One example is software agents, which will be semi-autonomous virtual entities that handle simple chores for a person. A software agent might be able to locate the slides for a presentation, or talk to another person's software agent to coordinate an activity.
"They'll be able to recruit other agents as needed to come up with the desired outcome. This is something that will happen," Rusinkiewicz says. "It may be your agent talking to my agent for this interview 25 years from now."~~
21. A fundamentally different Internet architecture may evolve.
Researchers at PARC are working on a new underlying architecture for the Internet called content-centric networking that they hope will be adopted in the next decade or two.
The Internet was designed 40 years ago to make connections between two end points, and over the years it has been overlaid with systems for caching content closer to end users. PARC envisions a new Internet architecture that is designed from the ground up to distribute content, software and services to end users.
"Content centric networking doesn't have the concept of end points," explains Van Jacobson, a PARC Research Fellow. "If you're asking for something, it's like standing up in a room and asking for the time. Anybody that has that information can reply with it. It turns out that you can make a communication model that's as efficient as IP by removing the source-and-destination model."
Last September, PARC and a team of 10 universities received a three-year, $8 million research grant from the National Science Foundation's Future Internet Architecture program. Jacobson estimates that it will take another 10 years after the NSF grant is complete for the content centric networking scheme to be widely deployed.
Jacobson says the content centric networking approach will create less long-distance traffic on the Internet and will be more energy efficient because all content is served up closer to the user. It also may improve the information security landscape.
"Right now, our security model is that we secure containers of information and we secure the process of communications," Jacobson says. "If you go to a model where you're asking for information, and information has a name but not a location...you can secure the information. All of our packets are cryptographically signed by the producer of that entity."
22. Information security will continue to be a problem.
We'll have more powerful encryption systems 25 years from now, but it's unlikely that we will have eradicated the information security problem entirely.
BY THE NUMBERS: Six worst Internet routing attacks
"There will be a constant battle between people who want to protect information and people who want to destroy information," Newell says. "I don't see that fight going away. There are always going to be people who want to steal from you and people who want to monitor you, and they will have the same compute power available."
- Seattle Children's Accelerates Citrix Login Times by 500% with Cross-Tier Insight Seattle Children's is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children's...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
Best Practices in Enterprise Data Governance
This paper explores the challenges organizations have today in implementing a data
governance program via an actual business case. It highlights SAS technology that
- 10 Mistakes to Avoid When Launching Your DG Program From failing to define data governance, to premature launch, or expecting too much from a sponsor, this white paper explains ten common mistakes...
- The Key to Happiness: Throw out Your Data Warehouse In this webinar, Kerry Reitnauer, Director, Solution Architect at FairPoint Communications will discuss the challenges the data warehouse brought, how they migrated to...
- Building Tomorrow's Data Center with Converged Technologies A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. All Data Center White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!