EMOTIONAL-INTELLIGENCE-PRESENTATION Emotional Intelligence and the Trump Administration may not have as much in common as the prior administration of Barak Obama but, the Trump administration does put forth a great opposing view of how emotional intelligence or EI can be understood.  What I am suggesting is having a high EQ as opposed to IQ would serve as an ability allowing you to understand the folks under your leadership and those exposed to the environments, affected by your choice decisions.  No one can read minds, but if you could, reading the minds of a person and understanding exactly why they do what they do, the logical idea in a child’s mind might suggest you’d use that power as a super hero or X Men. I’m not intentionally diverting from political correctness X Lady doesn’t quite have the same conditional tone, does it? But, if you, DNA mutant for good knew when the time called upon your skill as the Emotional Intelligence (EI) hero you would become the ultimate conflict resolution-ist.  And, depending on your quotient or EQ strength you’d become one among the greats.  I’m sure this would be a good point to discuss political views between the former Obama administration and the current Trump administration but, I’m not one to lead you to making the decisions my EQ isn’t quite that high, yet.  But, if you realize which of these characters possessing the greatest skills in leadership would contend with the opposition, draw upon their superlative talents as the EI hero and voilà, the student would emerge to enter the mastery of understanding, emotional intellect would kick in (Trushell, 2004).  Emotional Intelligence is described as ability “to build relationships” (DuBrin, 2012, p. 481).  Although, it would be great to be seen as having superior or super human capabilities as implied by writer John M. Trushell.  Emotional intelligence as a fantasy of American pulp fiction as I allude to in the opening does not totally have to result in fictitious results.

EI, is the motive to engage innate abilities as empathy and trust.  Trust, however has to have some degree of disciplined control.  Among capable leadership and those who are under the subjection EI can produce amazing collaboration and resolution.  EI results in actions performed by and between individuals, groups or organizations making those who take steps to engage “constructive use of … emotion” more effective through their administrative processes (DuBrin, 2012, p.481).  Imagine the difference among subordinate members of a group who have two persons to follow.  One person is seen among the group as a leader and the other person is seen as an authority figure but, not a leader.  The superior individual with the highest level of EI would be described as the person viewed as being aware of the needs of the subordinates.  And, the title of leader may apply to anyone among this group possessing the advantage of emotional trust from members of the group.  Identifying the second category of highly ranked heroes of administration can be difficult since, they aren’t necessarily specified by managerial appointment they are recognized by the way their peers engage with them.

Scores that have been adopted to measure a level of emotional intelligence such as MSCEIT, its scoring process determines a person’s EI based on a scale identified as a quotient.  There are highly questionable methods to these measurements.  Measurements that could determine if a person is able to control their anger must take into consideration more than the scope of anger management tools as psychometric assessments as the, HCR-20.  Mayer, Salovey, Caruso & Sitarenios, (2003) contend there are concerns regarding the reliability of such tests.  They challenge validity of emotional intelligence itself and whether results of tests will provide consistent results.  In my own self-examination, I have been evaluated a having “Good EQ”, in theory.  I do believe I have some degree of leadership abilities which would support good EQ results.   However, I don’t believe my results would replicate if I would take a similar study under slightly different questions or different demands they might indicate some similarity but highly unlikely to be the same.  DuBrin (2012) describes this as an ability to connect with people and understand their emotions” (p. 162).  Is it truly necessary to connect?  I believe having what is described to be emotional intelligence leads to a better understanding of what makes a great leader, better.  Connecting to people is essential to administration and leadership even though EI claims are made to imply being first in this regard scientist credit Darwinian ideals as emotional expression as the central token of adaptive leadership traits.  For further edification, I have taken liberty to provide you with reference resources, until next time I sit with my pen – ENJOY THE SITES! 

You can judge me by the following references: 

Bar-On, R. (2001). Emotional intelligence and self-actualization. Emotional intelligence in everyday life: A  scientific inquiry, 82-97. 

DuBrin, A. J. (2012). Ethics and corporate social responsibility:  In essentials of  management. Mason,  OH: Cengage Learning. 

Mayer, J. D., Salovey, P., Caruso, D. R., & Sitarenios, G. (2003). Measuring emotional intelligence with     the MSCEIT V2. 0. Emotion, 3(1), 97.    

