(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 14 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Tech Term Internet Privacy Smartphones Cybersecurity User Tips Cloud Malware Communication Efficiency Browser Hardware Wi-Fi Microsoft Passwords Android Productivity Mobile Device Users Saving Money Hosted Solutions Communications Email Data Network Small Business Managed IT services Ransomware Software Windows 10 Google IT Support Innovation Backup Outsourced IT Workplace Tips Networking Social Media Business Wireless Internet of Things Managed IT Services Business Intelligence Data Backup Mobile Devices VoIP Business Management Collaboration Applications Employer-Employee Relationship Marketing Information Blockchain Data recovery Data Management Miscellaneous Remote Computing Computers Wireless Charging Automation Managed Service Analytics Government Managed IT Service Tech Terms Artificial Intelligence Cortana Compliance Connectivity Virtual Assistant Computer Bandwidth Data Protection Smartphone IT Services VPN Phishing BDR Hackers Cloud Computing Data Breach Patch Management Excel Cost Management Virtualization Gmail Save Money Router Database Amazon Office 365 HP Websites Chrome Trends Hard Drives Comparison HIPAA Data loss How To Sports SaaS Twitter Tablet Environment Hybrid Cloud Outlook Server Threat Technology Tips User Security Microsoft Teams Cybercrime Document Management A.I. Touchscreen Specifications Cables Hard Drive Virus Apple Telecommuting GDPR Spam IT budget Inventory Knowledge e-waste Profitability Lead Generation Printing Company Culture Conferencing Tactics Plug-In Paperless Office Dongle Law Enforcement Telephony Movies Microsoft Office 365 Online Shopping Network Attached Storage disposal Voice over Internet Protocol Processors Antivirus iPhone Workers Storage Mobile Security Eliminating Downtime Machine Learning Tip of the week Paper Physical Security Backup and Disaster Recovery Business Technology Managing Stress Password Office Proactive IT Digital Voice over IP Access Control Value Vulnerability Staff Millennials Streaming Media Dark Web Operating System Apps Safety BYOD User Tip Ink Reporting Laptop SSD G Suite Settings Content Filtering Maintenance Remote Monitoring and Management Edge File Sharing Holiday Unified Communications Authentication Troubleshooting Microsoft Office Spyware Downloads Error Gadgets IT Management Wireless Internet WannaCry Telecommute PowerPoint Medical IT Facebook Sales Bring Your Own Device Battery Server Management Internet Explorer Analysis Big Data eCommerce RAM Authorization Update Website Customer Service Search Mobile Office Upgrade Quick Tips Domains Mobile Device Management Windows 10 Public Speaking Disaster Recovery Presentation Two-factor Authentication Managed Service Provider Lithium-ion battery Regulation Hiring/Firing Alert Augmented Reality Printers Wireless Technology 5G Tech Support IBM Fun The Internet of Things Productivity Hacker Budget Remote Monitoring Competition Customer Relationship Management IP Address