Educational CyberPlayGround ®

Future Trends in Computing

TRENDS 2016

TRENDS 2017

TRENDS 2018

"Computers in the future may weigh no more than 1.5 tons." - Popular Mechanics prediction, 1949

"Power electrons are the mother's milk of the information age and power distribution is a lot more fragile than we imagine," said Paul Saffo, director of the Institute for the Future. Carry spare batteries."

2014 Government-built malware running out of control, F-Secure claims "Governments writing viruses: today we sort of take that for granted but 10 years ago that would have been science fiction," he told the public conference. "If someone had come to me ten years ago and told me that by 2014 it will be commonplace for democratic Western governments to write viruses and actively deploy them against other governments, even friendly governments, I would have thought it was a movie plot. But that's exactly where we are today."

The Unstoppable Exponential Growth In The State Of Surveillance For the people who don't care and mistakenly think since they've got nothing to hide they have nothing to be afraid of.

 

2013 Welcome to the cyberwar arms race, an arms race that will define the Internet in the 21st century. Presidential Policy Directive 20, issued last October and released by Edward Snowden, outlines US cyberwar policy. Most of it isn't very interesting, but there are two paragraphs about "Offensive Cyber Effect Operations," or OCEO, that are intriguing:
OECO can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging. The development and sustainment of OCEO capabilities, however, may require considerable time and effort if access and tools for a specific target do not already exist.
The United States Government shall identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power, establish and maintain OCEO capabilities integrated as appropriate with other US offensive capabilities, and execute those capabilities in a manner consistent with the provisions of this directive.
These two paragraphs, and another paragraph about OCEO, are the only parts of the document classified "top secret." And that's because what they're saying is very dangerous.Cyberattacks have the potential to be both immediate and devastating.

First of all, calling it "war" as people have been doing is a misnomer. "War" is a large scale, national effort to force another nation to bend to the political will of the first. The things that have been alleged do not rise to that level. Furthermore, a real "war" would involve kinetic as well as cyber.
It skews the perception and public discourse to continue to call these actions "war" -- similar to using that word to refer to the "war" on drugs or the "war" on Christmas.

Surveillance: White House petition to pardon Snowden: 110,000 signatures
The Obama Administration has established a policy that it doesn't respond to petitions relating to "specific law enforcement matters." See first articulation, in the case of Sholom Rubashkin; the White House repeated the same language in response to petitions relating to Casey Anthony and the Church of Scientology.

SKYbox Data From Above
What can you really learn from 500 miles above Earth? Quite a lot, it turns out. Already, our limited commercial services for satellite imaging are providing crucial data to companies, scientists, and governments. Their up-
to-the-minute snapshots of the planet will give us data
that could upend industries, transform economies—even
help predict the future.

1985 Welcome to the Information Age
A journey through Mankinds History. Post Industrial Age and by 1956 the information age begins.

By spring 2013, everyone on Earth will be able to watch the planet from the most unique vantage point ever built, the International Space Station.

2012 Predicting what topics will trend on Twitter
A new algorithm predicts which Twitter topics will trend hours in advance and offers a new technique for analyzing data that fluctuate over time.

2012 Google Presidential campaign Prediction

2012 3D printers -- In much the same way as the PC trashed the traditional world of computing Industrial 3D printers can now be had for $15,000, and home versions for little more than $1,000 (or half that in kit form). “In many ways, today's 3D printing community resembles the personal computing community of the early 1990s,” says Michael Weinberg, a staff lawyer at Public Knowledge, an advocacy group in Washington, DC. Because of a 3D printer's ability to make perfect replicas, they will probably try to brand it a piracy machine. The next generation of Makerbot's 3D printer is out. $2,200. Review here: http://blog.makezine.com
Video: http://blog.makezine.com/

2012 BIG DATA When scientists publish their research, they also make the underlying data available so the results can be verified by other scientists. It is “big data,” the vast sets of information gathered by researchers at companies like Facebook, Google and Microsoft from patterns of cellphone calls, text messages and Internet clicks by millions of users around the world. Companies often refuse to make such information public, sometimes for competitive reasons and sometimes to protect customers' privacy. But to many scientists, the practice is an invitation to bad science, secrecy and even potential fraud. "we'll see a small group of scientists with access to private data repositories enjoy an unfair amount of attention in the community at the expense of equally talented researchers whose only flaw is the lack of right 'connections' to private data.”

