SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

Blog Feed Post

What Is Blockchain?

Blockchain, the underlying technology that powers bitcoin, is one of the buzzwords of the past year. Practically everyone is talking about blockchain, and for good reason. Distributed ledgers, the term of art for blockchain’s underlying technology, offer an exciting new way to transact business without a central authority. Here’s a nontechnical, simplified description of the component parts.

Blockchain Defined

A blockchain, or distributed ledger, is a continuously growing list (digital file) of encrypted transactions called “blocks” that are distributed (copied) to a peer-to-peer (P2P) network of computers.

Blocks

As described above, a blockchain is an immutable, sequential chain of records known as blocks. A block may contain any type of data, such as unique digital identifiers of physical products. Blocks are “chained” together using hashes. A hash is a function that takes an input value and from that input creates an output value deterministic of the input value.

In addition to user data, each block will contain an index, a timestamp, a list of transactions, a proof, and the hash of the previous block.

The Hash

The hash plays a critical role. Because each new block will contain a hash of the previous block, blockchains are immutable. If a hacker were to corrupt an earlier block in the blockchain, all subsequent blocks would contain incorrect hashes.

Encrypted Transactions

Encrypted transactions (using conventional public/private key cryptography) are also key to blockchain’s value. The user’s “public key” is stored in a block and becomes an “address” on the blockchain. Files such as cryptocurrencies or other digital assets are recorded as belonging to a specific block. A corresponding “private key” is required to access the associated digital assets. Keeping your private key private is so important that to protect their digital assets from hackers, many people do not keep digital copies of their private keys. They write the number on a piece of paper and keep the paper in a secure location (like a wall safe.)

Proof of Work (PoW)

Once a blockchain is instantiated, a Proof of Work algorithm (PoW) is used to create or “mine” new blocks.

The current bitcoin mining technique provides a good example of PoW usage. This technique is described in Wikipedia as follows: “A bitcoin miner runs a computer program that collects unconfirmed transactions from coin dealers in the network. With other data these can form a block and earn a payment to the miner, but a block is accepted by the network only when the miner discovers by trial and error a ‘nonce’ number that when included in the block yields a hash with a sufficient number of leading zero bits to meet the network’s difficulty target. Blocks accepted from miners form the bitcoin blockchain that is a growing ledger of every bitcoin transaction since the coin’s first creation.”

The API (Application Programming Interface)

The next step in the development of a distributed ledger is to set up an API (application programming interface) so that organizations that wish to transact may do so by using the internet. Transaction endpoints allow permission-based access to the data on the blockchain.

The API will also feature a “mining endpoint,” which will do three things: (1) calculate the PoW, (2) add the transaction and grant the miner a reward (in bitcoin mining, the rewards are bitcoins), and (3) create a new block and add it to the blockchain.

Peer-to-Peer (Mesh) Networks

Lastly, distributed ledgers derive their power from being distributed and decentralized. To accomplish this, a distributed ledger needs a method of accepting new nodes and a way to implement a consensus algorithm to resolve conflicts and to ensure the veracity of the blockchain.

This is done over a P2P or mesh network, a decentralized computer network where each computer (node) acts as both a client (a computer that accesses information on a server) and a server (a computer that serves information to clients). At scale, P2P networks are self-healing and very stable because the information is replicated in thousands, and in some cases millions, of places.

Public or Private

There are two general types of blockchain networks: anonymous networks, where each user has a copy of the entire blockchain and helps process and confirm transactions; and permission-based (non-anonymous) networks, where permission is required to possess a copy of the blockchain and to help process and confirm transactions.

Other Than Cryptocurrencies, What Can You Do with Blockchain?

Blockchain offers a way to verify transactions without the need for a central authority. This means you can create smart contracts using distributed ledgers. For example, a landlord might put an IoT door lock on your rental apartment. The door lock might check the blockchain to see if your rent is paid. If it isn’t, the door lock (that is, the smart contract) would not let you into the apartment. In a more complex case, a corporation could issue its own bonds and buyers could monitor payments via a distributed ledger. An even more complex use case would be the creation of self-enforcing trade agreements. The list of uses for blockchain is practically endless. From title searches to delivery verification, distributed ledgers offer a completely new, secure way to do business.

Your key question is: “For this project, is a blockchain a better choice than a well-crafted, secure database?” After that, you’re on your way!

Author’s Note: This article contains some material from a previous article titled “Nuber – The End of Uber and Central Authority,” which describes how blockchain technology might be used to create an Uber-like ridesharing service without the need for a company like Uber to run it. This is not a sponsored post. I am the author of this article and it expresses my own opinions. I am not, nor is my company, receiving compensation for it.

The post What Is Blockchain? originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
Blockchain has shifted from hype to reality across many industries including Financial Services, Supply Chain, Retail, Healthcare and Government. While traditional tech and crypto organizations are generally male dominated, women have embraced blockchain technology from its inception. This is no more evident than at companies where women occupy many of the blockchain roles and leadership positions. Join this panel to hear three women in blockchain share their experience and their POV on the futu...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Docker and Kubernetes are key elements of modern cloud native deployment automations. After building your microservices, common practice is to create docker images and create YAML files to automate the deployment with Docker and Kubernetes. Writing these YAMLs, Dockerfile descriptors are really painful and error prone.Ballerina is a new cloud-native programing language which understands the architecture around it - the compiler is environment aware of microservices directly deployable into infra...