631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Cloud Privacy Business Computing Technology Cybersecurity Malware Managed IT Services Backup Communications Hardware Network Security Business Microsoft Outsourced IT Hackers Ransomware Wi-Fi Android Passwords Software Productivity Save Money Business Management Smartphones Alert Email Smartphone Google Social Media Internet VoIP Computer Communication Tech Term Router Hosted Solutions Small Business Twitter Applications Vulnerability Employer-Employee Relationship Innovation Miscellaneous Government Collaboration Data Management Bandwidth Phishing Excel VoIP Microsoft Office Business Intelligence IT Services Settings Office Mobile Devices Password Data Backup Data Breach Data Apps Windows 10 Cloud Computing Patch Management User Tips Managed IT Services Virtualization Cost Management Blockchain Wireless IT Support Retail Politics Chrome Access Control Computers Holiday Scam Cortana Business Continuity Efficiency Data Recovery Hacking Analytics Wireless Charging Data Protection Gmail Windows Workers Tech Terms Office 365 Website BDR Remote Monitoring Saving Money Paperless Office IT Support Spam Mobile Device Management Remote Computing Tip of the week Law Enforcement Virus Cybercrime WiFi Word Artificial Intelligence How To Automation Productivity Battery Gadgets Browser Physical Security Internet of Things VPN App Knowledge Mobile Security Information Technology Telephony Files Printing Laptop Unified Communications Smart Technology Data loss Education Remote Support Comparison Google Drive Operating System Biometrics Voice over IP Paper RAM Hosted Solution Staff Botnet Specifications Environment Server Access WannaCry eCommerce Ink Microsoft Teams Copy Websites Apple Conferencing Multi-Factor Security e-waste BYOD HIPAA IT budget Online Shopping Licensing PowerPoint Phone System iPhone Paste Networking Entertainment Marketing Content Filtering disposal Recovery Hard Drive Maintenance IT Management Travel Sports G Suite Dongle Value Work/Life Balance Processors Gadget Antivirus Lead Generation Live Streaming Connectivity File Sharing Telephone Systems User Tip Dark Web Printer Server Spyware Shortcut Company Culture Network Attached Storage Virtual Assistant WhatsApp Streaming Media User Security Remote Control Technology Tips Hard Drives Managed IT Automobile Office Tips Database Printers HP CrashOverride Server Management Downloads Business Technology Spam Blocking Backup and Disaster Recovery Two-factor Authentication Telecommuting Tactics Document Management News Trends Sales Email Management SSD Tech Support Safety Millennials Google Maps Internet Explorer Spotify Facebook Digital Disaster Recovery Machine Learning Telephone System A.I. Tablet Inventory Hiring/Firing Cleaning Managed IT Service Threat Staffing Edge Telecommute Big Data Movies Users Computer Care Instagram Net Neutrality Upgrade Gaming Console Freedom of Information Search Windows 10 Video Games Worker Yahoo Presentation Emergency Television Printer 5G Wireless Technology Managing Stress Managed Service Provider IBM Autocorrect Avoiding Downtime Hacker Dark Data Leadership Customer Relationship Management IP Address DDoS Bring Your Own Device Personal Information Customer Service Money Mobile Office Employer Employee Relationship Network Domains Hybrid Cloud SaaS Scalability Synergy Public Speaking IaaS Encryption Lithium-ion battery Credit Cards Augmented Reality Emoji Mobile Device HaaS Vendor Management Unified Threat Management The Internet of Things Budget Scheduling Samsung Competition Current Events Fun

Newsletter Sign Up