2011 The Personal Computer Is Dead Power is fast shifting from end users and software developers to operating system vendors.

Digital Delivery and moving to the cloud, the concept of ownership will evaporate.


By 2010 the Time Teens Spend With Digital Will Be 80% [1]

Google, CIA Invest in Future of Web Monitoring Spies, Secrecy and Surveillance Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents both present and still-to-come. Its not the very first time Google has done business with Americas spy agencies. Both In-Q-Tel and Google Ventures have seats on Recorded Futures board.

Non Profit Internet Exchange Points like 365 Main Originally, the companies that owned the backbone of the Internet shared traffic. In recent years, however, the practice has increased to the point where some researchers who study public peering points - peering the way global networks are put together believe that peering is changing the fundamental shape of the Internet, with serious consequences for its stability and security. “The Internet as we know it is pretty
much vanishing, in the sense that much of the traffic is being routed through lots of new layers and applications, much of it wireless. One petabyte is equivalent to one million gigabytes. A zettabyte is a million petabytes. And a yottabyte is a thousand zettabytes. The company estimates that video will account for 90 percent of all Internet traffic by 2013. Arbor's Internet Observatory Report concluded that today the majority of Internet traffic by volume flows directly between large content providers like Google and consumer networks like Comcast. It also described what it referred to as the rise of so-called hyper giants — monstrous portals that have become the focal point for much of the network's traffic: “Out of the 40,000 routed end sites in the Internet, 30 large companies — 'hyper giants' like Limelight, Facebook, Google, Microsoft and YouTube — now generate and consume a disproportionate 30 percent of all Internet traffic,” the researchers noted.

Joseph Weizenbaum, computer pioneer and critic, dies 2008
"Perhaps the computer, as well as many other of our machines and techniques, can yet be transformed, following our own authentically revolutionary transformation, into instruments to enable us to live harmoniously with nature and with one another. But one prerequisite will first have to be met: there must be another transformation of man. And it must be one that restores a balance between human knowledge, human aspirations, and an appreciation of human dignity such that man may become worthy of living in nature."

Trend: Computers remember everything forever.
We should shift the default when storing personal information back to where it has been for millennia, from remembering forever to forgetting over time. We have become a global society through mass, creative collaboration when participation will be the key organising idea. People are now players not just spectators, part of the action, not on the sidelines.

Ten Reasons You Will Not Recognize America in Ten Years

2016 - The Computer Age Arrives, civilization as we've known it is over. Now over 90% of the US population is online. Internet access crosses the 90 percent mark that is only achieved by truly ubiquitous technology, such as television and the home telephone.

Originally introduced in a 2002 paper called "The Darknet and the Future of Content Distribution," in which the authors imply that the emergence of darknets is inevitable as long as content can be copied and there is sufficient interest in distribution.'If the government can check everything each citizen does, nobody can keep the government in check.' Use VPN

2004 In all, 1,286 internet experts looked at the future impact of the internet and assessed predictions about how technology and society will unfold. The report about the survey results, including a great many predictions and comments from participants:
http://www.pewinternet.org/PPF/r/145/report_display.asp


The survey results themselves can be found at:
http://www.pewinternet.org/pdfs/Experts_future_survey_results.pdf
In addition, many of the predictions have been entered in an online database that we have created with Elon University. They will join the more than 4,000 predictions from the 1990-1995 era that are already entered in the database.
http://www.elon.edu/predictions/.

Computer Grid Merger 2006
The Global Grid Forum (GGF) and the Enterprise GridAlliance (EGA) Merger "common interest in accelerating the pervasive adoption of grids worldwide." The GGF founded in 1989, develops standards for grid technologies. Members include many academic institutions as well as commercial interests. The EGA, created in 2004, is an organization of vendors working to facilitate the deployment of commercial applications in computing grids. The EGA includes such companies as EMC, Fujitsu Siemens Computers, HP, Intel,NEC, Network Appliance, Oracle, and Sun Microsystems.

- Advanced Encryption Standard - Wireless Policy http://csrc.nist.gov/wireless/S04_DOD%20Wireless%20Requirements-th.pdf

- A Flash Mob supercomputer is hundreds or even thousands of computers connected together via a LAN working together as a single supercomputer. A Flash Mob computer, unlike an ordinary cluster, is temporary and organized on-the-fly for the purpose of working on a single problem.

- The future of email is to get your good ole' phone directory up to date again.

