(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Tech Term Privacy Network Security Cybersecurity Smartphones Malware Passwords Cloud Hardware Internet Wi-Fi Microsoft Google Android Data Communication Managed IT services Ransomware Hosted Solutions Communications User Tips Productivity Business Management Email IT Support Small Business Software Efficiency Collaboration Network Browser Blockchain Innovation Backup Saving Money Social Media Applications Business Intelligence Mobile Devices Employer-Employee Relationship Data Breach Patch Management Excel Virtual Assistant Internet of Things Computer Virtualization Gmail Compliance Router Bandwidth Remote Computing VPN Outsourced IT BDR Marketing Hackers Government Managed IT Service Cloud Computing Cortana Save Money Data recovery Data Management Information Computers Wireless Charging Automation Analytics Cost Management Tech Terms Data Protection Networking Business Wireless Smartphone Mobile Device IT Services Phishing Artificial Intelligence Windows 10 Data Backup VoIP Cybercrime Workplace Tips Processors Antivirus A.I. Touchscreen Mobile Security e-waste Cables Machine Learning GDPR Sales Physical Security Backup and Disaster Recovery Password Printing eCommerce Digital Company Culture Tactics Plug-In Chrome Vulnerability Staff Movies Microsoft Office 365 Hard Drives Comparison Operating System disposal Voice over Internet Protocol Apps Safety How To Connectivity Storage Tablet Laptop SSD Server Settings Paper User Security Edge Managing Stress Proactive IT Microsoft Office Spyware Access Control Gadgets Specifications IT Management Value Apple Telecommuting WannaCry Telecommute Streaming Media Dark Web Knowledge Facebook Managed IT Services Battery Server Management Ink Reporting Big Data G Suite Maintenance Remote Monitoring and Management Office 365 Law Enforcement Telephony HP Websites Unified Communications Authentication Users Conferencing Miscellaneous iPhone Workers HIPAA Data loss Downloads Error Twitter Tip of the week PowerPoint Medical IT Business Technology Technology Tips Bring Your Own Device Internet Explorer Analysis Voice over IP Document Management RAM Authorization Office Database Amazon Millennials Hard Drive Virus Trends Spam IT budget Inventory User Tip Lead Generation Sports SaaS Environment Hybrid Cloud Online Shopping Network Attached Storage Threat Managed Service File Sharing Holiday Paperless Office Dongle Microsoft Teams Content Filtering Presentation Two-factor Authentication Remote Monitoring Lithium-ion battery Augmented Reality Wireless Technology 5G Tech Support IBM Search Regulation The Internet of Things Productivity Hacker Alert Budget Competition Customer Relationship Management IP Address Website Disaster Recovery Customer Service Managed Service Provider Mobile Office Upgrade Domains Hiring/Firing Printers Mobile Device Management Windows 10 Fun Public Speaking Quick Tips