Blockchain In Plain English

We hear a lot about Blockchain these days, but how many people know what it's really about? In an attempt to make this definition as simple as possible, blockchain automates trust.

It’s a software architecture that allows non-trusting parties to record transactions without requiring a trusted governing authority. In other words, it does away with middlemen. That directly affects banking, insurance, and distribution, as well as any industry that previously relied on a trusted third party.

There are many benefits of blockchain technology. The primary one is its ability to disintermediate. It allows non-trusting parties to record transactions without the need for a trusted governing authority.

This makes many administrative and compliance-based job functions unnecessary, streamlining operations and increasing efficiency. Blockchain saves money.

By making administrative and compliance-based job functions unnecessary, it eliminates salaries and reduces expenses.

Currently, the three leading use cases for blockchain protocol are:

1) supply chain management,

2) digital identity, and

3) digital payments.

The first two are only beginning to deploy in real-world applications, but the third has been used ever since Bitcoin launched in 2009.

Many more will emerge as creative businesses attempt to exploit this new technology for competitive advantage.

1. Supply chain applications allow all the stakeholders to a transaction to approve (or deny) orders in the form of smart contracts.

These contracts stipulate all the if-then permutations of a transaction, requiring nobody to manually execute the contract. It all executes itself. That allows transaction participants to eliminate order entry, order tracking, project management, audit, and compliance functions from their payroll. The blockchain contains all the details automatically and can be easily audited at any time.

Supply chain management is the most promising early use case for blockchain protocol. And since each participant to a transaction would maintain a “node” on the network, all participants will be swept into the blockchain paradigm as soon as the first major player deploys.

If Microsoft, for example, deployed blockchain, they would sweep in the entire Fortune 500 cohort in a single step.

2.  Digital identity is a second use case that is showing promise.

Accenture and Microsoft recently collaborated on the ID2020 project, providing proof of identity through a blockchain-based biometric database for undocumented refugees. This utility, or something similar to it, could be used to consolidate medical records or open financial accounts.

Sooner or later, a large-scale blockchain-based identity ledger will gain broad market adoption, and it will thereafter become the standard for identity verification.

3. Digital payments are a third use case for blockchain-based cryptocurrencies.

Digital payments are a third use case for blockchain-based cryptocurrencies. Of course, Bitcoin has been facilitating digital payments ever since it was launched in 2009, but there are many other applications that are only beginning to be developed.

Some hotels, for example, are introducing specific tokens for use on their properties, allowing them to avoid credit card charges while tracking all of the purchasing activity of their guests.

Other commercial ecosystems like movie theaters, retail chains, service providers (like Uber, for example), and theme parks may introduce their own tokens in the future.

It’s also feasible that such tokens may eventually partner with each other or merge entirely to expand their utility within customers’ lives.

Over time, one token or another may become so popular that it becomes accepted tender in other environments as well.

The ultimate measure of long-term success for cryptocurrencies is broad market adoption for regular commercial purchases by regular citizens. So far, very few people are using Bitcoin to buy a cup of coffee or a pair of boots, but that will likely change down the road.

It’s impossible to guess which cryptocurrency will hit that inflection point first, but one will undoubtedly get there soon.

CTO Vision

You Might Also Read: 

Cryptocurrency May Soon Underpin Cloud Storage:

What Does Blockchain Mean To The EU?:

Blockchain: What Business Executives Need To Know:

 

« Cybersecurity Jumps Up The Corporate Agenda
An Election Interference Alert System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.