Blockchain In Plain English

We hear a lot about Blockchain these days, but how many people know what it's really about? In an attempt to make this definition as simple as possible, blockchain automates trust.

It’s a software architecture that allows non-trusting parties to record transactions without requiring a trusted governing authority. In other words, it does away with middlemen. That directly affects banking, insurance, and distribution, as well as any industry that previously relied on a trusted third party.

There are many benefits of blockchain technology. The primary one is its ability to disintermediate. It allows non-trusting parties to record transactions without the need for a trusted governing authority.

This makes many administrative and compliance-based job functions unnecessary, streamlining operations and increasing efficiency. Blockchain saves money.

By making administrative and compliance-based job functions unnecessary, it eliminates salaries and reduces expenses.

Currently, the three leading use cases for blockchain protocol are:

1) supply chain management,

2) digital identity, and

3) digital payments.

The first two are only beginning to deploy in real-world applications, but the third has been used ever since Bitcoin launched in 2009.

Many more will emerge as creative businesses attempt to exploit this new technology for competitive advantage.

1. Supply chain applications allow all the stakeholders to a transaction to approve (or deny) orders in the form of smart contracts.

These contracts stipulate all the if-then permutations of a transaction, requiring nobody to manually execute the contract. It all executes itself. That allows transaction participants to eliminate order entry, order tracking, project management, audit, and compliance functions from their payroll. The blockchain contains all the details automatically and can be easily audited at any time.

Supply chain management is the most promising early use case for blockchain protocol. And since each participant to a transaction would maintain a “node” on the network, all participants will be swept into the blockchain paradigm as soon as the first major player deploys.

If Microsoft, for example, deployed blockchain, they would sweep in the entire Fortune 500 cohort in a single step.

2.  Digital identity is a second use case that is showing promise.

Accenture and Microsoft recently collaborated on the ID2020 project, providing proof of identity through a blockchain-based biometric database for undocumented refugees. This utility, or something similar to it, could be used to consolidate medical records or open financial accounts.

Sooner or later, a large-scale blockchain-based identity ledger will gain broad market adoption, and it will thereafter become the standard for identity verification.

3. Digital payments are a third use case for blockchain-based cryptocurrencies.

Digital payments are a third use case for blockchain-based cryptocurrencies. Of course, Bitcoin has been facilitating digital payments ever since it was launched in 2009, but there are many other applications that are only beginning to be developed.

Some hotels, for example, are introducing specific tokens for use on their properties, allowing them to avoid credit card charges while tracking all of the purchasing activity of their guests.

Other commercial ecosystems like movie theaters, retail chains, service providers (like Uber, for example), and theme parks may introduce their own tokens in the future.

It’s also feasible that such tokens may eventually partner with each other or merge entirely to expand their utility within customers’ lives.

Over time, one token or another may become so popular that it becomes accepted tender in other environments as well.

The ultimate measure of long-term success for cryptocurrencies is broad market adoption for regular commercial purchases by regular citizens. So far, very few people are using Bitcoin to buy a cup of coffee or a pair of boots, but that will likely change down the road.

It’s impossible to guess which cryptocurrency will hit that inflection point first, but one will undoubtedly get there soon.

CTO Vision

You Might Also Read: 

Cryptocurrency May Soon Underpin Cloud Storage:

What Does Blockchain Mean To The EU?:

Blockchain: What Business Executives Need To Know:

 

« Cybersecurity Jumps Up The Corporate Agenda
An Election Interference Alert System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.