SlideShare uma empresa Scribd logo
1 de 14
Future of the Internet
How an ubiquitous Internet of things will lead to more
secure Digital World
Rahul Singh
History of the Future, Spring 2013
Professor Mark Gray
5/9/2013
Table of Contents
Future of the Internet .......................................................................................................................................... 1
How an ubiquitous Internet of things will lead to more secure Digital World ........................ 1
Observation ............................................................................................................................................................................................ 1
Hypothesis .............................................................................................................................................................................................. 1

Current Evidence of Internet Growth and In-Security ...................................................................... 2
Internet Ubiquity ................................................................................................................................................................................. 2
Internet.Things ..................................................................................................................................................................................... 3
Internet.Crime ....................................................................................................................................................................................... 4

Analysis ................................................................................................................................................................ 5
Conclusion ........................................................................................................................................................... 7

Future of the Internet

ii
Rahul Singh
History of the Future, Spring 2013
Professor Mark Gray
5/9/2013

Future of the Internet
How an ubiquitous Internet of things will lead to more secure Digital World
Observation
It wasn't that long ago that owning a computer was something of note. Not everyone had a
computer at home. 1 The Internet, let alone an iPhone were thoughts of science fiction. The
world of computing has come so far that the "Internet" has become pervasive in everyday
life. This new utility is now as important as water, electricity, and cable. It may soon replace
cable.
As new media replaces old media of all kinds, three main features should emerge: The
internet will be available everywhere and in all parts of the world via a grid of overlaying
systems to all people on earth; All electronic devices will be connected to self-organizing
networks that are owned by individuals, corporations, and governments; Cyber crime will
over take every other form of white collar crime to date.
The research in this document reflects a high-level qualitative gathering and analysis of
publications, data-sources, and industry blogs that show observed trends that can be
reasonably projected to continue over the next 10-20 years.
Hypothesis
If more and more electronic devices get on to the Internet, the Internet infrastructure will
need to grow to support the devices. If the Internet continues to grow, it will likely support
more and more non-user Internet devices: the Internet of things. As the number of users
and the Internet of things continue to grow, more and more cybercrime will be prevalent.
An invisible energy and information mesh that connects and controls all electronic devices
and will be the fabric for commerce and education will pervade the future of the world.
Because it will be so important, cyber crime will become commonplace. As cyber crime
1(Plumer,

2013)

Future of the Internet

1
becomes commonplace, so will cyber police and cyber military.

More Devices

Bigger
Network

More
Crime

More
Security

Current Evidence of Internet Growth and In-Security
Internet Ubiquity

Although the number of Internet hosts has been plateauing, the number of users has been
steadily increasing in the last 20 years. From 1997 to 2012, the Internet has shown steady
linear growth in developed countries, and slow but exponential growth in the world
globally and in the developing world. In 2006, 82% of the world was not using the Internet.
In 2011 it was 65%.2 Certain regions have seen astronomical growth between 2000 and
2012: Users in Africa grew by 3,606.7%; Users in the Middle East grew by 2,639.9%; and
Users in Latin America and the Caribbean grew by 1,310.8%.3The developing countries are
using the Internet to leapfrog developed countries in some ways. Instead of using
traditional physical networks, they use satellite and cell-networks to get access to the
Internet through mobile devices. The World Bank said that mobile phones have now
reached three-fourths of the world’s population.4
As more and more users become citizens of the Internet, many have strong feelings for the
purpose and use of the Internet. The Global User Internet Survey shows that they see the
Internet as a tool for solving global problems, improving global processes, improving global
initiatives, and as a tool for human rights. These users also expressed an increase in
Internet protection and worries about privacy.5
Growth of the Internet affects the physical world. As users increase, so does the need for
Internet bandwidth and the number of subscribers that pay for broadband Internet.
Research shows that although Internet bandwidth has been steadily increasing, the growth

2(WikiPedia,

2013)
Marketing Group, 2012)
4(World Bank, 2013)
5(Internet Society, 2013)
3(Miniwatts

Future of the Internet

2
rate is decreasing.6Although the Internet hubs are primarily between Europe and North
America, Asia, Africa, South America are starting to develop. In Africa, tech-entrepreneurs
are gathering in “Accelerators” similar to the United States.7 These companies are
leveraging the growth of the Internet to create content that originates from their countries
targeted to their countries.
Internet.Things

The measure of the internet in our daily lives is evidenced by the number of devices that
are addressable by a unique IP ("Internet Protocol") address and the number of users using
it. The current Internet uses IPV4 addressing and the emerging version utilizes IPV6. There
were only 4 billion or so addresses or so addresses available until the recent adoption of
IPV6. Although the 4 billion IPs are still being used as the primary addressing system,
institutions around the world are using them up.8The Guardian noted from Cisco’s research
that the number of Internet devices would outnumber the number of humans this year.9
More and more “mobile” devices account for Internet usage. PC’s and Laptops make the
bulk of the internet devices used by users, but users are increasingly opting to use mobile
phones, tablets, and internet TVs as these devices become better at accessing the
internet.10By 2017, non-smartphones
will be a minority.11
Mobile phones, tablets, and Internet TVs
aren’t the only things that utilize the
Internet. Even though many users
accessorize their Internet systems with
other devices, and while these devices
aren’t technically “on the internet”
because they aren’t addressable by an IP
address, they are still connected via

6(PriMetrica,

Inc., 2013)
2012)
8(Botnet, Carna, 2012)
9(Arthur, Charles, 2013)
10(Wastershed Publishing, 2012)
11(Cisco, 2013)
7(Gammon,

Future of the Internet

3
wireless protocols of Bluetooth or the many variations of WIFI. These devices can include
home security cameras, wireless printers, cameras, keyboards, and mice.
“The any-to-any world and the Internet of Everything is an evolution in connectivity
and collaboration that is unfolding rapidly. It’s the nexus of devices, clouds, and
applications.”12
Many Internet and technology industry sites are already heralding devices, platforms, and
ideas for the coming “Internet of Things.” The ideas range from using technology to create
self-regulating farms that know how much water to request from a watering system, to
home appliances that talk to each other.13Another indicator of the eminent “Internet of
Things” are groups of companies getting together to create standards such as LogiTech,
KontrolTV, COIN, BASIS, and KEASE.14
Internet.Crime

