631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Backup Tech Term Network Security Smartphones Hardware Microsoft Hackers Business Management Business Outsourced IT Ransomware Hosted Solutions Passwords Communication Software Alert Google Social Media Android Productivity VoIP Wi-Fi Email Small Business Save Money Smartphone Applications Microsoft Office Employer-Employee Relationship Router Internet Data Backup Computer Data Data Recovery Twitter Business Intelligence Settings Government Patch Management IT Services Browser Vulnerability BDR Data Management Innovation Collaboration Data Breach Efficiency User Tips Miscellaneous Phishing IT Support Saving Money Blockchain Virtualization Internet of Things Mobile Devices Excel Office Password Network Automation Windows 10 Analytics Apps Cloud Computing Bandwidth VoIP Gmail Gadgets Paperless Office Windows Cost Management IT Support Tech Terms Website Office 365 Dark Web Business Continuity Managed IT Services Information Remote Monitoring Virtual Assistant Law Enforcement Tip of the week Remote Computing Holiday Retail Chrome WiFi Cybercrime Spam Virus Wireless Access Control Scam Mobile Device Management VPN Word Workers Computers Artificial Intelligence Battery How To Compliance Cortana Networking Company Culture Wireless Charging App Politics Productivity Physical Security Managed IT Service Data Protection Hacking Dongle G Suite Staffing Proactive IT Edge Threat Hiring/Firing Telecommute Movies Live Streaming Voice over Internet Protocol Processors Value Knowledge Connectivity Work/Life Balance Information Technology Big Data Files Telephony Lead Generation Mobile Security Gadget Telephone Systems File Sharing Reporting User Tip Bring Your Own Device Users Remote Support Remote Monitoring and Management Laptop Printing Managed IT Data loss Unified Communications Office Tips Automobile Printer Server WhatsApp Spyware Botnet Google Drive Comparison Network Attached Storage Streaming Media Entertainment Biometrics Voice over IP Operating System Facebook Shortcut Remote Control User Security Medical IT Technology Tips Hybrid Cloud Recovery Hosted Solution Analysis Paper Disaster Recovery Specifications Staff RAM Cleaning Printers Amazon HP Database Hard Drives Maintenance GDPR Server Management Downloads Access eCommerce WannaCry Environment CrashOverride Spam Blocking Business Technology Telecommuting Backup and Disaster Recovery Copy Apple Managed Service Ink Server Multi-Factor Security Conferencing Websites Microsoft Teams Google Maps Two-factor Authentication News Workplace Tips Document Management Tactics Antivirus Storage Trends BYOD Licensing Online Shopping HIPAA e-waste Email Management Sales Education Smart Technology Millennials SSD Phone System Paste iPhone IT budget PowerPoint Content Filtering Managing Stress Tech Support Telephone System Plug-In Digital Internet Explorer Machine Learning A.I. Spotify SaaS Travel Cables Hard Drive disposal Safety Tablet Inventory Marketing IT Management Sports Video Games Budget Money Synergy Employer Employee Relationship IaaS Customer Relationship Management Worker Competition Television Fun Credit Cards IP Address Freedom of Information Emoji HaaS Customer Service Printer Upgrade Mobile Office Domains Yahoo Encryption Unified Threat Management Leadership Windows 10 Emergency Search Mobile Device Current Events Public Speaking Vendor Management Computer Care Autocorrect Presentation Avoiding Downtime Personal Information Net Neutrality Lithium-ion battery Augmented Reality Dark Data Scheduling Samsung Gaming Console Wireless Technology 5G Error IBM Managed Service Provider Instagram The Internet of Things DDoS Scalability Hacker Regulation

Newsletter Sign Up