Trushell, J. M. (2004). American Dreams of Mutants: The X‐Men—“Pulp” Fiction, Science Fiction, and  Superheroes. The Journal of Popular Culture, 38(1),



The issue to provide healthcare and no harm, obligates agents within every medical platoon and members of reform measures to social responsibilities that ensure reduction rates of nosocomial infections, through a focus targeted on the duty to serve.  In this service, obligation to maintain quality efforts that successfully prevent the spread of nosocomials are the inherent standard. Practices such as handwashing and donning of gloves before and after personal contact with patients is a typical surveillance event with less than 50% compliance according to a joint commission review (Sahud, Bhanot, Radhakrishnan, Bajwa, Manyam, & Post, 2010). Such efforts leading to improve the practice of both handwashing and donning of gloves is critical to ensure the reduction of transmitting pathogens within a healthcare clinical environment and they share goals to improve on a consistent basis. There are other common practices such as wearing protective personal equipment, sterile techniques, and accurate diagnosis, all must be recognized as quality concerns for reduction of risks in their repetitive practice.  Studies have been conducted on each of these interventions yielding results of various efficiencies.

However, considering possible threats and outbreaks of virulent diseases such as Ebola and Flu, emergency protocols should be incorporated as standard practices of nosocomial prevention and training. Seasonal vaccinations among healthcare agents should be inclusive annual practices to ensure a continual reduction of hospital acquired diseases in all areas.  The case for mandatory vaccination treatments is feasible; resulting in vaccination rejection rates of 2% among vaccine healthcare workers according, to a five-year study conducted at Virginia Mason Medical Center in Seattle, Washington. This first to be known infectious control mandate yielded a 98% uptake compliance rate among Health Care Workers (HCW).  Policy accommodations for religious and other considerations were granted due to possible concerns relating specifically to medical diagnoses (Rakita, Hagar, Crome, & Lammert, 2010).  Although, the study highlights a significant percentage for vaccination uptake, it also pays to recognize the small percentage of vaccination resistant HCW which, includes a fewer number of vaccination resistant workers who withdrew their employment.

This proposal intends to suggest the best practice to ensure a reduction of influenza as a nosocomial disease is to implement vaccination uptake as part of standard training procedures for infection control (e.g. handwashing, personal protective equipment, sterile techniques, vaccination uptake) ensuring education of the HCW recognizes that vaccination uptake, when considered part of standard infectious control procedures and healthcare no harm responsibility rule, will act as an additional form of patient protection in hopes to coincide with core public value.  After all, incorporating the standard practices of infectious control and uptake responsibility, vaccinating should be treated as a standard of care regardless of one’s personal value.  From the core debate surrounding vaccinations, public value has been stirred into a melting pot mixture of divergent medical practice ideals from which, agents of healthcare must eventually accept reconciliation and collaborate on behalf and presence of clients.

A perception of best practice and prioritization among healthcare agents can lead to determining factors that reduce the spread of nosocomial infections. If a vaccination resistant worker, during an active seasonal outbreak of influenza is expected to be seen wearing a face mask during patient care, he or she may experience greater collaboration if vaccination uptake workers would also wear facemasks while providing patient care during seasonal outbreaks. Evidence of best practice would condone collaborative efforts over values of the elitist. Such recognition in behavior can be an effective tool to provide the highest standards of care amongst an agent’s duty to serve.  This practice when implemented as standard could be taught and expressed as professional practice counteracting inverse care among vulnerable patient populations.


Talbot, T. R., & Schaffner, W. (2010). On being the first: Virginia Mason Medical Center and 

mandatory influenza vaccination of healthcare workers.

