Blog Feed Post

What Is Blockchain?

Blockchain, the underlying technology that powers bitcoin, is one of the buzzwords of the past year. Practically everyone is talking about blockchain, and for good reason. Distributed ledgers, the term of art for blockchain’s underlying technology, offer an exciting new way to transact business without a central authority. Here’s a nontechnical, simplified description of the component parts.

Blockchain Defined

A blockchain, or distributed ledger, is a continuously growing list (digital file) of encrypted transactions called “blocks” that are distributed (copied) to a peer-to-peer (P2P) network of computers.


As described above, a blockchain is an immutable, sequential chain of records known as blocks. A block may contain any type of data, such as unique digital identifiers of physical products. Blocks are “chained” together using hashes. A hash is a function that takes an input value and from that input creates an output value deterministic of the input value.

In addition to user data, each block will contain an index, a timestamp, a list of transactions, a proof, and the hash of the previous block.

The Hash

The hash plays a critical role. Because each new block will contain a hash of the previous block, blockchains are immutable. If a hacker were to corrupt an earlier block in the blockchain, all subsequent blocks would contain incorrect hashes.

Encrypted Transactions

Encrypted transactions (using conventional public/private key cryptography) are also key to blockchain’s value. The user’s “public key” is stored in a block and becomes an “address” on the blockchain. Files such as cryptocurrencies or other digital assets are recorded as belonging to a specific block. A corresponding “private key” is required to access the associated digital assets. Keeping your private key private is so important that to protect their digital assets from hackers, many people do not keep digital copies of their private keys. They write the number on a piece of paper and keep the paper in a secure location (like a wall safe.)

Proof of Work (PoW)

Once a blockchain is instantiated, a Proof of Work algorithm (PoW) is used to create or “mine” new blocks.

The current bitcoin mining technique provides a good example of PoW usage. This technique is described in Wikipedia as follows: “A bitcoin miner runs a computer program that collects unconfirmed transactions from coin dealers in the network. With other data these can form a block and earn a payment to the miner, but a block is accepted by the network only when the miner discovers by trial and error a ‘nonce’ number that when included in the block yields a hash with a sufficient number of leading zero bits to meet the network’s difficulty target. Blocks accepted from miners form the bitcoin blockchain that is a growing ledger of every bitcoin transaction since the coin’s first creation.”

The API (Application Programming Interface)

The next step in the development of a distributed ledger is to set up an API (application programming interface) so that organizations that wish to transact may do so by using the internet. Transaction endpoints allow permission-based access to the data on the blockchain.

The API will also feature a “mining endpoint,” which will do three things: (1) calculate the PoW, (2) add the transaction and grant the miner a reward (in bitcoin mining, the rewards are bitcoins), and (3) create a new block and add it to the blockchain.

Peer-to-Peer (Mesh) Networks

Lastly, distributed ledgers derive their power from being distributed and decentralized. To accomplish this, a distributed ledger needs a method of accepting new nodes and a way to implement a consensus algorithm to resolve conflicts and to ensure the veracity of the blockchain.

This is done over a P2P or mesh network, a decentralized computer network where each computer (node) acts as both a client (a computer that accesses information on a server) and a server (a computer that serves information to clients). At scale, P2P networks are self-healing and very stable because the information is replicated in thousands, and in some cases millions, of places.

Public or Private

There are two general types of blockchain networks: anonymous networks, where each user has a copy of the entire blockchain and helps process and confirm transactions; and permission-based (non-anonymous) networks, where permission is required to possess a copy of the blockchain and to help process and confirm transactions.

Other Than Cryptocurrencies, What Can You Do with Blockchain?

Blockchain offers a way to verify transactions without the need for a central authority. This means you can create smart contracts using distributed ledgers. For example, a landlord might put an IoT door lock on your rental apartment. The door lock might check the blockchain to see if your rent is paid. If it isn’t, the door lock (that is, the smart contract) would not let you into the apartment. In a more complex case, a corporation could issue its own bonds and buyers could monitor payments via a distributed ledger. An even more complex use case would be the creation of self-enforcing trade agreements. The list of uses for blockchain is practically endless. From title searches to delivery verification, distributed ledgers offer a completely new, secure way to do business.

Your key question is: “For this project, is a blockchain a better choice than a well-crafted, secure database?” After that, you’re on your way!

Author’s Note: This article contains some material from a previous article titled “Nuber – The End of Uber and Central Authority,” which describes how blockchain technology might be used to create an Uber-like ridesharing service without the need for a company like Uber to run it. This is not a sponsored post. I am the author of this article and it expresses my own opinions. I am not, nor is my company, receiving compensation for it.

The post What Is Blockchain? originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...