The Internet Crime Complaint Center (IC3), in partnership with the FBI and the National
White Collar Crime Center reported in 2012 that they received 314,246 complaints in 2011.
In 2000, they received 16,838. Although the complaints were down from 2009, the growing
trend of Internet crime is evident in the following graphic obtained from their report.15

12(Cisco,

2013)
2013)
14(Internet of Things Consortium, 2013)
15(IC3, 2012)
13(GigaOm,

Future of the Internet

4
The types of crimes that the IC3 responds to vary in degree and severity, but it’s clear from
their report that people have lost money. In 2011, approximately $485M dollars was lost to
computer crime as reported to the IC3. These criminals target people through fraudulent
claims, identity theft, and even FBI impersonation. International crime is also on the rise.
Organizations such as FBI (Federal Bureau of Investigations, 2013), Department of
Homeland Security, and Interpol all have designated staff to deal with cybercrime.16 State
governments such as Massachusetts have also taken this issue seriously and have started to
educate their citizens.17
With more and more mobile devices, threats such as viruses and malware that used to
plague PC users are now spreading over to smart phones. Cisco reported that Android
malware grew 2577 percent in 2012. International cyber crime also includes spam that
originates from other countries. Spam is the major delivery vehicle for malicious content
that can damage hardware and software, as well as fraudulent claims. Many spam
messages include “spoofed” brands that consumers are likely to respond to save money. 18

Analysis
Experts have thought up several scenarios of
the future of the Internet, but none of them
deny the coming ubiquity. Whether it is a
porous garden, built with moats and bridges,
a network of boutique networks, or a
common pool that caters to all, all of them
have one idea front and center: the Internet
will be everywhere. 19
Erich Schmidt, the Chairman of Google, Inc.
projects similar thoughts about the Internet’s
ubiquity. He claims in his new book with
Jared Cohen “In the next decade, 5 billion new

16(Interpol,

2013)

17(Commonwealth

of Massachussetts, 2013)
2013)
19(Internet Society, 2009)
18(Cisco,

Future of the Internet

5
people will join the Internet.”20Much of this growth will come from mobile devices because
they are affordable and portable in developing countries where physical infrastructure is
lacking.21
The internet statistics collected by Netcraft, ICANN, CAIDA, and various other organizations
and associations all point to the same thing: the Internet continues to grow in the number
of users and more and more of the users are using smaller and smaller devices such as
mobile phones and tablets.
Most businesses have already shifted their strategy to design applications and software for
mobile and table designs. Internet communities have created “Responsive” design patterns
to create user interfaces for the variety of devices that have cropped up in the last 10 or so
years. Pete Cashmore of Mashable says that 2013 is the year of responsive design because
we’re in the post-pc era and that tablet sales are going to hit 100M this year.22
Although most of the businesses aren’t yet playing with the “Internet of Things,” the best
consulting companies such as McKinsey are already publishing strategy papers on how to
understand and utilize for business agility. 23 They suggest that adopting the Internet of
Things into business models will eventually become a part of every day life. Sensors and
devices that are connected will be a part of a large ecosystem that includes the company’s
inventory as well as the production machinery.
The government is also trying to catch up to the growth of Internet crimes ranging from
Internet piracy, fraudulent transactions, and Internet privacy. Recently bills such as SOPA
have been shot down for being too controlling. CFSA is a draft bill that’s being developed to
fight the streaming of copyrighted information. Although no major acts have been passed,
the conversation is in the public sphere. When bills that may or may not restrict the
Internet are discussed in Congress or Senate, the Internet itself becomes a hotbed of debate
on the issue.24
The problem with current regulation attempts stems from the fact that most politicians
don’t understand what the Internet is about. Some think that the Internet is a series of
tubes, while others think that they invented it. Lobbying companies that want to exert
20(Schmidt

& Cohen, 2013)
2013)
22(Cashmore, 2012)
23(Chui, Löffler, & Roberts, 2010)
24(Albanesius, 2013)
21(WikiPedia,

Future of the Internet

6
control or politicians that want to levy taxes to increase government revenue usually fill
the gap in knowledge.
Although the government helped create the Internet, it still hasn’t quite understood how to
use it to be more efficient. They have understood that it’s important, just not how
important. When Estonia fell to a full-scale cyber attack in 2007, the global community of
nations woke up and started to take cyber-security more seriously.25

Conclusion
The Internet is for People, first and foremost. It is an ecosystem that centers on People.
Cisco defines “People, Processes, Data, and Things” as the different elements that work
together on the Internet. All of are growing in numbers. Population growth (People) has
been a part of the modern world and as it goes from 7B to 8B, there will be more
institutions doing more work (Processes). As more Processes are executed, more Data will
be generated and simultaneously on more and more devices (Things).
Criminals are finding better ways to dupe users, steal information, and cause havoc in
people’s lives. Internet crime has become a part of the world’s problems. Government is
trying to catch up with new laws, new ways to police and fight Internet crime both
domestically and internationally.
The states that want to manage a freeand just Internet will have to find good reason to
enact laws that limit users. In countries with abridged, the Internet’s role in changing the
governmental structure can only be speculated. For liberal democracies, the Internet will
get worse with Internet crime before it gets better.
In the next 10 years, there will be a global “black-swan” event that will potentially impact
the whole Internet infrastructure or a segment. The Internet works cross several regions of
the world, through several software layers, and across several types of physical layers.
These layers and regions won’t protect us from the worst case scenario.
As the number of Internet devices and users grow, so will the number of people who don’t
know how to protect their information and secure their devices. Malicious hackers can
exploit these vulnerabilities. The Internet Census 2012 by Carna Botnet shows how
someone with enough skills can understand the traffic and nature of Internet usage
25(WikiPedia,

2013)

Future of the Internet

7
without people or government’s permission. This “secret hacker internet census” is a scary
but true incident. A hacker exploited the Internet’s vulnerability over the course of a year
to write a research paper.26This hacker found that many of the devices aren’t protected
while others are protected with extremely weak passwords. He compromised 420,000
devices to monitor more than 460,000,000 devices and was able to get into networks even
behind the firewall of China.

