888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Managed IT Services Privacy Technology Best Practices Cloud Cybersecurity Ransomware Hackers Malware Productivity Internet Communications Outsourced IT Backup Alert VoIP Business Management Software Network Security IT Support Phishing Save Money Business Social Media Microsoft Passwords Smartphones Hardware Email Data Android Tech Term Windows 10 Vulnerability Twitter IT Services App Smartphone Data Breach Small Business Settings Apps Law Enforcement Scam Productivity Politics Bandwidth Data Backup Government User Tips Business Continuity Miscellaneous Google Cloud Computing Patch Management Workers Computer Excel Cybercrime Microsoft Office Office 365 Remote Monitoring Saving Money Mobile Device Management Computers Education Virus Browser Efficiency Employer-Employee Relationship Innovation Word BDR Entertainment How To Recovery Applications Maintenance Antivirus Password Wi-Fi Holiday Office Personal Information Retail Communication Collaboration Company Culture Mobile Device Vendor Management Chrome Internet of Things Access Control Windows Website Facebook Spam Data Recovery Blockchain Hosted Solutions Live Streaming Computer Care Shortcut Microsoft Teams Data Protection Websites Net Neutrality Telephone Systems Data Management Tech Support Gmail e-waste Disaster Recovery PowerPoint Automation WhatsApp IT budget Gaming Console CrashOverride Safety Wireless Charging Managing Stress The Internet of Things Networking Remote Control Yahoo Hiring/Firing Budget disposal Gadgets Dark Web Sports IT Management Video Games Lead Generation Dongle Worker Television Google Maps Value Users Information Technology Connectivity News Tech Terms Avoiding Downtime Virtual Assistant Bring Your Own Device Printer Email Management Staffing Biometrics Streaming Media Telephone System Wireless WannaCry Hybrid Cloud Sales Technology Tips Document Management Leadership Managed IT Database Access Physical Security Downloads Employer Employee Relationship HIPAA Tablet Backup and Disaster Recovery Paperless Office Cortana Encryption Tactics BYOD Files Hard Drive Trends Remote Support Artificial Intelligence Network Automobile Managed Service Provider Knowledge SSD Synergy Analytics Digital SaaS Managed IT Service Internet Explorer Marketing Processors A.I. Scalability Comparison Inventory Emergency Edge IaaS Phone System Battery Telephony Threat Spyware Movies Apple Credit Cards Dark Data Specifications Smart Technology Multi-Factor Security Printer Server Licensing HaaS Voice over IP HP iPhone Data loss Unified Threat Management Hard Drives Printers Travel Cleaning Gadget DDoS Cost Management Mobile Devices RAM WiFi Staff Current Events Business Intelligence VPN Botnet Two-factor Authentication Content Filtering Router Ink Lithium-ion battery Online Shopping Augmented Reality File Sharing Autocorrect User Tip Competition Fun G Suite Big Data User Security Spam Blocking Tip of the week Windows 10 Upgrade Business Technology Virtualization Money Remote Computing Network Attached Storage Search Managed IT Services Server Telecommuting Presentation Server Management Cables Millennials Wireless Technology 5G Voice over Internet Protocol IBM Google Drive IT Support Hacker Machine Learning Hosted Solution Customer Relationship Management Scheduling IP Address Telecommute Copy Emoji Customer Service Mobile Security Laptop VoIP Instagram Mobile Office Printing Unified Communications Domains Paste Samsung Conferencing Operating System Paper eCommerce Public Speaking Environment

Newsletter Sign Up