Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

Tech Term of the Week: Blockchain

Tech Term of the Week: Blockchain

For our Tech Terms, we sometimes dig into the inner workings of your computer or other technology hardware, but sometimes we like to dig into details of new or emerging technology that’s taking the industry by storm. Today, we’re doing just that by discussing what a blockchain is and how it works.

What is the Blockchain?
Most people hear the word blockchain and immediately think about Bitcoin. However, blockchain has a lot of other practical uses in many different industries. Blockchain technology was born out of a need for a continuously updated mutual ledger. This concept would then be adapted into cryptocurrency through the development of Bitcoin (and others) to provide individuals with an encrypted and private way to make transactions.

In a way, the blockchain is basically a database that is validated by multiple users rather than one central authority. Think of it like a publicly-managed server hosting data instead of a single entity governing the data, like how an organization might host all of its data on a single server.

How Does it Work?
Let’s get one thing clear right off the bat--blockchain technology is not simple. That isn’t to say that it’s terribly complicated to understand on a basic level, though. The most interesting part of the blockchain is that, since it’s hosted and controlled by so many users, no one entity can have complete control over it. This also means that users cannot go back into the logs and tamper with things, guaranteeing that what you see is what you get--or, at least, as authentic as possible. This extra layer of security is one of the best reasons why the blockchain is such a reliable resource for cryptocurrencies.

It is thought that the future holds untold potential uses for the blockchain, including the ability to guarantee the authenticity of various types of data. Other applications are being considered, but the amount of power and electricity required to power a blockchain places limits on the practicality of many of these systems.

What are some other technology ideas or concepts that you would want us to cover? Leave your Tech Terms in the comments below.

Defining “Cyberterrorism” is Easier Than It Sounds
Why You Need to Know the Difference Between “Value...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computers User Tip Internet of Things Applications Microsoft Tech Term Communications Document Management Technology Passwords Data Breach Machine Learning Facebook Voice over IP BDR Database Plug-In Downloads Save Money Backup Streaming Media Apple Digital Office Efficiency Business Computing Holiday Server Unified Communications Tactics Government Inventory WannaCry Ink IT Services Vulnerability Network Attached Storage Compliance Chrome Blockchain Congratulations VoIp Patch Management Excel eCommerce Online Shopping Information Staff Spam Proactive IT VPN SSD Mobile Devices Business Intelligence Email Cost Management RAM IT Support Value Hardware Social Media IT Management iPhone Sports Spyware Malware Productivity e-waste Operating System Amazon Tip of the week Business Technology disposal Cloud Millennials Technology Tips Tech Terms Computer Processors Managed IT services Settings Office 365 Data Mobile Security Data Backup Bandwidth How To Networking Smartphones Communication Automation G Suite A.I. Battery Remote Monitoring and Management Tablet Smartphone Virus Outsourced IT Regulation Innovation Small Business Network Employer-Employee Relationship Hard Drive Artificial Intelligence Laptop Data Management Dongle Edge File Sharing Cybersecurity Phishing Saving Money Bring Your Own Device Environment Lead Generation Analytics Software Reporting Cortana Miscellaneous Business Management Password Data loss Managed IT Services WiFi User Tips Tip of the Week Microsoft Office Workplace Tips Apps Connectivity Internet Company Culture Maintenance Alert Law Enforcement Analysis Knowledge Remote Computing Big Data Workers IT budget Data recovery Twitter Security Trends Hosted Solutions Websites Cybercrime Backup and Disaster Recovery Paperless Office Router Content Filtering Server Management Physical Security Antivirus User Security Telephony Telecommute Managed IT Service Cables Paper Browser Sales Comparison Cloud Computing Conferencing Microsoft Teams Hybrid Cloud Virtualization PowerPoint Printing Managed Service Collaboration Business Privacy Hard Drives Ransomware Wireless Threat Android Best Practices Managing Stress Data Protection Movies Gmail Telecommuting Wireless Charging Marketing Users Voice over Internet Protocol Virtual Assistant Hackers HIPAA Specifications Google Thank You Wi-Fi Windows 10 Gadgets HP Network Security Internet Explorer Safety

Newsletter Sign Up