It’s only a matter of time, that someone a group of people with the proper skills and
resources that they have acquired through illegal means will attempt to carry out largescale attacks to de-stabilize people’s lives, nations, and businesses. The world is getting
wise of the potential threat. Interpol has recently invested in an international “Global
Complex for Innovation” in Singapore with the help of Kaspersky Labs, a leader in antivirus research.27
As the Internet came out of the world of military research under the umbrella of DARPA, so
will Internet Security. There may be a divergence in strategies and tactics used by “police”
or “domestic security” forces such as FBI and Interpol will be different than those used by
“military” and “national security” forces. Policy makers will then need to catch up to create
26(Stöcker

& Horchert, 2013)
Labs, 2013)

27(Kaspersky

Future of the Internet

8
laws that can control them for public good instead of public control. Because the
government is usually reactionary rather than proactive, policy changes for a free and just
Internet will take years after several relatively small incidents like Estonia and maybe a few
years after a black-swan event.

Future of the Internet

9
Bibliography
Albanesius, C. (2013, March 27). Cyber-Crime Bill Concerns Internet Activists. Retrieved May
9, 2013, from PC Magazine:
http://www.pcmag.com/article2/0,2817,2417117,00.asp
Arthur, Charles. (2013, February 7). Mobile internet devices 'will outnumber humans this
year'. Retrieved May 9, 2013, from The Guardian - News - Technology - Internet:
http://www.guardian.co.uk/technology/2013/feb/07/mobile-internet-outnumberpeople
Botnet, Carna. (2012, October). Internet Census 2012. Retrieved April 23, 2013, from
Internet Census 2012: http://internetcensus2012.bitbucket.org/paper.html
Cashmore, P. (2012, December 11). Why 2013 Is the Year of Responsive Web Design.
Retrieved March 4, 2013, from Mashable.com:
http://mashable.com/2012/12/11/responsive-web-design/
Chui, M., Löffler, M., & Roberts, R. (2010, March). The Internet of Things. Retrieved May 9,
2013, from McKinsey & Co - Insights & Publications - McKinsey Quarterly:
http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_t
hings
Cisco. (2013, February 7). Cisco Visual Networking Index: Global Mobile Data Traffic
Forecast Update, 2012–2017. Retrieved May 9, 2013, from Cisco:
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns
827/white_paper_c11-520862.html
Cisco. (2013). Security Annual Report. Retrieved May 9, 2013, from Cisco:
https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2013_ASR.pdf
Commonwealth of Massachussetts. (2013). Cyber Crime & Internet Safety. Retrieved May 9,
2013, from The Official Website of the Attorney General of Massachussetts:
http://www.mass.gov/ago/about-the-attorney-generals-office/communityprograms/cyber-crime-and-internet-safety/

Future of the Internet

10
Federal Bureau of Investigations. (2013). Cyber. Retrieved May 9, 2013, from FBI:
http://www.fbi.gov/about-us/investigate/cyber
Gammon, K. (2012, April 5). A New Silicon Valley? Tech Hubs Spring Up In Africa. Retrieved
May 9, 2013, from FastCoExist: http://www.fastcoexist.com/1679629/a-newsilicon-valley-tech-hubs-spring-up-in-africa
GigaOm. (2013). Internet of Things. Retrieved May 8, 2013, from GigaOm:
http://gigaom.com/tag/internet-of-things/
IC3. (2012). 2011 Internet Crime Report. Retrieved May 9, 2013, from Internet Crime
Complaint Center: http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
Internet of Things Consortium. (2013). Internet of Things Consortium Members. Retrieved
May 9, 2013, from Internet of Things Consortium: http://iofthings.org/members
Internet Society. (2013, January 23). Global Internet User Survey - 2012 Key Findings.
Retrieved May 8, 2013, from Internet Society:
https://www.internetsociety.org/sites/default/files/GUIS-2012-Infographic.pdf
Internet Society. (2009, October 9). Internet Futures Scenarios. Retrieved May 9, 2013, from
Internet Society: http://www.cnn.com/2013/04/23/tech/web/eric-schmidtgoogle-book
Interpol. (2013). Cyber Crime. Retrieved April 23, 2013, from Interpol - Crime Areas:
http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime
Kaspersky Labs. (2013, March 27). Kaspersky Lab signs up to actively support INTERPOL
Global Complex for Innovation, Singapore. Retrieved May 9, 2013, from Kaspersky
Labs - News:
http://www.kaspersky.com/about/news/business/2013/Kaspersky_Lab_signs_up_
to_actively_support_INTERPOL_Global_Complex_for_Innovation_Singapore
Miniwatts Marketing Group. (2012, June 30). Internet Usage Statistics. Retrieved May 7,
2013, from Internet World Stats - Usage and Population Statistics:
http://www.internetworldstats.com/stats.htm
Plumer, B. (2013, March 29). What the Internet looked like in 1995. Retrieved April 23,
2013, from Washington Post - Wonkblog:

Future of the Internet

11
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/03/29/what-theinternet-looked-like-in-1995/
PriMetrica, Inc. (2013). Global Internet Map. Retrieved May 7, 2013, from TeleGeography:
http://www.telegeography.com/telecom-maps/global-internet-map/
Schmidt, E., & Cohen, J. (2013, May). The New Digital Age. Retrieved May 9, 2013, from The
New Digital Age: http://www.newdigitalage.com
Stöcker, C., & Horchert, J. (2013, March 22). Mapping the Internet: A Hacker's Secret Internet
Census. Retrieved April 23, 2013, from Spiegel Online International:
http://www.spiegel.de/international/world/hacker-measures-the-internetillegally-with-carna-botnet-a-890413.html
Wastershed Publishing. (2012, December 19). Mobile Phones Now Account for 17% of Total
Time Spent With the Internet. Retrieved May 9, 2013, from Marketing Charts:
http://www.marketingcharts.com/wp/interactive/mobile-phones-now-accountfor-17-of-total-time-spent-with-the-internet-25524/
WikiPedia. (2013, February 26). 2007 Cyberattacks on Estonia. Retrieved May 9, 2013, from
WikiPedia: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
WikiPedia. (2013, April 11). Global Internet Usage. Retrieved April 29, 2013, from
WikiPedia: http://en.wikipedia.org/wiki/Global_Internet_usage
WikiPedia. (2013, February 17). Mobile Internet Growth. Retrieved May 9, 2013, from
WikiPedia: http://en.wikipedia.org/wiki/Mobile_Internet_growth
World Bank. (2013, July 17). Mobile Phone Access Reaches Three Quarters of Planet's
Population. Retrieved May 9, 2013, from WorldBank - News:
http://www.worldbank.org/en/news/press-release/2012/07/17/mobile-phoneaccess-reaches-three-quarters-planets-population