 Sahud, A. G., Bhanot, N., Radhakrishnan, A., Bajwa, R., Manyam, H., 

& Post, J. C. (2010). An electronic hand hygiene surveillance 

device: a pilot study exploring surrogate markers for hand hygiene 

compliance. Infection Control & Hospital Epidemiology, 31(6), 














[ngg_images source=”galleries” display_type=”photocrati-nextgen_basic_slideshow” gallery_width=”600″ gallery_height=”400″ cycle_effect=”fade” cycle_interval=”10″ show_thumbnail_link=”1″ thumbnail_link_text=”[Show thumbnails]” order_by=”sortorder” order_direction=”ASC” returns=”included” maximum_entity_count=”500″]
































It’s not hard if you enjoy writing and are good at it.  I’m referring to ghost writing, what’s hard about it is getting paid!  There are endless reasons that make something so pleasant for writers turn ghastly.  If you’ve done your research in an organized manner, do expect to encounter a few disruptions in the trail leading to the bank.  Getting a paycheck is the reason a writer should be “very selective” for whom they write.  Here, are some of my favorite employers:

Visit the Writers Digest Website

The Writer

Writer’s Market

The Renegade Writer

Worldwide Freelance

Poets & Writers


to name a few…







Do Monsters exist?

The purpose of this study is to examine gender bias in sentencing decreed by males vs. female judges, which is defined as a difference in the evaluation of the morality of an action depending on the gender of the person performing the action.  Using the Micro Theory paradigm, I will compare civil and criminal case types for the states of Arizona, Arkansas and Colorado, by analyzing decisions made by female and male judges in cases of rape and assault, and workers compensation claims.

The foundation of our judiciary is to impart fair and impartial justice without bias or prejudice, and this study is important because it seeks to understand from an idiographic approach how gender plays a role in the judicial decisions handed down by courts with both male and female judges.  Having a diversified bench is very important, as it is a representation of who we are as a nation, but the philosophy and science of our legal system is equally important. This study seeks to show that our judicial system can be fair and impartial, despite differences between genders, and I expect it will show that these differences are not detrimental to American system of law.

Understanding the behaviors a literature review

The issue of whether female and male judges approach sentencing in gender-specific ways is at the core of concern in law and criminology about the determinants of judicial decision making and the “law in action” (Peterson & Hagan 1984).  It is hypothesized that decisions handed down by female judges are less lenient than those handed down by their male counterparts.  Based on the hypothesis I will identify, using the gender of the judge, how “less lenient” will be determined.

For the purposes of my research, I plan to take a qualitative approach.  A qualitative approach is appropriate because I will be analyzing written data on decisions for three distinct case types handed down in the states of Arizona, Arkansas and Colorado.   My hypothesis will be tested by searching the WESTLAW electronic database for cases decided between 1998-2008 and analyzing the differences in decisions made between male and female judges in criminal cases involving rape and assault, and civil cases involving workers compensation claims, and whether the decisions handed down by female judges are less lenient or “for the Plaintiff” than those of their male counterparts. 

To explore the impact of gender bias in the courtroom, Riger, Foster-Fishman, Nelson, and Curran (1995) conducted an analysis using data collected by the American Bar Foundation for the Illinois Task Force on Gender Bias in the Courts (Schafran, 1987).  Although role, age, and experience had some importance in explaining the scores, gender offered the greatest predictive power.  Question on the survey asked men and women about observations and experiences with behaviors in the courtroom.  A 5-point Likert scale was used to measure responses to 24 statements regarding the behavior and attitudes of judges.

Other dimensions may exist that go beyond the scope of data collected.  For example, informal social networks of judges and/or attorneys may exclude women and minorities; these networks may affect the disposition of court cases or appointments to the judiciary (Riger et al., 1995).  In this study women were more biased than men judges in the presence of discrimination. Moreover, some respondents felt that women use their gender to gain advantage.  I didn’t feel this research analysis study contained valid information which would allow my hypothesis to be accepted or rejected. 


How we capture a method

To operationalize the word “lenient” is to say that female judges are less likely to rule in favor of the plaintiff in civil cases involving workers compensation claims, or to give the minimum state-allowed or discretionary sentencing in criminal cases involving rape and assault.  By reviewing decisions made by female and male judges during the time period of 1998-2008 in the states of Arizona, Arkansas and Colorado, I will explain that sentences imposed by female judges appear to be less lenient than those handed down by their male counterparts.  Other factors to be considered in my research will be the education level and race and how it applies to decisions made by female judges in those states being reviewed.   

