Attend IT Limited Blog

Making Sense of Bitcoin

Making Sense of Bitcoin

Bitcoin entered the pantheon of interesting technologies just over 12 years ago, and while you’ve probably heard a fair amount about them, you may not really understand what Bitcoin—and other cryptocurrencies—are. Well, this month we’re going to try to give you a basic rundown of what a Bitcoin is.

Bitcoin is Digital Money

Whoa, whoa, 

Yes! Like many other types of currency such as the yuan, the dollar, the euro, and the ruble, Bitcoin is real money. It is what is called a cryptocurrency and it is (very) slowly becoming a universally accepted currency. Its actual value comes from its scarcity, which we’ll touch on in a bit.

Bitcoin first entered the public consciousness when the value of one skyrocketed from a relatively measly few hundred dollars to about $20,000 in late 2017. Since then, Bitcoin has garnered its own following and inspired many to seek it out for themselves.

Where Bitcoin Comes From

Here’s the thing that a lot of people overlook about money: it’s little more than a symbol to represent value, essentially an IOU from the government backing it—rather than a voucher stating how much of that government’s treasury is due to the person possessing it.

This kind of currency is known as fiat money, and is known for its economic stability.

Bitcoin and other cryptocurrencies are different. Instead of a bank or a nation backing the currency, cryptocurrencies are self-managed with their own transaction histories recorded in perpetuity.

Bitcoin is generated through “mining”—a computer processing complicated equations to generate a packet of data. The trend has actually generated shortages in high-end computer hardware and boosted demand for data centers worldwide. However, this boom has led to a much slower generation rate of new Bitcoin… the more miners seeking it out, the more Bitcoin mined successfully, and the more processing it will take to generate more.

As Bitcoin can’t really be mined on consumer-grade or even business hardware for any real return, the investment to make it work is formidable. Not only is the hardware needed expensive in and of itself, maintaining that hardware takes a lot of time and draws a lot of power. Estimates have posited that the carbon footprint used to maintain Bitcoin is in line with the carbon footprint of the entirety of New Zealand, which suggests that environmental regulations may be applied to mining at some point in the future.

What’s the Point?

The major selling point behind Bitcoin is that it is anonymized. While there is a public record of all transactions, identities remain hidden. By establishing a Bitcoin wallet on your computer or in the cloud, the wallet’s ID is then associated to your transactions.

This enables Bitcoin to be used for effectively everything from illicit goods and materials to home goods from Overstock—effectively, the merchant just has to accept them. More than anything else, however, Bitcoin has become a bit of a speculative stock market, miners seeking to make a profit by buying up Bitcoin when the value is low and selling it off when prices are high.

Is Bitcoin Risky?

Let’s make this clear: any investment, regardless of what it is in, carries with it some level of risk. Bitcoin adds a few more—your money could be deleted due to a hardware failure or a virus, and a wallet could be stolen from the cloud without any of the insurance that a bank account offers.

Bitcoin is not the only cryptocurrency by a long shot. One that has also seen a recent surge in popularity is the meme-inspired and Elon Musk-promoted Dogecoin… almost strictly because Musk tweeted about it.

Look, nobody said that cryptocurrency makes sense.

Have you considered cryptocurrency as a potential investment? Tell us why or why not in the comments!

