888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Network Security Internet Malware Cybersecurity Hackers Communications Tech Term VoIP Ransomware Software Backup Outsourced IT IT Support Productivity Microsoft Passwords Business Management Smartphones Alert Windows 10 Communication Browser User Tips Social Media Business Efficiency Save Money Hardware Hosted Solutions Email Network Data Small Business Data Backup Productivity Phishing Users Google Data Recovery Cloud Computing Data Breach Vulnerability Apps Mobile Device Smartphone IT Services Microsoft Office Internet of Things Android Miscellaneous App Bandwidth Saving Money Twitter Mobile Device Management Workers Patch Management Wi-Fi Collaboration Computer Settings Networking Excel Company Culture Law Enforcement Politics Access Control Compliance BDR Employer-Employee Relationship Innovation Business Continuity Remote Monitoring Scam Office 365 Workplace Tips Applications Cybercrime Blockchain Government Computers Retail Office Personal Information BYOD Managing Stress Automation Antivirus SaaS Managed IT Service Information Dark Web Marketing Chrome Virus Holiday Windows Connectivity Word Education Virtual Assistant Website Vendor Management Entertainment How To Facebook Recovery Spam Wireless Maintenance Password Leadership Access Physical Security Reporting Backup and Disaster Recovery Cables Current Events Shortcut WiFi Managed Service Router Content Filtering Dark Data Plug-In Websites Microsoft Teams HIPAA Avoiding Downtime VoIPMyths Paperless Office Tactics Mobile Devices Artificial Intelligence Trends Two-factor Authentication Computer Care Live Streaming Microsoft Office 365 e-waste Tablet Files Medical IT SSD Voice over Internet Protocol Net Neutrality CrashOverride Telephone Systems Data Protection Cortana Profitability IT budget PowerPoint Gmail Unified Threat Management Proactive IT Remote Support Hard Drive VoIPSavings Digital Internet Explorer Disaster Recovery A.I. Tech Support Gaming Console WhatsApp Managed Service Provider Wireless Charging Cost Management Authentication disposal Knowledge Analytics Managed IT GDPR Inventory Safety Remote Control Eliminating Downtime IT Management Sports Botnet VPN Remote Monitoring and Management Dongle Scalability Phone System Hiring/Firing Processors Employer Employee Relationship Update Edge Threat The Internet of Things Movies Gadgets Budget Video Games Google Maps Lead Generation Authorization Spyware Value Comparison IaaS Emergency Telephony Encryption Storage Amazon Worker Battery Data Management Wireless Internet Tech Terms Television Information Technology Bring Your Own Device Credit Cards Apple Automobile Technology Efficiently Data loss Staffing News HP Smart Technology Multi-Factor Security Specifications Synergy HaaS Printer Server Licensing Voice over IP Error Printer Email Management Yahoo Help Desk Streaming Media Biometrics Regulation Technology Tips Hybrid Cloud Gadget iPhone Outlook Staff RAM Telephone System Hard Drives WannaCry Troubleshooting Document Management Database Business Intelligence Downloads Cleaning Printers Travel Touchscreen Sales DDoS Telecommuting Server Ink Emoji Public Speaking Online Shopping Instagram Presentation Millennials Money Lithium-ion battery Samsung Augmented Reality Machine Learning Wireless Technology 5G Hosted Solution Google Drive IBM IT Support File Sharing User Tip G Suite Hacker Telecommute Copy Customer Relationship Management Fun Mobile Security Competition Windows 10 Spam Blocking User Security Tip of the week IP Address VoIP Laptop Printing Big Data Unified Communications Quick Tips Paste Customer Service Operating System Business Technology Network Attached Storage Remote Computing Autocorrect Mobile Office Virtualization Paper Upgrade Conferencing Managed IT Services Domains Server Management Search eCommerce Scheduling Environment

Newsletter Sign Up