Although Riger et al., (1995) had a solid foundation for analysis, as with most studies, men and women differ in their perceptions regarding gender bias and one’s role as a lawyer or judge also appears to be related to perceptions.  For my project I will utilize existing data; the data sets chosen are decisions made by female and male judges in criminal cases involving rape and assault, and civil cases involving workers compensation claims.  These are being chosen because the judicial decisions handed down over a ten-year period between 1998-2008 of the previously identified three states is a large enough data set to collect valid information which will allow my hypothesis to be accepted or rejected.  

I have chosen to incorporate a previous study from my research to support my methodological approach.  This approach has been done previously in Songer, Davis, and Haire (1994) study which suggest that early views of affirmative-action female judges had a perception of being more liberal than male judges.  On the other hand, studies suggest that there are no gender differences. To test the hypotheses, Songer et al., (1994) coded the dependent variable “1” for a liberal vote and “0” for a conservative vote.  Votes which could not be unambiguously classified as either liberal or conservative were excluded from analysis.  In order to assess gender-based effects while controlling for a large number of independent variables Songer et al., (1994) employed logit in a multivariate analysis.  Logit, which is preferred to regression when the dependent variable is dichotomous (Aldrich and Nelson 1984), permits the calculation of a maximum-likelihood coefficient for the effect that each independent variable has on the probit that the dependent variable will assume a specified value.

In this study a search utilizing the WESTLAW electronic data base identified the universe of cases whose decisions were published in the Federal Reporter.  Measured was the impact of gender on judges for cases on obscenity, search and seizure, and employment discrimination.  The analysis of obscenity and search and seizure cases conclude that there is little difference between male and female judges.  In employment discrimination cases, females were noted to support alleged victims of discrimination as opposed to male colleagues. In summary, each of the models includes identical measures of region, the appointing president of each judge who participated on the panel, and the gender of each judge.

Ethical issues my research design might face, as with most research designs involves the task of analyzing data.  It is important to work hard toward avoiding bias in data analysis and data interpretation.  Riger et al, (1995) research analysis suggested that direct experience has an impact on attitudes, especially for women.  Female lawyers who had experienced bias not only were more likely to believe that bias exists, they also were less optimistic about reductions in discrimination in the courts and were less likely to see bias merely as a trial tactic.  Another issue potentially facing my research would be that of remaining objective versus subjective about the data.  Objectivity is important in research because it is a “conceptual attempt to get beyond our individual views” [Babbey p.41].   Additionally, even if I find that my hypothesis is falsifiable I still have a duty to report on the data and findings accurately.

Finally, while my research project will utilize public records, it is important to note that the identity of judges whose cases will be analyzed for this project shall remain anonymous, since it may be harmful to their reputations if there was an appearance that said judges were being “singled out.”

Predictable Findings because they’re children

As Epstein (1988) states, the quest to identify gender differences may focus too much on differences rather than similarities and thus sometimes impair our ability to understand social phenomena.  It is predicted that my findings will support my hypothesis that decisions handed down by female judges are less lenient than those handed down by their male counterparts because, even when researchers uncovered a difference in gender sentencing, results indicated that female judges were significantly more likely than their male counterparts to defer to positions taken by government rather than those of the plaintiff (in a civil case) or defendant (in a criminal case).


So what does all this mean?  Studies of gender and race in the field of judicial politics have largely focused on the various roles particularly that female judges might play in their decision-making patterns (Allen & Wall, 1993).  In the bigger picture, research of gender and judging highlights the debate of whether there are differences in gender and judging.  As King and Greening (2007) have suggested, future research should continue “building on the general assumptions that are being made about decision-makers and test whether assumptions about gender are correct” and as research expands, it should “build better theories regarding gender-based explanations for behavior rather than assume a priori that there are simple gender relationships between men and women.  Such research moves us away from “just seeing gender” to examining larger concepts about “gender justice.”

Given what I have found, the status of my hypothesis must be considered tentative.  Most of the research used was conducted with archival data.  This reliance on archival methodology reflects an absence of information about the sentencing behavior of female judges.  In most jurisdictions the majority of judges are male leaving a few offenders to be sentenced by female judges.  Despite the status of my hypothesis, research data provided support for the expectation that female judges sentence rape offenders more harshly than their male counterparts.  The gender of the presiding judge might have a significant effect on the perception on an offender of either the other or the same gender.  The limitations on this research point to the need for further study, again, these differences are suggestive rather than definitive.


