ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bitcoin Use Reaches Record Levels, Despite Its 2014 Fiasco

b2ap3_thumbnail_new_bitcoin_400.jpgBitcoin, a cryptocurrency used for anonymity on the web, was once the hottest thing on the cyber market. Everyone thought it was a great innovation that allowed for improved online privacy for transactions. Thanks to some rather complicated matters, though, Bitcoin took a nosedive and has needed some time to get back on its feet. Now, it seems people are finally using Bitcoin again, and in a never before seen quantity.

The fall of Bitcoin, according to WIRED magazine, is directly linked to the falling through of a major Bitcoin exchange, Mt. Gox, as well as the sketchy activity associated with Silk Road, the online drug trafficking market that enjoyed the anonymity of Bitcoin. Based in Tokyo, Japan, Mt. Gox was responsible for handling nearly 70 percent of all Bitcoin transactions. However, following an immense hacking attack, which left over $450 million worth of Bitcoin missing or stolen, Mt. Gox was forced to declare bankruptcy in 2014. Authorities claim that the screw-up was caused by a relative lack of management, experience, and apathy.

As you can imagine, losing 850,000 Bitcoins is pretty shocking, especially since nobody knew where they went. The estimated worth of these Bitcoins at the time of the theft was greater than $450 million, making it a massive, crippling heist. By all logic, Bitcoin should be a thing of the past, used only by hackers and those with questionable motives; but here’s the kicker. Bitcoin is being used more than ever before. In fact, its usage per day peaked in late December 2015, perhaps in response to the holiday season.

ib graph 1

Bitcoin’s main draw for investors is the technology behind it, known as the blockchain, which many believe can be used for stock exchanges and other purposes. As defined by WIRED:

The blockchain is essentially a database running across a vast array of independent machines. With Bitcoin, it oversees the exchange of money. But it can oversee the exchange of anything that holds value, including stocks, bonds, and futures as well as houses and car titles.

There are plenty of Bitcoin startups and veteran organizations alike who want to use the blockchain technology to make Bitcoin more usable, including Coinbase, a Bitcoin exchange company in San Francisco, California. Their most notable contribution is the development of a Bitcoin debit card, which allows users to spend Bitcoin anywhere that accepts a VISA card. The main draw of doing this is that organizations can avoid the processing fees associated with credit card transactions, so the idea is that businesses will start to accept Bitcoin as payment without the cards in the future. Wouldn’t that be something?

With all of these new developments in Bitcoin technology, perhaps we’ll see a world where Bitcoin is used by more than just people who have something to hide. Maybe we’ll even see an increase in use of other kinds of cryptocurrency, including everyone’s favorite, Dogecoin-- the adorable cryptocurrency based on the derpy charm of a goofy Shiba Inu dog.