Future of the Internet

12

Mais conteúdo relacionado

Mais procurados

Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaAndy Shutka
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021Peter Gallagher
 
Iot Presentation ( 22 Aug 2015 )
Iot Presentation ( 22 Aug 2015 )Iot Presentation ( 22 Aug 2015 )
Iot Presentation ( 22 Aug 2015 )Adun Nanthakaew
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيتjinanAlmousawy
 
Monitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage SystemMonitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage Systemijtsrd
 
The Future is Internet of Things (IOT)
The Future is Internet of Things (IOT)The Future is Internet of Things (IOT)
The Future is Internet of Things (IOT)Adnyesh Dalpati
 
Internet of Things (#IoT) New Paradigm for Business
Internet of Things (#IoT) New Paradigm for BusinessInternet of Things (#IoT) New Paradigm for Business
Internet of Things (#IoT) New Paradigm for BusinessMighty Things
 
Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...IJMTST Journal
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of ThingsDesign World
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 

Mais procurados (20)

Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
 
Internet of things presentation
Internet of things presentationInternet of things presentation
Internet of things presentation
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
IoT - Introduction
IoT - IntroductionIoT - Introduction
IoT - Introduction
 
IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021
 
Iot Presentation ( 22 Aug 2015 )
Iot Presentation ( 22 Aug 2015 )Iot Presentation ( 22 Aug 2015 )
Iot Presentation ( 22 Aug 2015 )
 
What is IoT?
What is IoT? What is IoT?
What is IoT?
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
 
Monitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage SystemMonitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage System
 
The Future is Internet of Things (IOT)
The Future is Internet of Things (IOT)The Future is Internet of Things (IOT)
The Future is Internet of Things (IOT)
 
Internet of Things (#IoT) New Paradigm for Business
Internet of Things (#IoT) New Paradigm for BusinessInternet of Things (#IoT) New Paradigm for Business
Internet of Things (#IoT) New Paradigm for Business
 
Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 

Semelhante a The Future of the Internet - The Next 30 Years

Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and futureMobile88
 
Digital marketing - evolution
Digital marketing - evolution Digital marketing - evolution
Digital marketing - evolution Eva Sycz
 
The evolution of the internet since the 1960s until now
The evolution of the internet since the 1960s until nowThe evolution of the internet since the 1960s until now
The evolution of the internet since the 1960s until nowjessielancs
 
How Audiences use Technology and its impact on their lives
How Audiences use Technology and its impact on their livesHow Audiences use Technology and its impact on their lives
How Audiences use Technology and its impact on their livesMartaCaceres10
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014Francisco Calzado
 
Pip future of_apps_and_web
Pip future of_apps_and_webPip future of_apps_and_web
Pip future of_apps_and_webNikolay Bulanov
 
The Evolution of the Internet
The Evolution of the InternetThe Evolution of the Internet
The Evolution of the InternetAshley Jouhar
 
The Internet of Things: how the next evolution if the Internet is changing ev...
The Internet of Things: how the next evolution if the Internet is changing ev...The Internet of Things: how the next evolution if the Internet is changing ev...
The Internet of Things: how the next evolution if the Internet is changing ev...The Marketing Distillery
 
Assignment 2 Task 1 Evolution of digital marketing on SlideShare
Assignment 2 Task 1  Evolution of digital marketing on SlideShareAssignment 2 Task 1  Evolution of digital marketing on SlideShare
Assignment 2 Task 1 Evolution of digital marketing on SlideShareneliremarkable
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsDaniel Davey
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxMorganEvans44
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsDaniel Davey
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsDarryl Gray
 
Future of Entertainment Research Report
Future of Entertainment Research ReportFuture of Entertainment Research Report
Future of Entertainment Research ReportRich Bartram, PGA
 
Our relationship with the internet
Our relationship with the internetOur relationship with the internet
Our relationship with the internetLaurenMacgregor6
 
Ten Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetTen Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetCisco Services
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 

Semelhante a The Future of the Internet - The Next 30 Years (20)

Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and future
 
Digital marketing - evolution
Digital marketing - evolution Digital marketing - evolution
Digital marketing - evolution
 
The evolution of the internet since the 1960s until now
The evolution of the internet since the 1960s until nowThe evolution of the internet since the 1960s until now
The evolution of the internet since the 1960s until now
 
How Audiences use Technology and its impact on their lives
How Audiences use Technology and its impact on their livesHow Audiences use Technology and its impact on their lives
How Audiences use Technology and its impact on their lives
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014
 
Pip future of_apps_and_web
Pip future of_apps_and_webPip future of_apps_and_web
Pip future of_apps_and_web
 
The Evolution of the Internet
The Evolution of the InternetThe Evolution of the Internet
The Evolution of the Internet
 
The Internet of Things: how the next evolution if the Internet is changing ev...
The Internet of Things: how the next evolution if the Internet is changing ev...The Internet of Things: how the next evolution if the Internet is changing ev...
The Internet of Things: how the next evolution if the Internet is changing ev...
 