In this study, I attempted to assess whether decisions handed down by female judges were less lenient than those handed down by their male counterparts.  In particular, I found that female appeals court judges tended to vote more conservatively in criminal procedure cases, but more liberally in civil rights and liberties cases than their male colleagues.  Objectivity is important in research because it is a “conceptual attempt to get beyond our individual views” [Babbey p.41].   Additionally, even if I find that my hypothesis is falsifiable I still have a duty to report on the data and findings accurately.

The results of the models provide further evidence that judge gender is an important factor in determining the voting behavior of courts of appeals judges (Songer et al.1994). A factor I found very interesting was that results of judge gender varied across issue areas.  I feel it may be time to re-examine the application of Rosabeth Moss Kanter’s classic work on gender and organizations, Men and Women of the Corporation (1977), and its applicability to our judicial system.  Kanter’s organizational analysis focused on structural conditions to predict behavior rather than essential sex differences to explain why tokens may conform to the dominant group.


Watch a documentary on Netflix




Aldrich, J., & Nelson, F. (1984). Linear Probability, Logit and Probit Models. Sage Journals Online. Retrieved June 13, 2009, from website: http://cps.sagepub.com.

Boyd, C., Epstein, L., & Martin, A. (2007). Untangling the Causal Effects of Sex on Judging. Midwestern Political Science Association. Retrieved from Cline Library database.

Allen, D. & Wall, D. (1993). Role Orientations and Women State Supreme Court Justices.

Judicature, 77, 156-165.

Babbey, E. (2007) The Practice of Social Research. Belmont: Thomson Higher Education. Retrieved June 13, 2009, from website: http://www.ebabbie.net/resource/practice/practice.html.

Epstein, C. (1988). Deceptive Distinctions: Sex, Gender, and the Social Order. Yale University Press. Retrieved June 13, 2009, from website: http://books.google.com.

Florida Supreme Court Task Force. (1990). Report of the Florida Supreme Court Gender Bias Study Commission. Tallahassee: Supreme Court of Florida. Retrieved from Cline Library database.

Kanter, R. (1977). Men and Women of the Corporation. New York: Basic Books. Retrieved June 13, 2009, from website: http://books.google.com.

Kenney, S. (2008). Thinking about Gender and Judging. International Journal of the Legal Profession, 15(1-2), 87-110. Retrieved from Cline Library database.

King, K., & Greening, M. (2007). Gender Justice or Just Gender? The Role of Gender in

            Sexual Assault Decisions at the Criminal Tribunal of the Former Yugoslavia. Social

            Science Quarterly, 1049-1071. Retrieved from Cline Library database.

Martin, P., Reynolds, J., & Keith, S. (2002). Gender Bias and Feminist Consciousness Among Judges and Attorneys: A Standpoint Theory Analysis. Signs, 27(3), 665–702. Retrieved from Cline Library database.

Peresie, J. (2005). Female Judges Matter: Gender and Collegial Decision Making in the Federal Appellate Courts. Yale Law Journal, 114, 1759–90.  Retrieved from Cline Library database.

Peterson, R. & Hagan, J. (1984). Changing Conceptions of Race: Towards an Account of Anomalous Findings of Sentencing Research. American Sociological Review, 49, 56-70.  Retrieved from Cline Library database.

Riger, S., Foster-Fishman, P.,  Nelson-Kuna, J., & Curran, B. (1995). Gender Bias in Courtroom Dynamics. Law and Human Behavior, 19(5), 465-80. Retrieved from Cline Library database.

Schafran, L. (1987). Documenting Gender Bias in the Courts: The Task Force Approach. Judicature, 70,  280-290. Retrieved from Cline Library database.

Solimine, M., & Wheatley, S. (1995). Rethinking Feminist Judging. Indiana Law Journal, 70(3), 891-920. Retrieved from Cline Library database.

Songer, D., Davis, S., & Haire, S. (1994). A Reappraisal of Diversification in the Federal Courts: Gender Effects in the Courts of Appeals. Journal of Politics, 56(2), 425–9. Retrieved from Cline Library database.

Steffensmeier, D., & Hebert, C. (1999). Women and Men Policymakers: Does the Judge’s Gender Affect the Sentencing of Criminal Defendants?. Social Forces, 77(3), 1163-96.  Retrieved from Cline Library database.