ib doge 1

What are your thoughts on the return of Bitcoin? Are you an avid user of the cryptocurrency? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Upgrade Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Windows 10 Apps IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows Bandwidth Encryption Blockchain Remote Business Technology App Virtualization Mobile Device Management WiFi Spam Information Server Information Technology History Gmail Employee/Employer Relationship Budget Office Two-factor Authentication Office 365 Apple Cybercrime BDR Health Wi-Fi Big Data Analytics Conferencing Access Control Data Security Remote Monitoring Document Management Compliance Employer-Employee Relationship Save Money IT Management Help Desk Training Hacking Remote Computing Voice over Internet Protocol Cost Management Hacker Vendor Patch Management Customer Service Vulnerabilities Unified Threat Management Legal Firewall Search... Project Management Best Practice Augmented Reality Data storage Word Retail IBM Website Alert Data loss Hiring/Firing Outlook BYOD Password Computing Vendor Management Mobile Office Hard Drive Applications Money Managed Services Sports Antivirus Law Enforcement Social How To SaaS Marketing DDoS End of Support Printer Monitoring Maintenance Running Cable Healthcare iPhone Education Storage Cortana Content Filtering Websites Travel Virtual Reality Meetings Mobility Social Engineering Cryptocurrency Router Black Market Google Maps Cleaning Scam User The Internet of Things Windows 11 YouTube Robot VPN Laptop Chrome Remote Workers Update Data Breach Windows 7 Free Resource Twitter Mobile Computing Paperless Office Microchip IT Consultant Solutions Flexibility Physical Security Multi-factor Authentication Customer Relationship Management Integration Images 101 Co-Managed IT Identity Theft Display Entertainment Hack Disaster Notifications Saving Time Unified Communications Start Menu Computer Care Downloads Computers Bitcoin Employees Google Docs Lithium-ion battery Avoiding Downtime Vulnerability Bluetooth Telephone Distributed Denial of Service Software as a Service Office Tips Holidays Private Cloud Processors Memory Data Protection Cooperation HIPAA Excel Video Conferencing Politics Virtual Machines Computer Repair Machine Learning Settings Professional Services Virtual Assistant Solid State Drive Wireless Technology Tech Terms eWaste Managed IT Digital Downtime Chromebook Drones Managed Services Provider Processor PowerPoint Safety Virtual Private Network Taxes Administration Automobile Virtual Desktop Presentation Current Events Specifications How To Experience Legislation Phone System News FinTech File Sharing User Tip Evernote Point of Sale Network Management Redundancy CES IT Assessment Cache Supply Chain Management Value In Internet of Things Staffing Emails Hacks IP Address Fake News Unified Threat Management Organization Network Congestion Workers Cyber security Proxy Server Shortcuts Service Level Agreement Reliable Computing Computing Infrastructure Writing Smart Devices Remote Working CCTV Management Device security Printing Computer Accessories Wireless Headphones Microsoft Excel Touchscreen AI Trend Micro Be Proactive Computer Malfunction Tech Transportation Going Green Scalability Business Cards Emergency Digital Security Cameras Electronic Health Records Text Messaging Competition Vendor Mangement Proactive IT Wasting Time Error Administrator Recovery Bring Your Own Device Samsung eCommerce Bookmark Modem Workplace Strategies Webcam Term LiFi Download Piracy Videos Entrepreneur Uninterrupted Power Supply Surveillance Application Business Mangement Music Managing Costs Documents HTML Nanotechnology Business Intelligence Tablets Browsers SSID Development Google Play Employer/Employee Relationships Upload Troubleshooting Software License Media Supercomputer Virtual Machine Social Network Botnet Securty Google Calendar Smart Technology Screen Reader Rental Service Domains Virus Reviews Micrsooft Optimization Data Analysis Motion Sickness Security Cameras Teamwork Trends Mobile Technology 2FA Flash Comparison Telephone Systems Google Drive Data Storage Business Growth Hypervisor Customer Resource management Devices Fileless Malware Medical IT Tip of the week Shopping Corporate Profile SQL Server Gamification Business Owner Company Culture Knowledge Paperless Regulations Television Banking Public Speaking Telephony PCI DSS Google Wallet Employer Employee Relationship Licensing Telephone System Directions Supply Chain Streaming Media Backup and Disaster Recovery Messenger Gig Economy Deep Learning Cabling Humor Tablet Internet Service Provider G Suite Azure Content Desktop Business Communications Keyboard Accountants Mouse Business Metrics Hard Drives VoIP Regulations Compliance Hosted Solution Tracking Managed IT Service Electronic Medical Records Workplace Database Books intranet Memes Shortcut Net Neutrality Society Web Server Inbound Marketing Wireless Human Resources Language Equifax SharePoint Heating/Cooling Financial Data Environment Digital Payment Health IT Scams Windows XP Tactics Reading Hard Drive Disposal Risk Management Monitors Social Networking Worker IT Visible Light Communication Access Windows 8 Username Google Apps Startup Freedom of Information Time Management Telework Public Cloud Electronic Payment Navigation Microsoft 365 Cables Addiction Relocation email scam Smartwatch Displays Communitications Advertising Spyware Procurement Tech Support Mobile Security Audit Work/Life Balance

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?