{"id":43,"date":"2019-02-22T02:37:00","date_gmt":"2019-02-22T02:37:00","guid":{"rendered":"https:\/\/isecurityonline.com\/?p=43"},"modified":"2019-02-22T02:37:00","modified_gmt":"2019-02-22T02:37:00","slug":"why-trump-is-so-clumsy-about-fighting-free-trade","status":"publish","type":"post","link":"https:\/\/isecurityonline.com\/?p=43","title":{"rendered":"Blockchain Technology Effects on Logistics Sector?"},"content":{"rendered":"\n<p> Blockchain technology is being hailed, by many, as a digital panacea that has already made a huge impact across sectors such as finance. The broad number of ways in which blockchain can be utilised.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p> Changing or adding information to the \u201cchain\u201d requires the authentication of everyone who is in the network and this means that blockchain is extremely secure&nbsp; <\/p><\/blockquote>\n\n\n\n<p>However, is still being explored and the logistics sector is one area that is looking to exploit its power. Here we examine the fundamental principals behind blockchain and ask how is blockchain technology <g class=\"gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling multiReplace\" id=\"5\" data-gr-id=\"5\">revolutionising<\/g> the logistics sector?  <\/p>\n\n\n\n<p> <g class=\"gr_ gr_5 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins replaceWithoutSep\" id=\"5\" data-gr-id=\"5\">Blockchain<\/g> is basically a digital ledger that is shared by a network of individuals around the world and that came about from work carried out in mathematical discipline of cryptology. That is to say, the information stored in blockchain is encrypted. <\/p>\n\n\n\n<p>\n\n (Source: blog.businesscasestudies.co.uk)\n\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Changing or adding information to the \u201cchain\u201d requires the authentication of everyone who is in the network.<\/p>\n","protected":false},"author":1,"featured_media":881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,18],"tags":[19,21,22],"class_list":["post-43","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-success-story","category-tips","tag-business","tag-it-security","tag-it-services"],"views":363,"_links":{"self":[{"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/posts\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=43"}],"version-history":[{"count":0,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/posts\/43\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=\/wp\/v2\/media\/881"}],"wp:attachment":[{"href":"https:\/\/isecurityonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isecurityonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}