Assignment 2 Task 1 Evolution of digital marketing on SlideShare
Assignment 2 Task 1  Evolution of digital marketing on SlideShareAssignment 2 Task 1  Evolution of digital marketing on SlideShare
Assignment 2 Task 1 Evolution of digital marketing on SlideShare
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implications
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptx
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implications
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of Things
 
Future of Entertainment Research Report
Future of Entertainment Research ReportFuture of Entertainment Research Report
Future of Entertainment Research Report
 
Our relationship with the internet
Our relationship with the internetOur relationship with the internet
Our relationship with the internet
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
Ten Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetTen Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation Internet
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 

Mais de Rahul Singh

Unifying Business Information with Dashboards
Unifying Business Information with Dashboards Unifying Business Information with Dashboards
Unifying Business Information with Dashboards Rahul Singh
 
Get Your Shit Together
Get Your Shit TogetherGet Your Shit Together
Get Your Shit TogetherRahul Singh
 
Machine Learning & Graph Processing w/ Spark and Accumulo
Machine Learning & Graph Processing w/ Spark and AccumuloMachine Learning & Graph Processing w/ Spark and Accumulo
Machine Learning & Graph Processing w/ Spark and AccumuloRahul Singh
 
Building Online Business Software 101 (B2B)
Building Online Business Software 101 (B2B) Building Online Business Software 101 (B2B)
Building Online Business Software 101 (B2B) Rahul Singh
 
Asynchronous Data Processing
Asynchronous Data ProcessingAsynchronous Data Processing
Asynchronous Data ProcessingRahul Singh
 
Building Enterprise Search Engines using Open Source Technologies
Building Enterprise Search Engines using Open Source TechnologiesBuilding Enterprise Search Engines using Open Source Technologies
Building Enterprise Search Engines using Open Source TechnologiesRahul Singh
 
Deliver Excellent Service to your Customers
Deliver Excellent Service to your CustomersDeliver Excellent Service to your Customers
Deliver Excellent Service to your CustomersRahul Singh
 
Building Search Engines - Lucene, SolR and Elasticsearch
Building Search Engines - Lucene, SolR and ElasticsearchBuilding Search Engines - Lucene, SolR and Elasticsearch
Building Search Engines - Lucene, SolR and ElasticsearchRahul Singh
 
Building Smart Indexes for Drupal Sites
Building Smart Indexes for Drupal SitesBuilding Smart Indexes for Drupal Sites
Building Smart Indexes for Drupal SitesRahul Singh
 
Building People First - Lessons in Team Effectiveness & Happiness
Building People First - Lessons in Team Effectiveness & HappinessBuilding People First - Lessons in Team Effectiveness & Happiness
Building People First - Lessons in Team Effectiveness & HappinessRahul Singh
 
Select * From Internet - Integrating the Web
Select * From Internet - Integrating the WebSelect * From Internet - Integrating the Web
Select * From Internet - Integrating the WebRahul Singh
 
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...Rahul Singh
 
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...Modern Presidential Communications - Communicating Presidential Rhetorical Vi...
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...Rahul Singh
 
Rahul.singh.speech presentation
Rahul.singh.speech presentationRahul.singh.speech presentation
Rahul.singh.speech presentationRahul Singh
 
Anant - Micro Enterprise - The Future, Today
Anant - Micro Enterprise - The Future, TodayAnant - Micro Enterprise - The Future, Today
Anant - Micro Enterprise - The Future, TodayRahul Singh
 

Mais de Rahul Singh (15)

Unifying Business Information with Dashboards
Unifying Business Information with Dashboards Unifying Business Information with Dashboards
Unifying Business Information with Dashboards
 
Get Your Shit Together
Get Your Shit TogetherGet Your Shit Together
Get Your Shit Together
 
Machine Learning & Graph Processing w/ Spark and Accumulo
Machine Learning & Graph Processing w/ Spark and AccumuloMachine Learning & Graph Processing w/ Spark and Accumulo
Machine Learning & Graph Processing w/ Spark and Accumulo
 
Building Online Business Software 101 (B2B)
Building Online Business Software 101 (B2B) Building Online Business Software 101 (B2B)
Building Online Business Software 101 (B2B)
 
Asynchronous Data Processing
Asynchronous Data ProcessingAsynchronous Data Processing
Asynchronous Data Processing
 
Building Enterprise Search Engines using Open Source Technologies
Building Enterprise Search Engines using Open Source TechnologiesBuilding Enterprise Search Engines using Open Source Technologies
Building Enterprise Search Engines using Open Source Technologies
 
Deliver Excellent Service to your Customers
Deliver Excellent Service to your CustomersDeliver Excellent Service to your Customers
Deliver Excellent Service to your Customers
 
Building Search Engines - Lucene, SolR and Elasticsearch
Building Search Engines - Lucene, SolR and ElasticsearchBuilding Search Engines - Lucene, SolR and Elasticsearch
Building Search Engines - Lucene, SolR and Elasticsearch
 
Building Smart Indexes for Drupal Sites
Building Smart Indexes for Drupal SitesBuilding Smart Indexes for Drupal Sites
Building Smart Indexes for Drupal Sites
 
Building People First - Lessons in Team Effectiveness & Happiness
Building People First - Lessons in Team Effectiveness & HappinessBuilding People First - Lessons in Team Effectiveness & Happiness
Building People First - Lessons in Team Effectiveness & Happiness
 
Select * From Internet - Integrating the Web
Select * From Internet - Integrating the WebSelect * From Internet - Integrating the Web
Select * From Internet - Integrating the Web
 
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...
Bill Drayton - Father of Social Entrepreneurship, Leading Leader of Social Ch...
 
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...Modern Presidential Communications - Communicating Presidential Rhetorical Vi...
Modern Presidential Communications - Communicating Presidential Rhetorical Vi...
 