- Brain Scanning - the neuroscientists' use of fMRI, wrote in the March 2003 Nature Neuroscience: “Our analysis shows a steady expansion of studies with evident social and policy implications, including studies of human cooperation and competition, brain differences in violent people and genetic influences on brain structure and function.” Complex behaviors and emotions—such as fear, lying, decision making, self-monitoring, moral dilemmas, and assessments of rewards and punishment—are all in play. So far, she suggests, society has given little thought to how these technologies and their volatile payloads will be used. - a lie detector small enough to fit in the eyeglasses of law enforcement officers, developed by mathematician Amir Lieberman at Nemesysco in Zuran, Israel, for military, insurance claim and law enforcement use say it can tell whether a passenger is a terrorist by analyzing his answer to that simple question in real-time. The heart of Nemesysco's security-oriented technology is a signal-processing engine that is said to use more than 8,000 algorithms each time it analyzes an incoming voice waveform.
Also see - The Truth Detector and Thoughts read' via brain scans

- Eliminate the use of student, staff and faculty SSNs wherever possible, because of identity theft which can lead to a egregious violation of student privacy."Many institutions are beginning to use institution-created unique ID numbers, but they are often only an alternative to using the SSN for many systems and forms.

- Can next-generation phone systems take the shape of decentralized, peer-to-peer file-sharing networks that run over the Net and eliminate phone-company middlemen? Skype is free and simple software that will enable you to make free calls anywhere in the world in minutes

- Anonymity could be replaced by Pseudonymity To preserve freedom Mr Lessig suggests it might become legal, for instance, to have credit cards for online transactions under different names, as long as these could still be traced to the individual owner. The challenge is to set the legal hurdles for online search warrants high enough so that governments cannot abuse their power. But at the same time to keep them low enough so that criminals can be found and stopped. In this respect, the online world should be no different from the real one.

- NSF Cyber Trust Program Carl Landwehr, Program Director, (703) 292-8950, clandweh@nsf.gov
CyberTrust Program
Deadlines for proposals are available for fundamental research, multi-disciplinary research and education and workforce development.
NSF Science Experts: Eugene Spafford, NSF Senior Advisor, (703) 292-8900, espaffor@nsf.gov

- Enabling Grids for E-science in Europe, aims to build the largest international grid infrastructure to date, operating in more than 70 institutions throughout Europe, providing 24-hour grid service and a computing capacity comparable to 20,000 of today's most powerful personal computers. The other is a distributed supercomputing project, led by France's National Center for Scientific Research, that will connect seven supercomputers in Europe at optical network speeds, getting a leg up on the TeraGrid project in the United States, which aims to connect the nation's major supercomputer sites. The goal is to establish Europe as one of the most dynamic and creative environment in the world to deploy grid-enabled infrastructures. source 10/11/03 COSM

- By 2003 anyone still clinging to the idea that the Internet is a public enterprise should forget it. That was a romantic notion in the good old days before 1996, when everything seemed possible. With nothing but a computer, a modem and a phone line, the smallest fry could compete with the biggest corporate dragons by reaching millions of people at little cost. Information and entertainment could flow freely. Closed and oppressive societies would be opened. The order of the day also was to avoid turning the Net into a public utility, subject to the kinds of rules and regulations that govern telephones and electricity. The Internet's global reach was one major reason; who would have jurisdiction? Government involvement also would squelch innovation and growth, people feared.

- TERAPROT project by CEA, Gene-It SA & INFOBIOGEN Contains the results of the all-by-all comparison of 67 proteome sets.

- Human Resources (HR) department plays in enterprise security. Securing a business is not just a technological matter--choosing the right firewall and other measures. Technology must be backed by sound policies to govern usage and maintenance. HR is responsible for the implementation of those policies, and creating a security culture backed by employee awareness. HR is responsible for the management and control of staff, and acts as a conduit of communication between departments. HR must also ensure the company complies with the latest legislation. Make "security best practices" part of employee contracts and staff training. Establishing firm security policies with a cycle of self-assessment to enable businesses to adapt to changing security demands.