Walker, T., & Barrow, D. (1985). The Diversification of the Federal Bench: Policy and Process Ramifications. Journal of Politics, 47(2), 596-617. Retrieved from Cline Library database.












Market Influencers

If you subscribe to Investor’s Business Daily look up these companies and follow their growth on value stock trading.  You can probably find them listed on FinViz.com:  Spark Therapeutics, face++, first solar, Intel (once again) & vestas wind systems,  Send your name, email confirmation, and a request for more Influences of the Markets information for subscribers to our blog.





If I were to stand and speak about this from  a podium and finish off with our traditional “MICDROP” action,  you readers would know we were absolutely serious about everything in this post!  Check out what writer Tom Simonite has to say about Bitcoin.

Knowing about “Bitcoin” Matters it’s about to compete with  cash?


In 2008, it was a programmer pretentiously known by the name submission Satoshi Nakamoto— I write this because the name is believed to be an alias—anyway in a  posted online writing this programmer outlines the Bitcoin’s design to what is described as a cryptography e-mail list.  After that somewhere in 2009, Satoshi releases software that will exchange the digital currency, bitcoins using the currency exchange scheme, currently maintained by an open-source community.

 Jeff Garzik , a member of that community and also the founder of Bitcoin Watch, that tracks the Bitcoin economy. says “Satoshi’s a bit of a mysterious figure, I and the other core developers have occasionally corresponded with him by e-mail, but it’s always a crapshoot as to whether he responds,” says Garzik. “That and the forum are the entirety of anyone’s experience with him.”  Hmmmm, I wonder if Satoshi is even male?

So, here is how Bitcoin work?

Imagine playing the virtual reality game Second Life, the concept would probably be easier to follow.  Satoshi wanted people to be able to exchange money electronically securely without the need for a third party, such as a bank or a company like PayPal. Satoshi, simply based Bitcoin on person-to-person (not including government regulated banking systems) to privately exchange value, this is known to be termed as cryptographic techniques; that which, allows you to be sure that value of the exchange is indeed genuine, even if you don’t trust the other person.

The Basics

You can download the Bitcoin client software, which connects world wide to the Internet and a string of decentralized network of global Bitcoin users.  The software will generate unique, mathematically linked keys, which you’ll need to exchange bitcoins with any other client. One key is private and kept hidden on your computer. The other is public, it is the address given to other people so they can send you bitcoins.  This scheme makes it practically impossible (even with the most powerful supercomputer) to discover someone’s private key from their public key preventing false impersonation of the users, even if they upgrade or exchange their computers, the keys are secure. 

A Bitcoin address looks something like this: 21IoPaWV9zpbA8LVnbrERTzrVzN7ixNHuI.  There exists online businesses and retail stores which currently accept bitcoins—for example, here is one online group listing— click the link it will provide you with their address.

Transferring Bitcoins

When you perform a transaction, your Bitcoin software performs a mathematical operation to combine the other party’s public key and your own private key with the amount of bitcoins that you want to transfer. The result of that operation is then sent out across the distributed Bitcoin network so the transaction can be verified by Bitcoin software clients not involved in the transfer.

Those clients make two checks on a transaction. One uses the public key to confirm that the true owner of the pair sent the money, by exploiting the mathematical relationship between a person’s public and private keys; the second refers to a public transaction log stored on the computer of every Bitcoin user to confirm that the person has the bitcoins to spend.

When a client verifies a transaction, it forwards the details to others in the network to check for themselves. In this way a transaction quickly reaches and is verified by every Bitcoin client that is online. Some of those clients – “miners” – also try to add the new transfer to the public transaction log, by racing to solve a cryptographic puzzle. Once one of them wins the updated log is passed throughout the Bitcoin network. When your software receives the updated log it knows your payment was successful.


The nature of the mathematics ensures that it is computationally easy to verify a transaction but practically impossible to generate fake transactions and spend bitcoins you don’t own. The existence of a public log of all transactions also provides a deterrent to money laundering, says Garzik. “You’re looking at a global public transaction register,” he says. “You can trace the history of every single Bitcoin through that log, from its creation through every transaction.”