Rahul.singh.speech presentation
Rahul.singh.speech presentationRahul.singh.speech presentation
Rahul.singh.speech presentation
 
Anant - Micro Enterprise - The Future, Today
Anant - Micro Enterprise - The Future, TodayAnant - Micro Enterprise - The Future, Today
Anant - Micro Enterprise - The Future, Today
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

The Future of the Internet - The Next 30 Years

  • 1. Future of the Internet How an ubiquitous Internet of things will lead to more secure Digital World Rahul Singh History of the Future, Spring 2013 Professor Mark Gray 5/9/2013
  • 2. Table of Contents Future of the Internet .......................................................................................................................................... 1 How an ubiquitous Internet of things will lead to more secure Digital World ........................ 1 Observation ............................................................................................................................................................................................ 1 Hypothesis .............................................................................................................................................................................................. 1 Current Evidence of Internet Growth and In-Security ...................................................................... 2 Internet Ubiquity ................................................................................................................................................................................. 2 Internet.Things ..................................................................................................................................................................................... 3 Internet.Crime ....................................................................................................................................................................................... 4 Analysis ................................................................................................................................................................ 5 Conclusion ........................................................................................................................................................... 7 Future of the Internet ii
  • 3. Rahul Singh History of the Future, Spring 2013 Professor Mark Gray 5/9/2013 Future of the Internet How an ubiquitous Internet of things will lead to more secure Digital World Observation It wasn't that long ago that owning a computer was something of note. Not everyone had a computer at home. 1 The Internet, let alone an iPhone were thoughts of science fiction. The world of computing has come so far that the "Internet" has become pervasive in everyday life. This new utility is now as important as water, electricity, and cable. It may soon replace cable. As new media replaces old media of all kinds, three main features should emerge: The internet will be available everywhere and in all parts of the world via a grid of overlaying systems to all people on earth; All electronic devices will be connected to self-organizing networks that are owned by individuals, corporations, and governments; Cyber crime will over take every other form of white collar crime to date. The research in this document reflects a high-level qualitative gathering and analysis of publications, data-sources, and industry blogs that show observed trends that can be reasonably projected to continue over the next 10-20 years. Hypothesis If more and more electronic devices get on to the Internet, the Internet infrastructure will need to grow to support the devices. If the Internet continues to grow, it will likely support more and more non-user Internet devices: the Internet of things. As the number of users and the Internet of things continue to grow, more and more cybercrime will be prevalent. An invisible energy and information mesh that connects and controls all electronic devices and will be the fabric for commerce and education will pervade the future of the world. Because it will be so important, cyber crime will become commonplace. As cyber crime 1(Plumer, 2013) Future of the Internet 1
  • 4. becomes commonplace, so will cyber police and cyber military. More Devices Bigger Network More Crime More Security Current Evidence of Internet Growth and In-Security Internet Ubiquity Although the number of Internet hosts has been plateauing, the number of users has been steadily increasing in the last 20 years. From 1997 to 2012, the Internet has shown steady linear growth in developed countries, and slow but exponential growth in the world globally and in the developing world. In 2006, 82% of the world was not using the Internet. In 2011 it was 65%.2 Certain regions have seen astronomical growth between 2000 and 2012: Users in Africa grew by 3,606.7%; Users in the Middle East grew by 2,639.9%; and Users in Latin America and the Caribbean grew by 1,310.8%.3The developing countries are using the Internet to leapfrog developed countries in some ways. Instead of using traditional physical networks, they use satellite and cell-networks to get access to the Internet through mobile devices. The World Bank said that mobile phones have now reached three-fourths of the world’s population.4 As more and more users become citizens of the Internet, many have strong feelings for the purpose and use of the Internet. The Global User Internet Survey shows that they see the Internet as a tool for solving global problems, improving global processes, improving global initiatives, and as a tool for human rights. These users also expressed an increase in Internet protection and worries about privacy.5 Growth of the Internet affects the physical world. As users increase, so does the need for Internet bandwidth and the number of subscribers that pay for broadband Internet. Research shows that although Internet bandwidth has been steadily increasing, the growth 2(WikiPedia, 2013) Marketing Group, 2012) 4(World Bank, 2013) 5(Internet Society, 2013) 3(Miniwatts Future of the Internet 2
  • 5. rate is decreasing.6Although the Internet hubs are primarily between Europe and North America, Asia, Africa, South America are starting to develop. In Africa, tech-entrepreneurs are gathering in “Accelerators” similar to the United States.7 These companies are leveraging the growth of the Internet to create content that originates from their countries targeted to their countries. Internet.Things The measure of the internet in our daily lives is evidenced by the number of devices that are addressable by a unique IP ("Internet Protocol") address and the number of users using it. The current Internet uses IPV4 addressing and the emerging version utilizes IPV6. There were only 4 billion or so addresses or so addresses available until the recent adoption of IPV6. Although the 4 billion IPs are still being used as the primary addressing system, institutions around the world are using them up.8The Guardian noted from Cisco’s research that the number of Internet devices would outnumber the number of humans this year.9 More and more “mobile” devices account for Internet usage. PC’s and Laptops make the bulk of the internet devices used by users, but users are increasingly opting to use mobile phones, tablets, and internet TVs as these devices become better at accessing the internet.10By 2017, non-smartphones will be a minority.11 Mobile phones, tablets, and Internet TVs aren’t the only things that utilize the Internet. Even though many users accessorize their Internet systems with other devices, and while these devices aren’t technically “on the internet” because they aren’t addressable by an IP address, they are still connected via 6(PriMetrica, Inc., 2013) 2012) 8(Botnet, Carna, 2012) 9(Arthur, Charles, 2013) 10(Wastershed Publishing, 2012) 11(Cisco, 2013) 7(Gammon, Future of the Internet 3
