ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bitcoin Use Reaches Record Levels, Despite Its 2014 Fiasco

b2ap3_thumbnail_new_bitcoin_400.jpgBitcoin, a cryptocurrency used for anonymity on the web, was once the hottest thing on the cyber market. Everyone thought it was a great innovation that allowed for improved online privacy for transactions. Thanks to some rather complicated matters, though, Bitcoin took a nosedive and has needed some time to get back on its feet. Now, it seems people are finally using Bitcoin again, and in a never before seen quantity.

The fall of Bitcoin, according to WIRED magazine, is directly linked to the falling through of a major Bitcoin exchange, Mt. Gox, as well as the sketchy activity associated with Silk Road, the online drug trafficking market that enjoyed the anonymity of Bitcoin. Based in Tokyo, Japan, Mt. Gox was responsible for handling nearly 70 percent of all Bitcoin transactions. However, following an immense hacking attack, which left over $450 million worth of Bitcoin missing or stolen, Mt. Gox was forced to declare bankruptcy in 2014. Authorities claim that the screw-up was caused by a relative lack of management, experience, and apathy.

As you can imagine, losing 850,000 Bitcoins is pretty shocking, especially since nobody knew where they went. The estimated worth of these Bitcoins at the time of the theft was greater than $450 million, making it a massive, crippling heist. By all logic, Bitcoin should be a thing of the past, used only by hackers and those with questionable motives; but here’s the kicker. Bitcoin is being used more than ever before. In fact, its usage per day peaked in late December 2015, perhaps in response to the holiday season.

ib graph 1

Bitcoin’s main draw for investors is the technology behind it, known as the blockchain, which many believe can be used for stock exchanges and other purposes. As defined by WIRED:

The blockchain is essentially a database running across a vast array of independent machines. With Bitcoin, it oversees the exchange of money. But it can oversee the exchange of anything that holds value, including stocks, bonds, and futures as well as houses and car titles.

There are plenty of Bitcoin startups and veteran organizations alike who want to use the blockchain technology to make Bitcoin more usable, including Coinbase, a Bitcoin exchange company in San Francisco, California. Their most notable contribution is the development of a Bitcoin debit card, which allows users to spend Bitcoin anywhere that accepts a VISA card. The main draw of doing this is that organizations can avoid the processing fees associated with credit card transactions, so the idea is that businesses will start to accept Bitcoin as payment without the cards in the future. Wouldn’t that be something?

With all of these new developments in Bitcoin technology, perhaps we’ll see a world where Bitcoin is used by more than just people who have something to hide. Maybe we’ll even see an increase in use of other kinds of cryptocurrency, including everyone’s favorite, Dogecoin-- the adorable cryptocurrency based on the derpy charm of a goofy Shiba Inu dog.

