SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, Pat Romanski, Jason Bloomberg, Dana Gardner

Blog Feed Post

What Is Blockchain?

Blockchain, the underlying technology that powers bitcoin, is one of the buzzwords of the past year. Practically everyone is talking about blockchain, and for good reason. Distributed ledgers, the term of art for blockchain’s underlying technology, offer an exciting new way to transact business without a central authority. Here’s a nontechnical, simplified description of the component parts.

Blockchain Defined

A blockchain, or distributed ledger, is a continuously growing list (digital file) of encrypted transactions called “blocks” that are distributed (copied) to a peer-to-peer (P2P) network of computers.

Blocks

As described above, a blockchain is an immutable, sequential chain of records known as blocks. A block may contain any type of data, such as unique digital identifiers of physical products. Blocks are “chained” together using hashes. A hash is a function that takes an input value and from that input creates an output value deterministic of the input value.

In addition to user data, each block will contain an index, a timestamp, a list of transactions, a proof, and the hash of the previous block.

The Hash

The hash plays a critical role. Because each new block will contain a hash of the previous block, blockchains are immutable. If a hacker were to corrupt an earlier block in the blockchain, all subsequent blocks would contain incorrect hashes.

Encrypted Transactions

Encrypted transactions (using conventional public/private key cryptography) are also key to blockchain’s value. The user’s “public key” is stored in a block and becomes an “address” on the blockchain. Files such as cryptocurrencies or other digital assets are recorded as belonging to a specific block. A corresponding “private key” is required to access the associated digital assets. Keeping your private key private is so important that to protect their digital assets from hackers, many people do not keep digital copies of their private keys. They write the number on a piece of paper and keep the paper in a secure location (like a wall safe.)

Proof of Work (PoW)

Once a blockchain is instantiated, a Proof of Work algorithm (PoW) is used to create or “mine” new blocks.

The current bitcoin mining technique provides a good example of PoW usage. This technique is described in Wikipedia as follows: “A bitcoin miner runs a computer program that collects unconfirmed transactions from coin dealers in the network. With other data these can form a block and earn a payment to the miner, but a block is accepted by the network only when the miner discovers by trial and error a ‘nonce’ number that when included in the block yields a hash with a sufficient number of leading zero bits to meet the network’s difficulty target. Blocks accepted from miners form the bitcoin blockchain that is a growing ledger of every bitcoin transaction since the coin’s first creation.”

The API (Application Programming Interface)

The next step in the development of a distributed ledger is to set up an API (application programming interface) so that organizations that wish to transact may do so by using the internet. Transaction endpoints allow permission-based access to the data on the blockchain.

The API will also feature a “mining endpoint,” which will do three things: (1) calculate the PoW, (2) add the transaction and grant the miner a reward (in bitcoin mining, the rewards are bitcoins), and (3) create a new block and add it to the blockchain.

Peer-to-Peer (Mesh) Networks

Lastly, distributed ledgers derive their power from being distributed and decentralized. To accomplish this, a distributed ledger needs a method of accepting new nodes and a way to implement a consensus algorithm to resolve conflicts and to ensure the veracity of the blockchain.

This is done over a P2P or mesh network, a decentralized computer network where each computer (node) acts as both a client (a computer that accesses information on a server) and a server (a computer that serves information to clients). At scale, P2P networks are self-healing and very stable because the information is replicated in thousands, and in some cases millions, of places.

Public or Private

There are two general types of blockchain networks: anonymous networks, where each user has a copy of the entire blockchain and helps process and confirm transactions; and permission-based (non-anonymous) networks, where permission is required to possess a copy of the blockchain and to help process and confirm transactions.

Other Than Cryptocurrencies, What Can You Do with Blockchain?

Blockchain offers a way to verify transactions without the need for a central authority. This means you can create smart contracts using distributed ledgers. For example, a landlord might put an IoT door lock on your rental apartment. The door lock might check the blockchain to see if your rent is paid. If it isn’t, the door lock (that is, the smart contract) would not let you into the apartment. In a more complex case, a corporation could issue its own bonds and buyers could monitor payments via a distributed ledger. An even more complex use case would be the creation of self-enforcing trade agreements. The list of uses for blockchain is practically endless. From title searches to delivery verification, distributed ledgers offer a completely new, secure way to do business.

Your key question is: “For this project, is a blockchain a better choice than a well-crafted, secure database?” After that, you’re on your way!

Author’s Note: This article contains some material from a previous article titled “Nuber – The End of Uber and Central Authority,” which describes how blockchain technology might be used to create an Uber-like ridesharing service without the need for a company like Uber to run it. This is not a sponsored post. I am the author of this article and it expresses my own opinions. I am not, nor is my company, receiving compensation for it.

The post What Is Blockchain? originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups. As a result, many firms employ new business models that place enormous importa...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
Mid-sized companies will be pleased with StorageCraft's low cost for this solution compared to others in the market. There are no startup fees, our solution has a predictable monthly cost, highly competitive pricing and offers ongoing value for our partners month after month. By enabling pooling and StorageCraft's 30-days of free virtualization the company removes several concerns surrounding machine size management and disaster recovery testing costs that add to the complexity of implementing a...
Cryptomage, Inc. is a dynamic hi-tech ICT company offering products and services in the cybersecurity area. We deliver high quality solutions both technologically and conceptually. We have academic roots and hire scientists, cybersecurity experts, software developers and analysts. Our strategy is focused on maintaining the highest skills of our human resources. The Cryptomage team is capable of more than delivering complex solutions; we can improve the whole concept to deliver real added value t...
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
In addition to 22 Keynotes and General Sessions, attend all FinTechEXPO Blockchain "education sessions" plus 40 in two tracks: (1) Enterprise Cloud (2) Digital Transformation. PRICE EXPIRES AUGUST 31, 2018. Ticket prices: ($295-Aug 31) ($395-Oct 31) ($495-Nov 12) ($995-Walk-in) Does NOT include lunch.
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
DevOpsSUMMIT at CloudEXPO will expand the DevOps community, enable a wide sharing of knowledge, and educate delegates and technology providers alike. Recent research has shown that DevOps dramatically reduces development time, the amount of enterprise IT professionals put out fires, and support time generally. Time spent on infrastructure development is significantly increased, and DevOps practitioners report more software releases and higher quality. Sponsors of DevOpsSUMMIT at CloudEXPO will b...
Only Adobe gives everyone - from emerging artists to global brands - everything they need to design and deliver exceptional digital experiences. Adobe Systems Incorporated develops, markets, and supports computer software products and technologies. The Company's products allow users to express and use information across all print and electronic media. The Company's Digital Media segment provides tools and solutions that enable individuals, small and medium businesses and enterprises to cre...
Yottabyte is a software-defined data center (SDDC) company headquartered in Bloomfield Township, Oakland County, Michigan. The mission of Yottabyte is to enable any organization to easily and economically realize the benefits of the cloud in their own datacenter. The Yottabyte Cloud Software natively virtualizes compute, storage, and network resources into a resilient, automated software-defined cloud infrastructure solution. Both Enterprise IT customers and Service Providers benefit from Yottab...