Putting a Focus on Productivity
Solid Data Recovery Strategies Can Get You Through...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Network Security Tip of the Week Best Practices Productivity Cloud Data Backup Managed IT Services Data Recovery Disaster Recovery communications Privacy Hosted Solutions VoIP Backup Hackers Malware Data Business Small Business Business Continuity Outsourced IT Innovation IT Services IT Support Email Software Cloud Computing Cybersecurity Phishing Productivity Mobile Devices Internet Efficiency Computer IT Support BDR Business Management Saving Money Hardware Upgrade Automation Information Technology Internet of Things Smartphone Collaboration Managed IT Managed IT services Server Covid-19 Mobile Device Management Microsoft Ransomware User Tips Mobility Meetings BYOD Risk Management Network Compliance Save Money Mobile Device Managed Service Provider Gadgets Windows 7 Quick Tips Communication Workplace Tips Artificial Intelligence Wi-Fi Avoiding Downtime Budget Passwords Managed Service MSP Computers History Cost Management Firewall Hosted Solution Smartphones Password Human Resources Remote Computing Virtual Private Network Spam Data Management Wireless Automobile IT Service Time Management Telephone Systems Router Recovery Hybrid Cloud Marketing Android End of Support Employer-Employee Relationship Redundancy Document Management Hard Drives Tech Term Business Technology Employee-Employer Relationship Remote Work Users VPN Networking Content Filtering Paperless Office Manufacturing Value Printing Microsoft Office Solid State Drive Google Training Data Breach Wireless Internet Saving Time Data Security Instant Messaging Devices Audit Windows 10 Personal Information Telephony Software as a Service Remote Workers Conferencing Monitoring Outsource IT Help Desk Vulnerability Regulation Government IoT Remote Online Storage SaaS Managed IT Service Browser Colocation Chromebook E-Commerce Antivirus OneNote Money Data Protection Black Market Apple Nanotechnology Social Engineering Alexa for Business Bitcoin Copiers Management Printers Customer Relationship Management Hacker Smart Tech Vendor Workstations Education Cleaning intranet Students Utility Computing Payment Cards Holiday Flexibility Evernote Voiceover Internet Protocol User Error Printer Machine Learning Work/Life Balance iPhone Finance Windows 10 Cybercrime Word Financial Technology Hacking The Internet of Things Remote Working Voice over Internet Protocol Phone System Connectivity Application Operating System Unified Communications Entertainment Samsung Facebook Mobile Infrastructure Business Telephone Disaster Commerce Data Loss PCI DSS Office 365 Transportation WPA3 Advertising Azure Save Time Smart Technology Wasting Money e-waste Fiber Optics Upgrades Streaming Media Mobile Office Two-factor Authentication Proactive IT Private Cloud Blockchain Remote Monitoring Laptop Backup and Disaster Recovery HIPAA Social Media Business Intelligence Update Professional Services Workers Videoconferencing Smartwatch Computer Repair Encryption Electronic Medical Records Mobile Computing Applications Regulations Compliance Cybersecurty Going Green Legal File Storage SMB Active Directory Dark Web Proactive Computing Amazon Leadership Windows Server 2008 Virtualization Content Filter Video Conferencing Development Lifestyle Payroll Cost Break/Fix Window 10 App Company Culture Administration Travel Bandwidth AI Streaming Project Management Gamification Managed Services Downtime Wireless Technology Big Data Spyware Telephone Windows Server Office Analysis Virtual Assistant Employees Shadow IT Projects Keyboard Legislation Bring Your Own Device 5G Politics Charger How To Tablets Microsoft Word Investment Communitications Managing Stress Emergency Webinar WIndows Server 2008 File Sharing Memory Admin Policy Threats Vendor Management Robot WannaCry USB Books Touchscreen Apps Tech Support Computer Forensics Hyperlink Solutions Security Cameras Processor Worker Commute Unsupported Software Scam Relocation Gifts Data Theft App store OneDrive NFL Maintenance Internet Service Provider Micrsosoft iOS Sync Law Enforcement Comparison Language Innovations Medical IT Experience WiFi Data Storage Current Events ROI Hosted Desktop IT solutions Patch Management Storage Procedure Scams Licensing Virtual Reality IT Management Miscellaneous Text Messaging Fraud Gmail Wasting Time Benchmarks Root Cause Analysis Video Games Mobile Security Information Sabotage eWaste Digital Signage Reputation Specifications eCommerce Unified Threat Management Screen Mirroring Windows Server 2008 R2 Smart Devices Worker Windows 10s Outlook Sports IT budget Keyboard Shortcuts Organization Employee Managed Services Provider Settings Scalability PC Office Tips Edge PowerPoint Accessory Augmented Reality Health Credit Cards Identity Windows Ink Device Security Display Workstation Computer Fan Sales Virus Reviews Music Cast Testing Net Neutrality Troubleshooting Battery Hard Disk Drive Shortcut HaaS Cortana Facebook Privacy Business Strategy Internet Exlporer Google Docs Ciminal Peripheral Computer Accessories Windows FAQ Data Privacy Google Drive Google Maps Google Assistant Co-Managed Services Telework Social Retail YouTube Analytics Consultant Camera CRM Point of Sale Excel Identities Financial Chrome Humor Updates Hard Drive Server Maintenance Inventory Safety Emails IT Solutions Alert Microsoft Excel Access Control Myths Television CrashOverride Search Adobe Wireless Charging HBO PDF Best Practice Twitter Audits Identity Theft Computer Care Websites Biometrics Holidays