  • 6. wireless protocols of Bluetooth or the many variations of WIFI. These devices can include home security cameras, wireless printers, cameras, keyboards, and mice. “The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that is unfolding rapidly. It’s the nexus of devices, clouds, and applications.”12 Many Internet and technology industry sites are already heralding devices, platforms, and ideas for the coming “Internet of Things.” The ideas range from using technology to create self-regulating farms that know how much water to request from a watering system, to home appliances that talk to each other.13Another indicator of the eminent “Internet of Things” are groups of companies getting together to create standards such as LogiTech, KontrolTV, COIN, BASIS, and KEASE.14 Internet.Crime The Internet Crime Complaint Center (IC3), in partnership with the FBI and the National White Collar Crime Center reported in 2012 that they received 314,246 complaints in 2011. In 2000, they received 16,838. Although the complaints were down from 2009, the growing trend of Internet crime is evident in the following graphic obtained from their report.15 12(Cisco, 2013) 2013) 14(Internet of Things Consortium, 2013) 15(IC3, 2012) 13(GigaOm, Future of the Internet 4
  • 7. The types of crimes that the IC3 responds to vary in degree and severity, but it’s clear from their report that people have lost money. In 2011, approximately $485M dollars was lost to computer crime as reported to the IC3. These criminals target people through fraudulent claims, identity theft, and even FBI impersonation. International crime is also on the rise. Organizations such as FBI (Federal Bureau of Investigations, 2013), Department of Homeland Security, and Interpol all have designated staff to deal with cybercrime.16 State governments such as Massachusetts have also taken this issue seriously and have started to educate their citizens.17 With more and more mobile devices, threats such as viruses and malware that used to plague PC users are now spreading over to smart phones. Cisco reported that Android malware grew 2577 percent in 2012. International cyber crime also includes spam that originates from other countries. Spam is the major delivery vehicle for malicious content that can damage hardware and software, as well as fraudulent claims. Many spam messages include “spoofed” brands that consumers are likely to respond to save money. 18 Analysis Experts have thought up several scenarios of the future of the Internet, but none of them deny the coming ubiquity. Whether it is a porous garden, built with moats and bridges, a network of boutique networks, or a common pool that caters to all, all of them have one idea front and center: the Internet will be everywhere. 19 Erich Schmidt, the Chairman of Google, Inc. projects similar thoughts about the Internet’s ubiquity. He claims in his new book with Jared Cohen “In the next decade, 5 billion new 16(Interpol, 2013) 17(Commonwealth of Massachussetts, 2013) 2013) 19(Internet Society, 2009) 18(Cisco, Future of the Internet 5
  • 8. people will join the Internet.”20Much of this growth will come from mobile devices because they are affordable and portable in developing countries where physical infrastructure is lacking.21 The internet statistics collected by Netcraft, ICANN, CAIDA, and various other organizations and associations all point to the same thing: the Internet continues to grow in the number of users and more and more of the users are using smaller and smaller devices such as mobile phones and tablets. Most businesses have already shifted their strategy to design applications and software for mobile and table designs. Internet communities have created “Responsive” design patterns to create user interfaces for the variety of devices that have cropped up in the last 10 or so years. Pete Cashmore of Mashable says that 2013 is the year of responsive design because we’re in the post-pc era and that tablet sales are going to hit 100M this year.22 Although most of the businesses aren’t yet playing with the “Internet of Things,” the best consulting companies such as McKinsey are already publishing strategy papers on how to understand and utilize for business agility. 23 They suggest that adopting the Internet of Things into business models will eventually become a part of every day life. Sensors and devices that are connected will be a part of a large ecosystem that includes the company’s inventory as well as the production machinery. The government is also trying to catch up to the growth of Internet crimes ranging from Internet piracy, fraudulent transactions, and Internet privacy. Recently bills such as SOPA have been shot down for being too controlling. CFSA is a draft bill that’s being developed to fight the streaming of copyrighted information. Although no major acts have been passed, the conversation is in the public sphere. When bills that may or may not restrict the Internet are discussed in Congress or Senate, the Internet itself becomes a hotbed of debate on the issue.24 The problem with current regulation attempts stems from the fact that most politicians don’t understand what the Internet is about. Some think that the Internet is a series of tubes, while others think that they invented it. Lobbying companies that want to exert 20(Schmidt & Cohen, 2013) 2013) 22(Cashmore, 2012) 23(Chui, Löffler, & Roberts, 2010) 24(Albanesius, 2013) 21(WikiPedia, Future of the Internet 6
  • 9. control or politicians that want to levy taxes to increase government revenue usually fill the gap in knowledge. Although the government helped create the Internet, it still hasn’t quite understood how to use it to be more efficient. They have understood that it’s important, just not how important. When Estonia fell to a full-scale cyber attack in 2007, the global community of nations woke up and started to take cyber-security more seriously.25 Conclusion The Internet is for People, first and foremost. It is an ecosystem that centers on People. Cisco defines “People, Processes, Data, and Things” as the different elements that work together on the Internet. All of are growing in numbers. Population growth (People) has been a part of the modern world and as it goes from 7B to 8B, there will be more institutions doing more work (Processes). As more Processes are executed, more Data will be generated and simultaneously on more and more devices (Things). Criminals are finding better ways to dupe users, steal information, and cause havoc in people’s lives. Internet crime has become a part of the world’s problems. Government is trying to catch up with new laws, new ways to police and fight Internet crime both domestically and internationally. The states that want to manage a freeand just Internet will have to find good reason to enact laws that limit users. In countries with abridged, the Internet’s role in changing the governmental structure can only be speculated. For liberal democracies, the Internet will get worse with Internet crime before it gets better. In the next 10 years, there will be a global “black-swan” event that will potentially impact the whole Internet infrastructure or a segment. The Internet works cross several regions of the world, through several software layers, and across several types of physical layers. These layers and regions won’t protect us from the worst case scenario. As the number of Internet devices and users grow, so will the number of people who don’t know how to protect their information and secure their devices. Malicious hackers can exploit these vulnerabilities. The Internet Census 2012 by Carna Botnet shows how someone with enough skills can understand the traffic and nature of Internet usage 25(WikiPedia, 2013) Future of the Internet 7
