888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Cybersecurity Malware Hackers Communications Internet Tech Term Ransomware Backup Smartphones Outsourced IT VoIP Network Security Passwords Productivity Software Alert Social Media IT Support Business Management Business Google Hardware Save Money Hosted Solutions Microsoft Data Phishing App Data Backup Bandwidth Twitter Windows 10 Email Communication Small Business Data Recovery Cloud Computing Smartphone Microsoft Office Browser IT Services Data Breach Vulnerability User Tips Android Network Company Culture Cybercrime Politics Access Control Government Mobile Device Management Efficiency Internet of Things Computer Business Continuity Compliance BDR Apps Law Enforcement Productivity Mobile Device Blockchain Patch Management Workers Innovation Collaboration Office 365 Settings Employer-Employee Relationship Miscellaneous Remote Monitoring Scam Excel Saving Money Automation Managed IT Service Vendor Management Spam Dark Web Networking Managing Stress Chrome SaaS Virus Windows Word Wi-Fi Virtual Assistant How To Applications Facebook Entertainment Recovery Antivirus Maintenance Password Retail Holiday Computers Users Office Website Education Personal Information IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Authentication Wireless Processors Digital Internet Explorer Analytics Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal GDPR IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Mobile Devices Remote Monitoring and Management Two-factor Authentication Authorization Dongle Worker Apple Edge Threat IaaS Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Storage Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone Error Data loss Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Managed Service Provider Cost Management Streaming Media Marketing Travel Workplace Tips Business Intelligence The Internet of Things Regulation Sales Cleaning Printers Gadgets Budget Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Downloads Live Streaming Reporting Tablet Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics BYOD Knowledge Artificial Intelligence Trends WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Quick Tips Remote Computing Samsung Wireless Technology 5G Money Laptop Printing Conferencing Unified Communications IBM Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Competition Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Ink Millennials Fun Customer Service Mobile Office Upgrade Google Drive

Newsletter Sign Up