- Sandia team develops cognitive Machines that accurately infer user intent, remember experiences and allow users to call upon simulated experts. A new type of "smart" machine that could fundamentally change how people interact with computers is on the not-too-distant horizon at the Department of Energy's Sandia National Laboratories. Over the past five years a team led by Sandia cognitive psychologist Chris Forsythe has been developing cognitive machines that accurately infer user intent, remember experiences with users and allow users to call upon simulated experts to help them analyze situations and make decisions. Article and contact

- Robotic Replacement of Human Workers

- Open Government Information Awareness <http://opengov.media.mit.edu/>
The Open Government Information Awareness program is an effort to increase transparency in the United States government. As the US government increases its supervision of civilian lives, it is crucial to ensure accountability. Since democracy requires an informed public, every effort must be made to give citizens access to government information. The Open Government Information Awareness program builds a framework for US citizens to construct and analyze the world's most comprehensive database on our government. Citizens will explore data, track events, find patterns, and build risk profiles, all in an effort to encourage action. To empower citizens by providing a single, comprehensive, easy-to-use repository of information on individuals, organizations, and corporations related to the government of the United States of America. To allow citizens to submit intelligence about government-related issues, while maintaining their anonymity. To allow members of the government a chance to participate in the process.

- "honeytokens" was coined on Feb. 21, 2003 by a programmer named Augusto Paes de Barros who used it in an e-mail message to a list of security professionals. Honeytokens are pieces of seemingly enticing information that have no useful value. Embedded in ways so that no innocent person should accidentally stumble upon them, honeytokens trigger alarms when viewed, grabbed or downloaded. For example, a bank could insert a fake credit card number into its files and then set up a program called a " sniffer" on the network that would send out an alarm if anyone touched that particular number.

- Cyber War, Cyber Terrorism
Terrorists, individual hackers and foreign governments exploit computer network vulnerabilities to disrupt the infrastructure of a country, known as weapons of mass disruption. No country can match the US in terms of conventional weapons so cyber-terrorism is the best way to do it. It's so cheap, don't need soldiers and tanks, and it is so stealthy. They use information technology to control critical government and private sector systems. Our enemy will attack the electric, water, and other critical infrastructure grids stopping service for at least 6 months and cause billions in damages by breaking through the weak and or non existent security on the software being used by those responsible for these public companies. They do not spend the money on the needed security and as a consequence knowing leave the country infrastructure defenseless. Congress has refused to vote to make this a regulation forcing them to do what they should, basically because they don't use computers don't "get" technology only "get" the old fashioned idea of war and leave it to the "war guys" to deal with. Companies like Microsoft who have billions in cash won't guarantee secure products - there are no lemon laws around for sloppy programs so . . . we are doomed to see the catastrophe occur followed by the congress dog and pony shown with their feigned surprise followed by the inevitably vote that finally regulates industry. MORE

- Computer Crime Research Center - Statistics Cyberattacks with Offline Damage
This interstitial area where cyberspace meets the real world is a ripe area of attack. This problem is the real-world equivalent of a distributed "denial of service" attack, in which the attacker gets computers around the world to inundate a target machine with data, messages and other electronic detritus that make it impossible for legitimate users to get through to it. Anyone can get a computer and bury someone in junk. Google shows hundreds of thousands of Web pages from which anyone could request a catalog, but instead could have a program tell it to send someone a million catalogs. This attack could be enormously disruptive to the target, and could paralyze the local post office that has to deal with the onslaught. As the report notes, the exploit could be used as a diversion to accompany a deadly terrorist act, like mailing an envelope containing anthrax spores. Some experts have talked about hypothetical, cyberattacks on real-world facilities that are connected to the Internet, like the power grid and dams. Other automated include automated orders for hundreds of maintenance requests, package pick-ups and service calls. -

- DRM technology and policy
There appear to be two extremes: the pro-copyright extremists and the anti-copyright extremists. What will happen with DRM protected data in 100 years from now? Is this what the Computer Grid Merger is actually for? Do they intend to control all data?
Don't you want future generations to be able to access then-historic documents? Otherwise all DRM protected documents, movies and films will be lost forever when the DRM technology is replaced by something " better". Librarians can still read and copy centuries old books today. Material which is copyrighted must enter the public domain when copyright expires. Material which is private must not. Right now DRM systems are not distinguishing these cases in any meaningful way. Happy Birthday is copyrighted.

