888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers Communications User Tips Cybersecurity Ransomware Backup Tech Term Software Productivity Business Management Smartphones Outsourced IT VoIP Efficiency Microsoft Passwords IT Support Business Hardware Email Data Productivity Alert Browser IT Services Innovation Network Google Social Media Data Backup Windows 10 Communication Small Business Data Recovery Microsoft Office Mobile Device Smartphone Phishing Holiday Collaboration Users Save Money Hosted Solutions Cloud Computing Data Breach Vulnerability Android Miscellaneous Saving Money App Bandwidth Twitter Access Control Internet of Things Business Continuity Apps Blockchain Patch Management Workers Office 365 Personal Information Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Wireless Government Mobile Device Management Mobile Devices Wi-Fi Computer Compliance BDR Applications Facebook Workplace Tips Law Enforcement Password Maintenance Retail Office Website Data Security Computers Education BYOD Medical IT Vendor Management Automation Managed IT Service Chrome SaaS Spam Dark Web Managing Stress Virus Information Remote Monitoring and Management Windows Word Virtual Assistant Connectivity How To Entertainment Recovery Marketing Antivirus Healthcare WiFi Managed IT Cleaning Printers Gadgets Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification Reporting Tablet Downloads Managed Service Live Streaming Plug-In Telephone Systems Data Protection Encryption Computer Care VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Mobility Remote Support Hard Drive Paperless Office Tactics Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Synergy e-waste Disaster Recovery Upgrade Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Voice over Internet Protocol Proactive IT E-Commerce Remote Control IT budget PowerPoint Gaming Console VoIPSavings Yahoo SSD Training Processors Digital Internet Explorer Analytics Authentication disposal GDPR Comparison Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation Inventory Payment IT Management Sports Video Games Google Maps Update Emergency Telephony DDoS Security Cameras Apple Edge Threat IaaS Two-factor Authentication Authorization Dongle Worker Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Amazon Smart Technology instant Messaging Email Management Tech Terms Staffing Technology Efficiently Licensing Voice over IP iPhone HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer Telephone System WannaCry Unified Threat Management HP Biometrics Error Data loss Gadget Safety Help Desk Business Intelligence The Internet of Things Regulation Vulnerabilities Sales Managed Service Provider Cost Management Streaming Media Outlook Travel Paper Telecommuting Customer Relationship Management Competition Environment Big Data Cryptocurrency Server Management IP Address Online Shopping Fun Ink Millennials Customer Service Google Drive Mobile Office Hosted Solution Domains File Sharing IT Support Autocorrect User Tip Virtualization Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Emoji Telecommute VoIP Lithium-ion battery Mobile Security Paste Augmented Reality Business Technology Instagram Wireless Technology 5G Wearables Money Laptop Printing Quick Tips Remote Computing Samsung IBM Conferencing Unified Communications Operating System Network Attached Storage Managed IT Services Hacker eCommerce

Newsletter Sign Up