631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Tech Term Communications Productivity Backup Smartphones Microsoft Hosted Solutions Hackers Hardware Passwords Communication Small Business Efficiency Software Browser User Tips Ransomware Business Google Business Management Internet VoIP Android Email Outsourced IT Save Money Social Media Alert Wi-Fi Business Intelligence Applications Microsoft Office Twitter Collaboration Innovation Smartphone Miscellaneous Saving Money Employer-Employee Relationship Data Backup Bandwidth Data Recovery Router Windows 10 Computer Cloud Computing Data Managed IT Services Data Breach Settings Apps Password Patch Management Workplace Tips Vulnerability Gadgets BDR Excel Users IT Support Internet of Things Blockchain Government IT Services Office Access Control Network Data Management Automation Phishing Analytics VoIP Virtualization Mobile Devices Mobile Device Physical Security Managed IT Service Data Protection Business Continuity Battery Gmail Marketing Cortana Tech Terms Productivity Retail App Compliance Dark Web Virtual Assistant Hacking Workers VPN Website Office 365 Tip of the week Remote Computing Paperless Office Chrome IT Support Cost Management Virus Computers Spam Remote Monitoring Word Company Culture Wireless Law Enforcement Politics Mobile Device Management Artificial Intelligence Information Holiday Networking How To WiFi Cybercrime Scam Windows Wireless Charging Tech Support Dongle G Suite GDPR Edge Threat Google Maps Telecommute Movies Managed Service Processors Safety Value Printer Server Knowledge Facebook Shortcut Lead Generation Mobile Security Authorization Live Streaming Entertainment Biometrics Connectivity Recovery Bring Your Own Device Storage Files Telephony Disaster Recovery Laptop Printing Telephone Systems File Sharing Data loss Unified Communications User Tip Maintenance Spyware Spotify Remote Support Cleaning Printers Plug-In Google Drive Comparison CrashOverride Operating System WhatsApp Access Big Data Network Attached Storage Streaming Media User Security Technology Tips Hybrid Cloud Hiring/Firing Error Voice over IP Paper Cables Remote Control Staff RAM Antivirus HP Database Hosted Solution Proactive IT Specifications WannaCry Environment Work/Life Balance Troubleshooting BYOD Server Management Downloads Voice over Internet Protocol Spam Blocking Business Technology Phone System Backup and Disaster Recovery Managed IT Touchscreen eCommerce Education Smart Technology Ink Websites Microsoft Teams Botnet Reporting Telecommuting Document Management Tactics Office Tips Automobile Copy Apple Remote Monitoring and Management Multi-Factor Security Conferencing HIPAA e-waste Update News SaaS Trends Email Management Sales SSD Microsoft Office 365 Licensing Online Shopping IT budget PowerPoint Two-factor Authentication Managing Stress Hard Drives Medical IT Millennials Digital Internet Explorer Paste iPhone Staffing Analysis Content Filtering Hard Drive disposal Outlook Telephone System Machine Learning A.I. Amazon Tablet Gadget Inventory Server Authentication Travel Information Technology IT Management Sports Autocorrect Emoji Wireless Technology 5G Printer Avoiding Downtime HaaS IBM Dark Data Hacker Scheduling The Internet of Things Budget Unified Threat Management Samsung Customer Relationship Management Managed Service Provider Competition DDoS Current Events IP Address Instagram Quick Tips Leadership Money Customer Service Regulation Employer Employee Relationship Computer Care Fun Net Neutrality Mobile Office Personal Information Upgrade Emergency Domains Freedom of Information Gaming Console Windows 10 Scalability Encryption Public Speaking Yahoo Synergy Presentation Video Games Search Worker Lithium-ion battery IaaS Credit Cards Vendor Management Television Augmented Reality

Newsletter Sign Up