- Usage Log Data Management Working Group
The usage logs generated by web servers contain much data that is useful for site owners, but the current default configurations can pose a threat to the privacy of individuals, and may also present a legal risk to corporations. Specifically, the IP addresses collected by web servers are becoming increasingly easy to associate with the identity of particular individuals. For corporations, this means that they may violate their own privacy policies by retaining portions of these logs. Left unmanaged, these logs can expose web site owners to potential lawsuits and discovery requests, and erode what privacy is left to individuals. But today, no standard policy exists to manage the retention and eventual destruction of usage log data, and no tools exist to enforce such policies. The goal of this all-day working group meeting is to develop a policy that organizations can use to govern their retention of usage log data, and a specification for a utility that will delete, hash, or aggregate usage log data according to this policy. This meeting is intended for legal, technical, policy, and business practitioners who are involved with the management of web usage log data, or web usage log tools. For further information, please contact Jeff Ubois (jeff@ubois.com) .

- Edsger Dijkstra quote on Computer Science
[From asilomar-news, noted by Robert G. Kennedy III in Hackers newsgroup,sent to RISKS by Ken Knowlton. PGN] Edsger W. Dijkstra, *Communications of the ACM*, Mar 2001, Vol. 44, No. 3
In academia, in industry, and in the commercial world, there is a widespread belief that computing science as such has been all but completed and that, consequently, computing has matured from a theoretical topic for the scientists to a practical issue for the engineers, the managers, and the entrepreneurs. [...]
I would therefore like to posit that computing's central challenge, "How not to make a mess of it," has not been met. On the contrary, most of our systems are much more complicated than can be considered healthy, and are too messy and chaotic to be used in comfort and confidence. The average customer of the computing industry has been served so poorly that he expects his system to crash all the time, and we witness a massive worldwide distribution of bug-ridden software for which we should be deeply ashamed.
For us scientists it is very tempting to blame the lack of education of the average engineer, the shortsightedness of the managers, and the malice of the entrepreneurs for this sorry state of affairs, but that won't do. You see, while we all know that unmastered complexity is at the root of the misery, we do not know what degree of simplicity can be obtained, nor to what extent the intrinsic complexity of the whole design has to show up in the interfaces. We simply do not know yet the limits of disentanglement. We do not know yet whether intrinsic intricacy can be distinguished from accidental intricacy.
To put it bluntly, we simply do not know yet what we should be talking about, ... The moral is that whether computing science is finished will primarily depend on our courage and our imagination.

- Move interaction with the computer from the hands to the mouth. The screen responds to the human voice in every way. Voice commands are responsible for every operation, no hand movements are necessary.

- Cyber security liability will involve insurance firms
to help manage business risk. Insurers will demand better security, perhaps spawning minimal security standards.

- Using Neural Networks To Beat Hackers: By combining the behavioral and computer sciences, D.C.-based startup Psynapse promises to lock out hackers before they can do any damage. Psynapse's Checkmate intrusion protection system conducts a real-time assessment of each visitor to a network, and if it sees behavior that indicates an attempted security breach, automatically terminates the intruder's access.

- TRACKING PEOPLE - the tech-art group 0100101110101101.org, started something like that with their VOBOS project. A combo of mobile phone/GPS sends the coordinates to a server. And the movement of the "kit" is traced on a map that can actually be very detailed (at a city/street level). http://0100101110101101.org/home/vopos/index.html

-"The human population does not double every 18 months, but its ability to use computers to keep track of us does. You can't encrypt your face." -- Phil Zimmermann; http://news.com.com/2100-1009-998728.html

- SMART MOBS - the nature of cooperation for good and not all smart mobs are going to be benevolent. How is it that humans come together to do things collectively, and how do those enterprises succeed and fail? That is an important aspect of how smart mobs can change the world, because people with these devices linked together instantaneously worldwide will be able to act collectively or not act collectively in new ways. the mobile communication device, and the Internet. Tens of millions of individuals will have computing power in their pockets, they will be linked together so that the aggregation of that computing power and the communications capabilities of the individuals will be multiplied similar to the way the Internet multiplies the capabilities of individuals who were sitting in front of PCs. Peer-to-peer sharing, for example, or peer-to-peer sharing of computing power as is done with SETI@home or Distributed.net.
Examples:
-- groups of individuals voluntarily creating something collectively that's much more powerful than what they could do individually
-- a crowd that mobilized and succeeds in toppling a government, organized with the endless forwarding of millions of text messages.
-- WTO protestors in Seattle, who used cell phones, PDAs, laptops, and the Internet to protest the meeting of the WTO in 1999. Using these, they were able to outsmart the police. Source http://www.thefeature.com/article.jsp?pageid=19666
-- Open Souce - great for collaboration between people who don't trust eash other