  • 10. without people or government’s permission. This “secret hacker internet census” is a scary but true incident. A hacker exploited the Internet’s vulnerability over the course of a year to write a research paper.26This hacker found that many of the devices aren’t protected while others are protected with extremely weak passwords. He compromised 420,000 devices to monitor more than 460,000,000 devices and was able to get into networks even behind the firewall of China. It’s only a matter of time, that someone a group of people with the proper skills and resources that they have acquired through illegal means will attempt to carry out largescale attacks to de-stabilize people’s lives, nations, and businesses. The world is getting wise of the potential threat. Interpol has recently invested in an international “Global Complex for Innovation” in Singapore with the help of Kaspersky Labs, a leader in antivirus research.27 As the Internet came out of the world of military research under the umbrella of DARPA, so will Internet Security. There may be a divergence in strategies and tactics used by “police” or “domestic security” forces such as FBI and Interpol will be different than those used by “military” and “national security” forces. Policy makers will then need to catch up to create 26(Stöcker & Horchert, 2013) Labs, 2013) 27(Kaspersky Future of the Internet 8
  • 11. laws that can control them for public good instead of public control. Because the government is usually reactionary rather than proactive, policy changes for a free and just Internet will take years after several relatively small incidents like Estonia and maybe a few years after a black-swan event. Future of the Internet 9
  • 12. Bibliography Albanesius, C. (2013, March 27). Cyber-Crime Bill Concerns Internet Activists. Retrieved May 9, 2013, from PC Magazine: http://www.pcmag.com/article2/0,2817,2417117,00.asp Arthur, Charles. (2013, February 7). Mobile internet devices 'will outnumber humans this year'. Retrieved May 9, 2013, from The Guardian - News - Technology - Internet: http://www.guardian.co.uk/technology/2013/feb/07/mobile-internet-outnumberpeople Botnet, Carna. (2012, October). Internet Census 2012. Retrieved April 23, 2013, from Internet Census 2012: http://internetcensus2012.bitbucket.org/paper.html Cashmore, P. (2012, December 11). Why 2013 Is the Year of Responsive Web Design. Retrieved March 4, 2013, from Mashable.com: http://mashable.com/2012/12/11/responsive-web-design/ Chui, M., Löffler, M., & Roberts, R. (2010, March). The Internet of Things. Retrieved May 9, 2013, from McKinsey & Co - Insights & Publications - McKinsey Quarterly: http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_t hings Cisco. (2013, February 7). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017. Retrieved May 9, 2013, from Cisco: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns 827/white_paper_c11-520862.html Cisco. (2013). Security Annual Report. Retrieved May 9, 2013, from Cisco: https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2013_ASR.pdf Commonwealth of Massachussetts. (2013). Cyber Crime & Internet Safety. Retrieved May 9, 2013, from The Official Website of the Attorney General of Massachussetts: http://www.mass.gov/ago/about-the-attorney-generals-office/communityprograms/cyber-crime-and-internet-safety/ Future of the Internet 10
  • 13. Federal Bureau of Investigations. (2013). Cyber. Retrieved May 9, 2013, from FBI: http://www.fbi.gov/about-us/investigate/cyber Gammon, K. (2012, April 5). A New Silicon Valley? Tech Hubs Spring Up In Africa. Retrieved May 9, 2013, from FastCoExist: http://www.fastcoexist.com/1679629/a-newsilicon-valley-tech-hubs-spring-up-in-africa GigaOm. (2013). Internet of Things. Retrieved May 8, 2013, from GigaOm: http://gigaom.com/tag/internet-of-things/ IC3. (2012). 2011 Internet Crime Report. Retrieved May 9, 2013, from Internet Crime Complaint Center: http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf Internet of Things Consortium. (2013). Internet of Things Consortium Members. Retrieved May 9, 2013, from Internet of Things Consortium: http://iofthings.org/members Internet Society. (2013, January 23). Global Internet User Survey - 2012 Key Findings. Retrieved May 8, 2013, from Internet Society: https://www.internetsociety.org/sites/default/files/GUIS-2012-Infographic.pdf Internet Society. (2009, October 9). Internet Futures Scenarios. Retrieved May 9, 2013, from Internet Society: http://www.cnn.com/2013/04/23/tech/web/eric-schmidtgoogle-book Interpol. (2013). Cyber Crime. Retrieved April 23, 2013, from Interpol - Crime Areas: http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime Kaspersky Labs. (2013, March 27). Kaspersky Lab signs up to actively support INTERPOL Global Complex for Innovation, Singapore. Retrieved May 9, 2013, from Kaspersky Labs - News: http://www.kaspersky.com/about/news/business/2013/Kaspersky_Lab_signs_up_ to_actively_support_INTERPOL_Global_Complex_for_Innovation_Singapore Miniwatts Marketing Group. (2012, June 30). Internet Usage Statistics. Retrieved May 7, 2013, from Internet World Stats - Usage and Population Statistics: http://www.internetworldstats.com/stats.htm Plumer, B. (2013, March 29). What the Internet looked like in 1995. Retrieved April 23, 2013, from Washington Post - Wonkblog: Future of the Internet 11
  • 14. http://www.washingtonpost.com/blogs/wonkblog/wp/2013/03/29/what-theinternet-looked-like-in-1995/ PriMetrica, Inc. (2013). Global Internet Map. Retrieved May 7, 2013, from TeleGeography: http://www.telegeography.com/telecom-maps/global-internet-map/ Schmidt, E., & Cohen, J. (2013, May). The New Digital Age. Retrieved May 9, 2013, from The New Digital Age: http://www.newdigitalage.com Stöcker, C., & Horchert, J. (2013, March 22). Mapping the Internet: A Hacker's Secret Internet Census. Retrieved April 23, 2013, from Spiegel Online International: http://www.spiegel.de/international/world/hacker-measures-the-internetillegally-with-carna-botnet-a-890413.html Wastershed Publishing. (2012, December 19). Mobile Phones Now Account for 17% of Total Time Spent With the Internet. Retrieved May 9, 2013, from Marketing Charts: http://www.marketingcharts.com/wp/interactive/mobile-phones-now-accountfor-17-of-total-time-spent-with-the-internet-25524/ WikiPedia. (2013, February 26). 2007 Cyberattacks on Estonia. Retrieved May 9, 2013, from WikiPedia: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia WikiPedia. (2013, April 11). Global Internet Usage. Retrieved April 29, 2013, from WikiPedia: http://en.wikipedia.org/wiki/Global_Internet_usage WikiPedia. (2013, February 17). Mobile Internet Growth. Retrieved May 9, 2013, from WikiPedia: http://en.wikipedia.org/wiki/Mobile_Internet_growth World Bank. (2013, July 17). Mobile Phone Access Reaches Three Quarters of Planet's Population. Retrieved May 9, 2013, from WorldBank - News: http://www.worldbank.org/en/news/press-release/2012/07/17/mobile-phoneaccess-reaches-three-quarters-planets-population Future of the Internet 12