(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Privacy Cybersecurity Network Security Business Computing Technology Hardware Internet Wi-Fi Ransomware Malware Smartphones Tech Term Android Business Management Cloud Microsoft Passwords Managed IT services Applications Mobile Devices Email Data Employer-Employee Relationship Innovation Data Breach Computers Productivity Wireless Charging Google Business Gmail Social Media Wireless IT Support Artificial Intelligence Outsourced IT Government Computer Cortana Communication Cost Management Software VPN Data Protection IT Services Phishing Save Money Data Management Patch Management Backup Excel Saving Money Router Tech Terms Collaboration Business Intelligence Remote Computing Communications Small Business Smartphone Blockchain Windows 10 HP Content Filtering Inventory Tactics Miscellaneous User Tips Sales Connectivity Dongle Automation Virtualization Document Management Mobile Security Chrome IT budget Lead Generation Tablet Streaming Media Bandwidth Server Paperless Office VoIP G Suite Operating System Maintenance Managed IT Service Virtual Assistant Knowledge Downloads BDR Machine Learning Digital Managed IT Services Bring Your Own Device Law Enforcement Internet Explorer Telephony Trends Environment Edge Tip of the week Hybrid Cloud Marketing Hackers Threat IT Management Voice over IP WannaCry A.I. Technology Tips Telecommute e-waste User Tip File Sharing Printing Virus Office 365 Holiday Data loss HIPAA Movies Data Backup disposal Analytics eCommerce Paper Antivirus Hard Drives Hard Drive Spam Comparison Backup and Disaster Recovery Value How To Online Shopping User Security Ink Staff Network Attached Storage Hosted Solutions Processors Specifications Unified Communications SSD Apple Physical Security Telecommuting PowerPoint Cloud Computing Password Vulnerability Conferencing RAM Facebook Database iPhone Laptop Safety Workers Apps Settings Business Technology Sports Websites Efficiency Spyware Office Microsoft Teams Twitter Cybercrime Browser Millennials Battery Big Data Internet of Things Networking Server Management Company Culture Users Upgrade Managing Stress Alert Windows 10 Search Presentation Wireless Technology 5G Managed Service Provider IBM Data recovery Hacker Microsoft Office Customer Relationship Management IP Address Cables Website Remote Monitoring Customer Service Mobile Office Voice over Internet Protocol Domains Mobile Device Management Public Speaking Two-factor Authentication Lithium-ion battery Augmented Reality Tech Support The Internet of Things Productivity Hiring/Firing Budget Gadgets Competition Fun