How can you obtain bitcoins?

Exchanges like Mt. Gox provide a place for people to trade bitcoins for other types of currency. Some enthusiasts have also started doing work, such as designing websites, in exchange for bitcoins. This jobs board advertises contract work paying in bitcoins.

But bitcoins also need to be generated in the first place. Bitcoins are “mined” when you set your Bitcoin client to a mode that has it compete to update the public log of transactions. All the clients set to this mode race to solve a cryptographic puzzle by completing the next “block” of the shared transaction log. Winning the race to complete the next block wins you a 50-Bitcoin prize. This feature exists as a way to distribute bitcoins in the currency’s early years. Eventually, new coins will not be issued this way; instead, mining will be rewarded with a small fee taken from some of the value of a verified transaction.

Mining is very computationally intensive, to the point that any computer without a powerful graphics card is unlikely to mine any bitcoins in less than a few years.

Where to spend your bitcoins

There aren’t a lot of places right now. Some Bitcoin enthusiasts with their own businesses have made it possible to swap bitcoins for tea, books, or Web design (see a comprehensive list here). But no major retailers accept the new currency yet.

If the Federal Reserve controls the dollar, who controls the Bitcoin economy?

No one. The economics of the currency are fixed into the underlying protocol developed by Nakamoto.

Nakamoto’s rules specify that the amount of bitcoins in circulation will grow at an ever-decreasing rate toward a maximum of 21 million. Currently there are just over 6 million; in 2030, there will be over 20 million bitcoins.

Nakamoto’s scheme includes one loophole, however: if more than half of the Bitcoin network’s computing power comes under the control of one entity, then the rules can change. This would prevent, for example, a criminal cartel faking a transaction log in its own favor to dupe the rest of the community.

It is unlikely that anyone will ever obtain this kind of control. “The combined power of the network is currently equal to one of the most powerful supercomputers in the world,” says Garzik. “Satoshi’s rules are probably set in stone.”

Isn’t a fixed supply of money dangerous?

It’s certainly different. “Elaborate controls to make sure that currency is not produced in greater numbers is not something any other currency, like the dollar or the euro, has,” says Russ Roberts, professor of economics at George Mason University. The consequence will likely be slow and steady deflation, as the growth in circulating bitcoins declines and their value rises.

“That is considered very destructive in today’s economies, mostly because when it occurs, it is unexpected,” says Roberts. But he thinks that won’t apply in an economy where deflation is expected. “In a Bitcoin world, everyone would anticipate that, and they know what they got paid would buy more then than it would now.”

Does Bitcoin threaten the dollar or other currencies?

That’s unlikely. “It might have a niche as a way to pay for certain technical services,” says Roberts, adding that even limited success could allow Bitcoin to change the fate of more established currencies. “Competition is good, even between currencies—perhaps the example of Bitcoin could influence the behavior of the Federal Reserve.”

Central banks the world over have freely increased the money supply of their currencies in response to the global downturn. Roberts suggests that Bitcoin could set a successful, if smaller scale, example of how economies that forbid such intervention can also succeed.

More information for your reading pleasure can be found referenced below

“Watch & Learn” ®


Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.

Eyal, I., & Sirer, E. G. (2014, March). Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security (pp. 436-454). Springer, Berlin, Heidelberg.

Ron, D., & Shamir, A. (2013, April). Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security (pp. 6-24). Springer, Berlin, Heidelberg.

Scaillet, O., Treccani, A., & Trevisan, C. (2017). High-frequency jump analysis of the bitcoin market.

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.

Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123.

Morgan, R. (2016). It’s All about the Blockchain: Amid the Hoopla over Bitcoin and Other Virtual Currencies, It’s the Underlying Documentation Platform That’s Revolutionizing Transactions. ABA Banking Journal, 108(2), 51.

Ali, S. T., McCorry, P., Lee, H. J. P., & Hao, F. Z. (2016). Botnets with Bitcoin. In: 2nd Workshop on Bitcoin Research, 19th

Tapscott, D., & Tapscott, A. (2016). Blockchain Revolution: How the technology behind Bitcoin is changing money, business, and the world. Penguin.







« Older posts

© 2020 MiCDROP FLiX®

Theme by Anders NorenUp ↑