Skip to main content

Blockchain Technology


Blockchain Technology

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions every entries in proper chain format. 

Because there is no way to change a block, the only trust needed is at the point where a user or program enters data. 

This aspect reduces the need for trusted third parties, which are usually auditors or other humans that add costs and make mistakes.

Blockchain is a type of shared database that differs from a typical database in the way it stores information; blockchains store data in blocks linked together via cryptography.

Different types of information can be stored on a blockchain, but the most common use for transactions has been as a ledger. 

In Bitcoin’s case, blockchain is decentralized so that no single person or group has control—instead, all users collectively retain control.

Decentralized blockchains are immutable, which means that the data entered is irreversible. For Bitcoin, transactions are permanently recorded and viewable to anyone.


Blockchain importance?

Traditional database technologies present several challenges for recording financial transactions. For instance, consider the sale of a property. Once the money is exchanged, ownership of the property is transferred to the buyer. 

Individually, both the buyer and the seller can record the monetary transactions, but neither source can be trusted.

Blockchain is an emerging technology that is being adopted in innovative manner by various industries. We describe some use cases in different industries in the following subsections:

Energy

Finance

Media and Entertainment

Retail


Features of Blockchain Technology: 

Decentralization

Immutable records

Smart contracts


Blockchain Benefits :

Greater trust

Greater security

More efficiencies


Types of blockchain networks:

Public blockchain networks

Private blockchain networks

Hybrid blockchain networks

Consortium blockchain networks


Blockchain Protocols:

Hyper ledger fabric

Ethereum

Corda

Quorum


Database and a Blockchain difference:

Blockchains decentralize control without damaging trust in the existing data. This is not possible in other database systems.

Companies involved in a transaction cannot share their entire database. But in blockchain networks, each company has its copy of the ledger, and the system automatically maintains consistency between the two ledgers.

Although in most database systems you can edit or delete data, in blockchain you can only insert data.


Comments

Popular posts from this blog

5G Technology

5G Technology What is 5G? 5G is the fifth generation of cellular technology. It is designed to increase speed, reduce latency, and improve flexibility of wireless services. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. The 5G network will also simplify mobility, with seamless open roaming capabilities between cellular and Wi-Fi access. Mobile users can stay connected as they move between outdoor wireless connections and wireless networks inside buildings without user intervention or the need for users to reauthenticate. 5G technology will introduce advances throughout network architecture. 5G New Radio, the global standard for a more capable 5G wireless air interface, will cover spectrums not used in 4G. New antennas will incorporate technology known as massive MIMO (multiple input, multiple output), which enables mu

What is Cybersecurity?

  Improve network and cyber security with active measures and unique out-of-the-box features exclusive to Intel Hardware Shield, which includes advanced threat protection, application and data protection, and below-the-OS security. Help ensure your OS boots securely and launch your PCs in a trusted state with Intel Hardware Shield, which prevents malware from compromising the OS and offers hardware-based security capabilities that support a secure startup. An ideal cybersecurity approach should have multiple layers of protection across any potential access point or attack surface. This includes a protective layer for data, software, hardware and connected networks. In addition, all employees within an organization who have access to any of these endpoints should be trained on the proper compliance and security processes. Organizations also use tools such as unified threat management systems as another layer of protection against threats. These tools can detect, isolate and remediate po

Client-Side Technologies

  Client-Side Technologies Client Side Technologies are the tools and languages that run in the user's web browser, rather than on a web server. In the world of web development, client-side technologies handle: Web page layout Form input validation User interaction Dynamic changes in web page content HTML HTML is the standard markup language used to create web pages and web applications. Its elements form the building blocks of pages, representing formatted text, images, form inputs, and other structures. When a browser makes a request to a URL, whether fetching a page or an application, the first thing that is returned is an HTML document. This HTML document may reference or include additional information about its look and layout in the form of CSS, or behavior in the form of JavaScript. CSS CSS (Cascading Style Sheets) is used to control the look and layout of HTML elements. CSS styles can be applied directly to an HTML element, defined separately on the same page, or defined in