ib doge 1

What are your thoughts on the return of Bitcoin? Are you an avid user of the cryptocurrency? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Microsoft Office Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Disaster Recovery Covid-19 Passwords Holiday Windows 10 Managed Service Apps IT Support Browser Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Gadgets Information Bandwidth Business Technology Encryption Remote WiFi Blockchain App Virtualization Server Mobile Device Management Spam Apple History Information Technology Employee/Employer Relationship Gmail Budget Office Two-factor Authentication Office 365 BDR Health Cybercrime Analytics Wi-Fi Big Data Access Control Conferencing Data Security Cost Management Hacker Remote Monitoring Employer-Employee Relationship Vendor Document Management Compliance IT Management Save Money Remote Computing Training Help Desk Hacking Voice over Internet Protocol Patch Management Search... Money Best Practice Project Management Applications Customer Service Unified Threat Management Firewall Retail Legal Alert Vulnerabilities Augmented Reality Data storage Word Hiring/Firing IBM Outlook Password Website Data loss BYOD Computing Mobile Office Vendor Management Hard Drive Managed Services Windows 11 Maintenance Twitter Data Breach How To Storage Sports Law Enforcement Social SaaS DDoS End of Support Printer Websites Meetings Mobility iPhone Monitoring Education Cortana User Healthcare Content Filtering Google Maps Travel Scam Virtual Reality Social Engineering Router Cryptocurrency Black Market Chrome VPN Cleaning The Internet of Things YouTube Robot Update Remote Workers Mobile Computing Laptop Paperless Office Windows 7 Marketing Antivirus Free Resource Running Cable Physical Security Automobile Co-Managed IT Entertainment Current Events Virtual Desktop Processor Solutions How To Experience Microchip Flexibility Start Menu Computer Care Integration Downloads Images 101 Display Vulnerability Hack Disaster Identity Theft Multi-factor Authentication Notifications Software as a Service HIPAA Data Protection Employees Unified Communications Avoiding Downtime Google Docs Lithium-ion battery Saving Time Bluetooth Holidays Distributed Denial of Service Office Tips Cooperation Computers Private Cloud Bitcoin Processors Memory Video Conferencing Telephone Tech Terms Virtual Machines Computer Repair Politics Managed IT Professional Services Machine Learning Excel PowerPoint Settings Digital Administration Taxes Solid State Drive Wireless Technology Presentation eWaste Specifications IT Consultant Managed Services Provider Virtual Assistant Chromebook Drones Virtual Private Network Downtime Safety Customer Relationship Management Windows 8 Communitications Microsoft 365 Database Cache Smartwatch Unified Threat Management Computer Accessories Workers Procurement Health IT Equifax Relocation Displays FinTech Advertising Tech Support CCTV IT Assessment Tactics Supply Chain Printing Hard Drive Disposal Work/Life Balance CES Touchscreen Supply Chain Management Value Username Startup Emergency Freedom of Information Organization Computer Malfunction Cyber security Smart Devices Navigation Addiction In Internet of Things Workplace email scam Staffing Vendor Mangement Mobile Security Hacks IP Address Network Congestion Samsung Remote Working User Tip Legislation Reliable Computing News Writing Uninterrupted Power Supply AI Webcam Trend Micro Electronic Health Records Evernote Transportation Network Management Scams Troubleshooting Business Mangement Digital Security Cameras Tablets Wasting Time Proxy Server Modem Emails Scalability Fake News eCommerce Competition Proactive IT Supercomputer Surveillance Service Level Agreement Administrator Cables Google Calendar Computing Infrastructure Recovery Text Messaging Videos Device security Bring Your Own Device Virus Managing Costs Management SSID Wireless Headphones LiFi Microsoft Excel Entrepreneur Motion Sickness Application Music Development Tech Employer/Employee Relationships Going Green Point of Sale Comparison Business Cards Documents Business Owner Google Drive Media Business Intelligence Virtual Machine Error Bookmark Shortcuts Knowledge Corporate Profile Reviews Optimization Employer Employee Relationship Term Teamwork Download Botnet Television Piracy Securty Telephony 2FA HTML Rental Service Domains Micrsooft Cabling Data Storage Hypervisor Browsers Medical IT Nanotechnology Be Proactive Flash Tablet Shopping G Suite Paperless Business Growth Tracking Google Play SQL Server Upload Mouse Software License Inbound Marketing Telephone Systems VoIP PCI DSS Licensing Social Network Humor Data Analysis Screen Reader Workplace Strategies Gig Economy Web Server Business Communications Public Speaking Google Wallet Digital Payment Internet Service Provider Security Cameras Azure Trends SharePoint Mobile Technology Banking Devices Streaming Media Electronic Payment Messenger Deep Learning Worker Regulations Compliance Managed IT Service Customer Resource management Memes Fileless Malware Tip of the week Access Keyboard Business Metrics Time Management Human Resources Hard Drives Hosted Solution Public Cloud Net Neutrality Gamification Company Culture Regulations Books Phone System Financial Data intranet Telephone System Society IT Directions Backup and Disaster Recovery Smart Technology Audit Wireless Language Spyware Risk Management Shortcut Google Apps Heating/Cooling File Sharing Environment Content Desktop Accountants Windows XP Reading Redundancy Monitors Telework Social Networking Visible Light Communication Electronic Medical Records

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?