-- SWARMING example: Amber Alert system automatically post images of the child or suspect direct to the desktop. In addition, the application provides the capability of instantly printing out a poster featuring all the information about the missing child. You can download an actual application from the link below. Amber Alert Ticker The National Center for Missing & Exploited Children (NCMEC), the Digital Information Network will now provide instant and automatic Amber Alerts issued anywhere in the country. These Amber Alerts can be automatically or manually issued by our clients to hundreds of thousands of desktops within seconds of the alerts being issued. Be instantly notified of an Amber Alert on their desktops - but also receive vital information about the missing child, pictures of the child or suspect and a detailed written description of the individual law enforcement agencies are looking for http://dltw.tv/r.asp?i=303DA210-7968-471b-A4AB-C2ECF8BEEECF&b=Mark_Toney

- NANOTECHNOLOGY
Nanotechnology Portal with basics news & information. Covering the Nanospace and reporting on nanoscale & future sciences such as Molecular Machine Systems, Nanomedicine, & BioMEMS.

- THE FUTURE IS 802.11 WIRELESS NETWORKS

WIRELESS PARK
-
sponsored by Intel Wireless computing available anytime the park is open Bryant Park now is a WiFi "Hot Spot", bringing the internet FREE to users of laptops and handheld devices with 802.11b Ethernet cards. NYC Wireless, a volunteer community group of computer wizards, provided the expertise to make Bryant Park the first park in the world to offer 802.11b wireless computing to its patrons for free. Go wireless and do work while enjoying the park. How-to guides to get started are available at the park entrances.

COMMON-SENSE COMPUTING (AP/CNN.com 9 Jun 2002) http://www.cnn.com/2002/TECH/ptech/06/09/common.sense.computer.ap/index.html Computer scientists have been working with linguists, theologians, mathematicians and philosophers since 1984 in a project they hope will transform human existence -- teaching a computer common sense. The group has spent the last 18 years building the Cyc database, feeding it 1.4 million truths and generalities about daily life that they hope eventually will give computers supercharged reasoning abilities -- which could enable humans to work more efficiently, understand one another better, and even help predict the previously unforeseeable. This spring, Cyc's developer -- Cycorp Inc. -- created a Web link to enable the public to download Cyc's knowledge base and teach it a few things, too. Cycorp founder and president Doug Lenat says that if enough people log in to share their wisdom, Cyc could quickly become vastly more useful -- doing duty as an instant language translator, annotating e-mails to put them in better context for their recipients, or even offering humans advice from varying points of view. Inventor Ray Kurzweil thinks Lenat is taking the right approach toward educating Cyc, combining pattern recognition with a rule-based foundation. "We're not going to spoon-feed all of our knowledge one rule at a time. I do think we could take Cyc as the seed for a self-organizing system that would then learn on its own."

Photonic Networks
The idea of assembling a large number of smaller computers connected via a network (an idea which dates at least back to 1970 with the DCS project at UC Irvine (I was PI) may in the long run be a much more powerful way to get large scale computing. The advent of all photonic networks and the increasing power of micro-computers may make such dinosaurs out of conventional superccomputers.-- Dave Farber April 20, 2002

- Interplanetary Internet (IPN)
The future of this next-generation Net revolves quite literally around Mars: Vint Cerf 56, recently joined a small team of engineers at NASA's Jet Propulsion Laboratory to begin sketching out a wireless communications network that would let all those space-based machines and - eventually - astronauts talk to one another. He is using public and private missions aimed at Mars and other planets, the moon, asteroids, and deep space.

- Bell Labs Says It Shatters Data Delivery Record 2002
Bell Labs, the research arm of Lucent Technologies Inc. said on Friday that it has doubled the distance and the speed at which data can be sent over long-haul telecommunications networks. The development will eventually make it cheaper for telecommunications service providers to send more data on fiber optic networks over longer distances. Bell Labs said that, in a demonstration, it sent a massive 2.56 terabits of data per second over a distance of 2,500 miles, the equivalent of sending the contents of 2,560,000 novels every second across the United States. One terabit is a little over 1 trillion bits of data. The previous record was 1.6 terabits per second over 1,250 miles, or half the distance. Bell Labs achieved the 2.56 terabit-per-second speed by sending 40 gigabits-per-second of data over each of 64 separate channels in fiber optic cable, which uses light waves to carry data. It used dense wave division multiplexing, a technology that allows service providers to push bigger chunks of data onto a single strand of optical fiber. The capacity and distance improvement was made possible by use of a coding scheme called differential phase shift keying, which Bell Labs has developed for high-capacity communications. Lucent's current long distance networking product, the LambdaExtreme, cannot support the higher data speeds but a spokesperson said the Murray Hill, New Jersey based networking company will incorporate the improvements into future products.

