631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity Cybersecurity Malware User Tips Tech Term Managed IT Services Backup Smartphones Microsoft Communications Efficiency Hardware Internet Passwords Communication Hackers Business Management Google Business Ransomware Android Outsourced IT Email Hosted Solutions Small Business Software Browser Mobile Device VoIP Wi-Fi Data Backup Data Recovery IT Services Collaboration Innovation IT Support Social Media Holiday Internet of Things Network Data Windows 10 Alert Save Money Cloud Computing Microsoft Office Applications Smartphone Users Miscellaneous Employer-Employee Relationship Saving Money Access Control Wireless Router Mobile Devices Computer Password Bandwidth Apps Twitter Business Intelligence Managed IT Services BDR Data Management Phishing Blockchain Excel Workplace Tips Virtualization Office Word Automation Analytics Networking VoIP Marketing Settings Patch Management Gadgets Business Continuity Information Government Data Breach Vulnerability Tech Terms Connectivity Paperless Office Medical IT Cost Management Dark Web Website Office 365 Facebook IT Support Retail Mobility Virtual Assistant Remote Monitoring Tip of the week Remote Computing Managed Service Law Enforcement Chrome Workers Virus Spam VPN Mobile Device Management WiFi Cybercrime BYOD Scam Compliance Computers Artificial Intelligence Company Culture How To Politics Battery Cortana Wireless Charging Windows Physical Security Managed IT Service Productivity App Data Protection Hacking Gmail Remote Monitoring and Management Printer Server Certification Files Telephony Big Data Lead Generation Mobile Security Telephone Systems File Sharing Outlook Work/Life Balance User Tip Bring Your Own Device Shortcut Analysis Remote Support Laptop Printing Entertainment Biometrics Google Drive Comparison Data loss Unified Communications Recovery Amazon Data Security WhatsApp Spyware Disaster Recovery Authentication Managed IT Network Attached Storage Streaming Media Cleaning Printers Office Tips Automobile Voice over IP Upgrade Operating System Maintenance GDPR Botnet Remote Control User Security Access Profitability Technology Tips Hybrid Cloud CrashOverride Hosted Solution Paper Specifications Staff RAM HP Database Authorization Server Management Downloads Training eCommerce WannaCry Environment Antivirus Storage Hard Drives Spam Blocking Business Technology Eliminating Downtime Telecommuting Backup and Disaster Recovery Copy Apple Ink Multi-Factor Security Conferencing Websites Microsoft Teams Phone System Plug-In News Two-factor Authentication Document Management Tactics Education Smart Technology Server Trends Cables Security Cameras Google Maps Licensing Online Shopping HIPAA e-waste Error Email Management Sales PowerPoint SaaS Wireless Internet Millennials SSD Paste iPhone IT budget Troubleshooting Content Filtering Managing Stress Proactive IT Telephone System Tech Support Digital Internet Explorer Safety Machine Learning A.I. Staffing Voice over Internet Protocol Wearables Travel Hard Drive disposal Touchscreen Tablet IT Management Sports Help Desk Spotify Inventory Reporting Update Dongle G Suite Gadget Edge Threat Information Technology Knowledge Telecommute Movies Healthcare Live Streaming Processors Value Microsoft Office 365 Hiring/Firing IP Address HaaS Employer Employee Relationship Printer Fun Freedom of Information Customer Service Unified Threat Management Mobile Office Domains Current Events Leadership Yahoo Encryption Computer Care Emergency Windows 10 Personal Information Public Speaking Net Neutrality Search Vendor Management Presentation Quick Tips Lithium-ion battery Gaming Console Autocorrect Avoiding Downtime Augmented Reality Regulation Scheduling Wireless Technology 5G Scalability Dark Data Video Games Samsung IBM Synergy Hacker IaaS The Internet of Things Worker Managed Service Provider Instagram Credit Cards DDoS Budget Television Competition Customer Relationship Management Emoji Money

Newsletter Sign Up