If we have a good look at the two words information and technology, they two belong to two separate parts of are modern world. Though they represent two different parts of our world, their integration has been the important corner stone in development of are age. As we are in the “Information age”, we see information is available freely everywhere. Social networking has grown into a humongous monster that has feasted upon the information provided by individual or organizations. With the ever growing population everyone wants to share information and get connected with people around the world. When we deal with information we look at three basic underlying pillars availability, integrity and confidentiality. To increase the amount of information available on the internet and so that a larger amount of data can be accessed by an individual there are major developments that are taking place. It is noted that computers which are connected to the internet using the addressing scheme IPv4, each computer in the internet is capable of reaching up to 4.3 billion other computers. Although IPv4’s 4.3 billion unique addresses, it is forecast that by 2011, the address space will be exhausted. A new format called IPv6 is slowly replacing IPv4 in some countries. IPv6 has the capability to address 2128 computers. It is the known fact that in the period of five year’s all major country will follow the IPv6 address format which will assure the availability of information worldwide. Most networks have a firewall, many have an IDS, all of them have antivirus , anti spam and some have an IPS. But none of the vendors are making it easier to combine and manage all of these technologies into a unified whole. With development of various IDS correlating with each other the concept of HIDS (host intrusion detection system) and NIDS (network intrusion detection system) functioning separately will dissolve. Imagine a scenario - an administrator is paged from the console. He or she quickly gets access to the machine only to learn that Mary’s computer in the head office has sent an alert - several of his system files have been modified. The console also presents the administrator with summaries and graphs of recent traffic reported by Mary’s HIDS, as well as those on the head office network. An attacker has scanned the entire network looking for susceptible machines, found one with Mary and exploited the hole in an outdated HTTP server that was left running. Even worse, Mary’s machine has reported a lot of outgoing traffic directed at one particular external machine. The console’s analysis has labeled this anomalous behavior as a potential DoS attack. Now our administrator has a report of what happened exploit - scan and successful attack, why it happened - HTTP server is outdated, and the results - corrupted system files and malicious out-bound traffic. The administrator can quickly review the client configurations which are readily available at the console due to the recurring scans taking place, learn that no other machines have the vulnerable server in place and proceed to cleaning up Mary’s machine. So that this situating become real it is essential that the console will need to communicate with multiple pieces of the network architecture: firewalls, routers, switches and even different ID systems. This development will need a collaborative effort from fields like AI and ubiquitous computing.
Not only the field of information assurance and integrity has come a long way but also authentication of information has seen some major development. Mechanism of authentication has evolved Biometrics itself has evolved from finger print analysis to typing speed detection. What we can expect to be implemented in future is fully automated biometric system in airport where travelers will instead simply pass through an automatic gate that will instantly verify their identity and security risk. UK is one of the first countries to under take the initiative to implement this technology. We also can expect biometric technologies like body shape recognition, full internal organ structure detection, analysis of face and head vibration during talking and analysis of other electrical and magnetic fields, created by man’s body or of its reactions to such fields. Technology has enhanced itself with attributes of mobility, portability, sleek and stylish. Stationary desktop computer are replaced with light weight, portable laptop. Even the laptop has lost its charm with the tablet and smart phones. Next five years the cell phone will evolve into a fully developed computer that fits into your pocket. New trends in mobile application could be money transfer where we can transfer money through SMS. Mobile advertising is also something which will catch up by 2015 when the reach of internet will increase more than the reach of television. Mobile web browsing capability is expanding rapidly in an effort to display sites in a manner similar to a PC. This includes complete audio and video, dynamic content, support for advanced technologies such as Ajax, Flash and faster page load times.
GPS technology will also be some thing to watch out for. Garmin & TomTom are developing a car GPS unit that will not only give warnings about impending danger coming your way, but also try to link to steering mechanism and guide the driver to safety. Traffic pattern detection and also suggesting alternatives, improvement in Bluetooth compatibility few states have now accepted usage of cell phones with Bluetooth hands-free devices while driving, so the future GPS devices will help you in synchronizing with your cell phone and making calls with Bluetooth hands-free devices effortlessly. There are many more innovative technologies that will hit the IT industry in the near future. They all will make are life a lot simpler, interesting and adventures. The fields which will see a large amount of technological change will be Artificial Intelligence, Social Networking, Cloud Computing, Animation, Cellular Technologies to name a few. The microprocessor becomes the heart of every machine grating it the capability to think and react. Every major organization is into engineering a future driven with state of the art technologies. This will create a holistic experience for the consumer.
It is difficult to judge the future of technology with loads of innovative minds put to work but it will be full of fun filled surprises.
No comments:
Post a Comment