Blog
home
  • Register

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 15, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Tech Term Privacy Cybersecurity Network Security Smartphones Malware Communications Hardware Microsoft Android Cloud Communication Email VoIp Software Internet Managed IT services Wi-Fi Social Media Ransomware Applications Data Employer-Employee Relationship Small Business Patch Management Blockchain Productivity Passwords IT Support Backup Mobile Devices Google Business Management Data Protection Smartphone How To Virus VPN Gmail Compliance Innovation Saving Money BDR Hosted Solutions Collaboration Physical Security Phishing Data Management Computer Wireless Network IT Services Cloud Computing Business Business Intelligence Data recovery Browser Excel Tech Terms Cost Management Information Outsourced IT Chrome Computers Cortana Hackers Router Scam Data Breach Automation Microsoft Office Networking Government Remote Computing Wireless Charging Internet of Things Windows 10 Virtual Assistant Data Backup Managed IT Service Artificial Intelligence Virtualization Save Money Word Server Workplace Tips News Bandwidth Movies Licensing Efficiency disposal Paperless Office Staff Managed IT Services Apps GDPR IT Management Mobile Security Tablet Settings Voice over Internet Protocol Ink WannaCry Retail Hard Drives User Security Telephony Managing Stress Live Streaming Comparison Maintenance Marketing Plug-In Telephone System Analytics Workers Tech Support Server Management Value Digital Websites Tip of the week Streaming Media Operating System Telecommute PowerPoint HIPAA Remote Support SSD Business Technology Voice over IP G Suite Specifications Internet Explorer Proactive IT Cleaning File Sharing Millennials Unified Communications Alert Vulnerability Safety Downloads Access Control Knowledge Battery Data loss Sports Hard Drive Reporting Facebook Holiday Bring Your Own Device Conferencing Threat Lead Generation Remote Monitoring and Management Big Data Technology Tips RAM Database Edge Trends Apple Network Attached Storage Environment Amazon HP Spam Processors Medical IT IT budget Twitter eCommerce Hybrid Cloud Congratulations Office Printing Botnet Microsoft Teams Travel Cybercrime Users Dongle Law Enforcement Telecommuting A.I. iPhone Password e-waste User Tips Document Management Antivirus User Tip Connectivity Spyware SaaS Website Inventory Sales Online Shopping Cables WhatsApp Tactics Content Filtering Paper Remote Monitoring Laptop Backup and Disaster Recovery Miscellaneous Office 365 Company Culture Education Machine Learning WiFi Regulation Thank You Analysis Gadgets Managed Service

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123