Trends in Language
Bandwidth and data storage increases again and again, from kilobytes to megabytes to gigabytes. Language to describe these increasing metrics are as follows:

A kilobyte is actually 1024 bytes.
1 Gigabyte is over one billion bytes (1,000,000,000)
1 Terabyte is over one trillion bytes (1,000,000,000,000).
1 Petabyte: over 1,000,000,000,000,000 bytes
1 Exabyte: over 1,000,000,000,000,000,000 bytes
1 Zettabyte: over 1,000,000,000,000,000,000,000 bytes
1 Yottabyte: over 1,000,000,000,000,000,000,000,000 bytes

In perspective:
From Roy William's website at CalTech's Center for Advanced Computing Research

1 Megabyte: One small novel OR one 3.5 inch floppy disk

5 Megabytes: The complete works of Shakespeare OR 30 seconds of TV-quality video
1 Gigabyte:
A pickup truck filled with paper OR A symphony in high-fidelity sound OR A movie at TV quality
2 Gigabytes: 20 meters of shelved books OR A stack of 9-track tapes

20 Gigabytes: A good collection of the works of Beethoven

1 Terabyte: All the X-ray films in a large technological hospital OR 50,000
trees made into paper and printed
2 Terabytes: An academic research library
10 Terabytes: The printed collection of the US Library of Congress
1 Petabyte: 3 years of Earth Observing System satellite data (2001)
2 Petabytes: All US academic research libraries
200 Petabytes: All printed material
5 Exabytes: All words ever spoken by human beings.

- The Computer Museum History Center Website
Established in 1996, Preserves and presents the artifacts and stories of the Information Age. It is home to one of the largest collections of computing artifacts in the world, a collection comprising over 3,000 artifacts, 2,000 films and videotapes, 5,000 historical photographs, 2,000 linear feet of books and other cataloged documentation, and gigabytes of software.

The Distributed Knowledge Systems (DKS)
project at the Los Alamos National Laboratory in New Mexico Johan Bollen, Heylighen's former student built a Web server called the Principia Cybernetica Web that can continually rebuild the links between its pages to adapt them to users' needs. On the Principia Cybernetica Web, algorithms will reinforce popular links by displaying them prominently on the page, while rarely used links will diminish and die. It's the first step on the road to the global brain. The Principia Cybernetica Web will request feedback on whether a particular Web page is interesting or relevant to its users, and asking advice on the relative merits of different pages.

Smart cookies identifies users and keeps records of each user's routes through the site. "transivity" When a user moves from A to B and then to C, it will infer that C is probably of some relevance to A, and create a direct link between them.

The Turing Test, Researchers ask human testers to guess if they are communicating with a machine or a person. If the tester can't tell the difference, the machine is deemed intelligent. Norman Johnson who leads the Symbiotic Intelligence Project at Los Alamos says we already rely on the vast and incomprehensible mechanism that is society. Ask an ant how it finds food, and it won't be able to tell you. Ask most people how their television works and they are unlikely to give you more than the basics. We trust most organisations to deliver the things we want without understanding exactly how they do it, and we will be able to trust an intelligent Web in exactly the same way.
Johnson says: "We are finding successful Turing tests within a certain situation," "Take it out of that situation and it fails miserably, but within the right context you can't tell the difference." "Humans can act intelligently within many contexts," "But if you put all those abilities into one person they probably wouldn't be able to function." "That's why we have society: to mesh those intelligences together, creating a powerful sum." "Our premise is that systems can be much more intelligent than individuals" "You can have a very diverse group solving problems much better than an expert: that's why we have society and social insects."
On average, uninformed individuals take 34 steps to escape the maze; the second, informed, generation takes an average of only 12. As the number of individuals in the collective increases, the solution gets better and better. A worldwide network of people using interconnected computers should open up a kind of "collective memory" to add on to our individual brain power. Eventually there will be little distinction between people, computers and wires--everything combines to create one vast symbiotic intelligence.