The tech world has long embraced high-risk, high-reward ideas, and you often hear talk of how a certain technology will revolutionize the world. Blockchain could usher in major changes, including combating election fraud and rebuilding the world's financial system. The future of blockchain seems bright, but I don't hear people discussing its more practical applications in IT. How will blockchain make IT departments more efficient and secure? To explore the practical applications of blockchain, we first need to understand why it is so revolutionary. The idea of distributed data is not new, and technologies such as BitTorrent have been around for years. Blockchain expands the concept of distributed data to include digital transactions and ledgers.
Typically, transactions are owned by a single party and can only be shared with trusted third parties, which is how traditional systems such as banks work. For example, if you have a deposit at Bank A and want to use it to pay Company B, Bank A will tell Company B that you have the funds to pay its bill and transfer the funds to Company B's bank. What makes blockchain different is that it distributes transaction records to internet devices running blockchain software. Trust is created by verifying blocks of data linked to previous blocks via multiple devices. If any previous block is changed and less than 51% of the chain verifies it, the change will not go through. It protects data and processes through trust generated using mathematics and cryptographic keys. Of course, this is just a general introduction and leaves out many details. Now that we have a new way to verify and track digital transactions, how can we use it to advance IT? Problems that are suitable for blockchain should have the following characteristics:
Many of the challenges IT faces today share these characteristics. Let’s look at three of them: Device Management Currently, devices are managed through enterprise systems that verify ownership through software systems on the operating system (such as AirWatch) or hardware signatures built into the firmware at production time (such as Apple DEP). If a device is lost or stolen, a bad actor only needs to bypass the single point of authentication to take control of the device. Blockchain technology can verify ownership by using the power of a distributed network. If a device is stolen, an unauthorized party will be rejected by the distributed network when trying to log in. Only 51% of the network will authenticate the operation before the device can be used. The key to distributed device management is to connect to a specific network identity. Curious about how we verify digital identities? Let's take a look at this question. Identity Management Current identity management systems store personal information and credentials in one place and share them with trusted third parties, much like device management. I can use my Gmail account to log into multiple other systems that I authorize, but my permissions are still stored on Google's servers. We can use blockchain to store permissions on a distributed network and only allow third-party systems to access them through block transactions. If I quit my job at Company X and go to work for Company Y, I will ask the network to stop sharing my name, address, and SSN with Company X and start sharing this information with Company Y. I can also stop Company Y from seeing my medical history. I can fully control my ownership. This ownership does not belong to a single provider and will not be shared with others without my explicit permission. This way, we essentially eliminate the need for IT to manage user credentials. Employees will have full control over which specific systems can access what personal data. The need for Active Directory, SSO, multi-factor authentication, and specific application security can be completely eliminated. license One of the most cumbersome and least rewarding challenges IT faces is managing licenses. License keys are the current standard way to track purchases, but are susceptible to loss or theft. If a "license" is simply access verification via a distributed network, then there is no need for an actual license key or file. The vendor's blockchain will determine whether a user can access the software. The days of license audits, software assurance, and license fraud are gone. If a person has verified access to software via the blockchain, then they can use the software. If that transaction is complete and their access is revoked, then they lose access. Simple as that. There is still a lot of work to do to make these systems viable. A key step is to build blockchain technology directly into all operating systems. Assuming a two-year adoption cycle, we will probably eliminate the need to rely on IT to manage end users and devices in 5-10 years. |
<<: Protecting corporate intranet data security in just seven steps
>>: How will HTTP and DNS protocols evolve in the 5G era?
What are the improvements of 5G network compared ...
What is a bridge A bridge is like a smart repeate...
When we were still accustomed to browsing the web...
HostDare has updated its VPS discount information...
[51CTO.com original article] The interview with L...
VIRPUS has released a December discount, offering...
ITLDC is currently offering an automatic 40% disc...
Preface Recently, some customers started the tran...
Recently, my country promulgated the newly revise...
1. Introduction The wave of "mass entreprene...
The latest global 5G network development report f...
In March 2019, the "Report on the Implementa...
LOCVPS has launched a promotional activity for th...
[[391593]] The pandemic has forced government age...
On November 10, IDC recently released the "T...