{"id":176676,"date":"2017-02-11T07:54:50","date_gmt":"2017-02-11T12:54:50","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/whats-the-difference-between-blockchains-cryptocurrency-audit-electronic-design\/"},"modified":"2017-02-11T07:54:50","modified_gmt":"2017-02-11T12:54:50","slug":"whats-the-difference-between-blockchains-cryptocurrency-audit-electronic-design","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/whats-the-difference-between-blockchains-cryptocurrency-audit-electronic-design\/","title":{"rendered":"What&#8217;s the Difference Between Blockchains, Cryptocurrency, Audit &#8230; &#8211; Electronic Design"},"content":{"rendered":"<p><p>    Blockchains are nothing more signed, peer-to-peer, distributed    ledger databases. Okay, were all done here.  <\/p>\n<p>    No?  <\/p>\n<p>    Alright, blockchains are a bit more complicated than thatand    more useful than they might sound. Most will know blockchains    from BitCoin, one of the many cryptocurrencies based on    them. But cryptocurrencies are only one use for blockchains.    Before getting into applications, lets take a look at what a    blockchain system looks like and how it operates.  <\/p>\n<p>    To start, you need to know about public key encryption and digital    signatures, because the blocks in a blockchain are    digitally signed and the blockchain nodes are authenticated to    each other (Fig. 1). This allows them to maintain    their copy of the blockchain and determine whether information    from other nodes is accurate. Those providing nodes to the    blockchain must also have their own encryption keys so they can    sign their blocks.  <\/p>\n<p>    A blockchain is actually a logical entity maintained by a    blockchain node. It is designed to be a mostly read-only    database that grows over time as blocks are added    (Fig. 2). Block payloads are accepted by a node    and distributed to its peers. There is an acceptance process    and verification of digital signatures, but eventually a block    will be validated by enough nodes for the block to be    permanently added to the blockchain.  <\/p>\n<p>    At    this point, the added block will be replicated in a majority of    nodes, and the rest will eventually catch up. This means that    all nodes will have a moving high water mark that the    collection of nodes agrees with, but the databases will    probably not be identical across all the nodes at any point in    time.  <\/p>\n<p>    The idea is that the payload of a block can be accessed by an    external entity and used to generate a subsequent block that    will get incorporated into the blockchain. A typical example is    where a block contains a logical value that is split in half    and assigned to two new blocks. The signatures for these new    blocks can be used to allow one of the new blocks to contain    this new value. Incorporating the new blocks into the    blockchain will mark the original block as used and the two new    blocks as active.  <\/p>\n<p>    The system is robust because the blockchain database is    replicated. All nodes can accept new blocks and all nodes do    not have to be active or accessible all the time although a    quorum is needed to activate new blocks.  <\/p>\n<p>    The challenge for blockchain systems is to maintain performance    and scalability as the system grows. A lot depends upon the    frequency of updates and the number of systems involved overall    in addition to the network. Many blockchain systems operate on    the internet, but that isnt a requirement. They can be used in    closed networks as well.  <\/p>\n<p>    So, back to cryptocurrencies.  <\/p>\n<p>    A cryptocurrency is a digital asset that can be an exchange    medium. These days, cyptocurrencies tend to be implemented    using a blockchain. This allows transactions using the    cryptocurrency to occur in a decentralized, distributed    fashion. Cryptocurrencies are relatively new (the    aforementioned Bitcoin started in 2009).  <\/p>\n<p>    The payload of a block indicates the amount of money involved    in a transaction. How these values are created and manipulated    depend upon the system being employed and the players involved    in the system. Most cryptocurrencies use a timestamping scheme    so a trusted third party does not need to be involved in the    system.  <\/p>\n<p>    Most cryptocurrency systems use a proof-of-work scheme to    create a new block or BitCoin. BitCoin uses proof-of-work    schemes are based on SHA-256. It is also used by LiteCoin. It is    also possible to use proof-of-stake schemes as well.  <\/p>\n<p>    BitCoins are created by mining. This uses the hashcash    proof-of-work function that is designed to take a lot of    computational cycles but not much else. Specialized hardware    has been developed to create BitCoins. The amount of time    needed to generate just one BitCoin varies significantly    depending upon the hardware used.  <\/p>\n<\/p>\n<p>    Just about any application that requires a registered ledger is    a candidate for blockchain support. Many embedded applications    simply need a single database, but if there is a need for a    more robust solution, blockchains might make sense.  <\/p>\n<p>    Blockchains have been touted as solutions for all sorts of    applications. For example, there are a number of efforts to use    them in educational environments. In this instance, the various    records, testing, and certifications a person earns are tracked    using blocks. This approach allows for the distribution of this    information. The blocks normally do not contain all the    information, but rather, links to digitally signed packages.  <\/p>\n<p>    Blockchains can also be used for conventional ledger-based    applications. These applications include backend clearing and    settlement. They could be used in real estate transactions, for    tracking music or other multimedia content, or even for    handling contracts.  <\/p>\n<p>    Blockchain use is still in its infancy. Security remains a key    component and it should not be overlooked when considering or    using this technology. Incorrect implementations can cause    significant security problems. Developers also need to consider    the scope of implementation, frequency of updates, and hardware    and storage requirements.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/electronicdesign.com\/embedded\/what-s-difference-between-blockchains-cryptocurrency-audit-trails-and-databases\" title=\"What's the Difference Between Blockchains, Cryptocurrency, Audit ... - Electronic Design\">What's the Difference Between Blockchains, Cryptocurrency, Audit ... - Electronic Design<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Blockchains are nothing more signed, peer-to-peer, distributed ledger databases. Okay, were all done here. No <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/whats-the-difference-between-blockchains-cryptocurrency-audit-electronic-design\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-176676","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176676"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176676"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176676\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}