFT

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Business and employment eft

Business and EmploymentEFT

Tim Hanewich


Flowchart

Flowchart


Process

Process

  • Transaction placed

  • Block Chain Confirmation

  • Private Key Signature

  • Transfer Bitcoin


Device 1 smartphone input

Device #1 – Smartphone (input)

http://phoneappsmag.wordpress.com/2011/12/20/tips-and-tools-for-a-sparkling-clean-smartphone/


Device 2 digital application processing

Device #2 – Digital Application (Processing)

http://crunchmodo.com/top-20-best-smartphone-you-can-buy/


Device 3 block chain processing

Device #3 – Block Chain (Processing)

http://www.zazzle.com/bitcoin_key_chain-146265307377718216


Device 4 private key

Device #4 – Private Key

http://n2liquid.wordpress.com/2013/03/09/redeeming-of-a-casascius-coin-aka-physical-bitcoin/


Device 5 personal computer

Device #5 – Personal Computer

http://warside24.com/?p=471


Software image

Software Image

http://warside24.com/?p=471


Software explanation

Software Explanation

  • Convenient

  • Easy

  • Portable

  • Reliable

http://warside24.com/?p=471


Stakeholder advantage ease of access for users

Stakeholder Advantage – Ease of Access for Users

http://www.bitterwallet.com/104-year-old-twitter-woman-just-a-pawn-in-a-pr-game/11881


Stakeholder advantage chance of disaster for users

Stakeholder Advantage – Chance of Disaster for Users

http://www.bitterwallet.com/104-year-old-twitter-woman-just-a-pawn-in-a-pr-game/11881


Stakeholder advantage 2 money supply regulation

Stakeholder Advantage #2 – Money Supply Regulation

http://www.frontpagemag.com/2014/dgreenfield/obamas-appeasement-leads-to-war/


Stakeholder advantage 2 counterfiet possibilities

Stakeholder Advantage #2 – Counterfiet Possibilities

http://www.frontpagemag.com/2014/dgreenfield/obamas-appeasement-leads-to-war/


Ethical concern 1 picture integrity

Ethical Concern #1 Picture - Integrity

http://davetutin.com/my-feelings-about-romney-in-a-nutshell/


Ethical concern 1 integrity

Ethical Concern #1 - Integrity

  • Hackers of the Bitcoin?

  • Who has access?

http://davetutin.com/my-feelings-about-romney-in-a-nutshell/


Ethical concern 2 picture reliability

Ethical Concern #2 Picture - Reliability

http://commons.wikimedia.org/wiki/File:Reliability_and_validity.svg


Ethical concern 2 reliability

Ethical Concern #2 - Reliability

  • How well will the Bitcoin function in the economy?

  • Possible Issues

http://commons.wikimedia.org/wiki/File:Reliability_and_validity.svg


Ethical concern 3 picture security

Ethical Concern #3 Picture -Security

http://ww2.cfo.com/technology/2013/11/finding-cyber-security-weak-spots/


Ethical concern 3 picture security1

Ethical Concern #3 Picture -Security

  • Currency Protection

  • Confidence in currency

http://ww2.cfo.com/technology/2013/11/finding-cyber-security-weak-spots/


  • Login