One example is software agents, which will be semi-autonomous virtual entities that handle simple chores for a person. A software agent might be able to locate the slides for a presentation, or talk to another person's software agent to coordinate an activity.
"They'll be able to recruit other agents as needed to come up with the desired outcome. This is something that will happen," Rusinkiewicz says. "It may be your agent talking to my agent for this interview 25 years from now."~~
21. A fundamentally different Internet architecture may evolve.
Researchers at PARC are working on a new underlying architecture for the Internet called content-centric networking that they hope will be adopted in the next decade or two.
The Internet was designed 40 years ago to make connections between two end points, and over the years it has been overlaid with systems for caching content closer to end users. PARC envisions a new Internet architecture that is designed from the ground up to distribute content, software and services to end users.
"Content centric networking doesn't have the concept of end points," explains Van Jacobson, a PARC Research Fellow. "If you're asking for something, it's like standing up in a room and asking for the time. Anybody that has that information can reply with it. It turns out that you can make a communication model that's as efficient as IP by removing the source-and-destination model."
Last September, PARC and a team of 10 universities received a three-year, $8 million research grant from the National Science Foundation's Future Internet Architecture program. Jacobson estimates that it will take another 10 years after the NSF grant is complete for the content centric networking scheme to be widely deployed.
Jacobson says the content centric networking approach will create less long-distance traffic on the Internet and will be more energy efficient because all content is served up closer to the user. It also may improve the information security landscape.
"Right now, our security model is that we secure containers of information and we secure the process of communications," Jacobson says. "If you go to a model where you're asking for information, and information has a name but not a location...you can secure the information. All of our packets are cryptographically signed by the producer of that entity."
22. Information security will continue to be a problem.
We'll have more powerful encryption systems 25 years from now, but it's unlikely that we will have eradicated the information security problem entirely.
BY THE NUMBERS: Six worst Internet routing attacks
"There will be a constant battle between people who want to protect information and people who want to destroy information," Newell says. "I don't see that fight going away. There are always going to be people who want to steal from you and people who want to monitor you, and they will have the same compute power available."
- Hadoop for Dummies Today, organizations in every industry are being showered with imposing quantities of new information. Along with traditional sources, many more data channels and...
- The Top Five Ways to Get Started with Big Data Despite the increased focus on big data over the past few years, most organizations are still talking about what big data is rather...
- Data Warehouse Augmentation: The Queryable Data Store While organizations have, to date, been busy exploring and experimenting, they are now beginning to focus on using big data technologies to solve...
- The IBM Big Data Platform IBM is unique in having developed an enterprise class big data platform that allows you to address the full spectrum of big data...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and... All Data Center White Papers | Webcasts