(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Privacy Tech Term Smartphones Efficiency Internet Cybersecurity Microsoft Malware Hardware Email Data Passwords Communication Android Google Browser Innovation Mobile Device Cloud Wi-Fi Small Business Software Windows 10 Collaboration Network Ransomware IT Support Communications Mobile Devices Data Backup Business Management IT Services Applications Holiday Managed IT services Users Backup Data recovery Saving Money Business Hosted Solutions Wireless Internet of Things Business Intelligence Smartphone Marketing Employer-Employee Relationship Hackers Cloud Computing Information Blockchain Outsourced IT Social Media Networking Managed IT Services Workplace Tips VoIP Compliance Artificial Intelligence Computer Data Protection Connectivity Virtual Assistant Bandwidth Access Control Password Apps Phishing Mobility Data Breach Patch Management G Suite VPN Microsoft Office Remote Monitoring and Management Data Security BDR Excel Router Virtualization Gmail Office 365 Medical IT Facebook Cost Management Save Money Miscellaneous Remote Computing Data Management Government Managed IT Service Computers Managed Service Analytics Wireless Charging Automation Tech Terms Cortana iPhone Workers Printing Payment Company Culture Profitability Lead Generation Wearables Paperless Office Dongle Business Technology Movies Microsoft Office 365 Online Shopping Network Attached Storage Tip of the week Tactics Plug-In Processors Antivirus Voice over IP Storage Mobile Security Office disposal Voice over Internet Protocol Certification Millennials Paper instant Messaging Physical Security Backup and Disaster Recovery Managing Stress Eliminating Downtime Machine Learning Healthcare Digital Safety User Tip Proactive IT Vulnerability Staff File Sharing Streaming Media Dark Web Operating System Content Filtering Value Ink Reporting Vulnerabilities Laptop Gadgets SSD BYOD Edge Sales Unified Communications Authentication Troubleshooting Settings Maintenance Training Spyware Big Data eCommerce Downloads Error IT Management Chrome PowerPoint Hard Drives Comparison Bring Your Own Device Wireless Internet WannaCry Telecommute Internet Explorer Analysis Personal Information Tablet RAM Authorization Update Battery Server Management How To Security Cameras HP Websites Upgrade User Security Trends Server Database Amazon Data loss Sports SaaS Twitter Specifications Environment Hybrid Cloud Help Desk HIPAA Telecommuting Threat E-Commerce Technology Tips Spam Knowledge Microsoft Teams Outlook Apple Word Document Management A.I. Touchscreen Cybercrime Hard Drive Virus Law Enforcement Telephony GDPR IT budget Inventory Conferencing e-waste Cables Business Continuity Two-factor Authentication Managed Service Provider Presentation Disaster Recovery Lithium-ion battery Augmented Reality Hiring/Firing Regulation Tech Support Wireless Technology 5G IBM Fun Printers Alert The Internet of Things Productivity Hacker Budget Remote Monitoring Customer Relationship Management Competition IP Address Cryptocurrency Website Customer Service Search Mobile Office Domains Quick Tips Windows 10 Mobile Device Management Public Speaking