Bookending innovation – the 50 years of technology between two great eras of change

In 1968, Stanley Kubrick’s cult classic, ‘2001: A Space Odyssey’ premiered to a world embracing technological change. As Kubrick tested the boundaries between past and future on the big screen, the world witnessed the launch of Apollo 7 on the small screen, as the first manned Apollo mission broadcast live from orbit. Later that year, Apollo 8 would enter the Moon’s orbit, and astronauts Frank Borman, Jim Lovell and William Anders would become the first humans to see the dark side of the Moon and take the now iconic ‘Earthrise’ photograph.

  • 6 years ago Posted in

The birth of modern technology

 

Much of the technology we take for granted today stems from this innovative period of time.  1968 also saw Robert Noyce and Gordon Moore launch pioneering semiconductor company, Intel, as well as the first large-scale test of RAND researcher, Paul Baran’s, distributed communications network ARPANET.  Originally intended for scientists and researchers who wanted to share computers remotely, ARPANET quickly turned into something far greater: the Internet.

 

Technology has come a long way over the last 50 years, but many of the complex and high-performing technologies we have now have their roots in the unprecedented changes of the late 1960s.

 

"When RAND researcher, Paul Baran, set out to design a more robust, redundancy-based communications network that would enable the military to communicate in the aftermath of a nuclear attack, he had no idea he was laying the foundation of the Internet we all know and love today.  Baran’s concept of separating information into packets before sending them out across a decentralised network of unmanned ‘switching’ nodes quickly led to the creation of a high-speed, digital framework for exchanging information we now call the Internet,” explains Todd Krautkremer, CMO at Cradlepoint. 

 

“50 years on and we are witnessing the birth of another networking revolution with 5G, which is poised to be as transformative as the Internet itself.  It has been less than a decade since 4G offered us wireless speeds of up to 100 megabits per second – the turning point for many data heavy technologies like music streaming and video conferencing.  In no time at all, LTE Advanced Pro will be able to deliver speeds up to 10 times faster.  5G will build on this to provide network latency in the single digit milliseconds, massive connectivity for IoT and significantly longer batter life.  5G will provide the foundation for software-defined infrastructure and carrier-edge computing, and just like 4G – and the Internet before that – it will act as the springboard for an abundance of fledgling technologies, including virtual reality, remote-controlled robotics, telemedicine and autonomous vehicles," continues Krautkremer.

 

A new era of innovation

 

In the last 50 years, technology advancements born out of 1960s innovation have changed the global landscape dramatically.  As developments in areas such as artificial intelligence (AI), big data and the Internet of Things (IoT) converge, we find ourselves at the beginning of a new era of innovation.

 

Phil White, CTO at Scale Computing, explains, “Innovation is the bread and butter of the technology industry – we are constantly evolving to bring new and improved ways to live and work.  Unsurprisingly, this drive for innovation has led to the industry looking remarkably different today than it did 50 years ago.  At the forefront of this have been major developments in AI, IoT and robotics.  For example, in 1968 we saw the first generation of the iconic Chevrolet Camaro Convertible, but today we are seeing the first generation of fully self-driven cars.  Similarly, in 1968, a modern data centre with primary storage consisting of racks and racks of tape drives wouldn’t even hold a candle to the computational power we all possess in our smartphones today.  Now we are starting to see micro data centres, powering edge computing, enabling smart cars and in the future smart cities to make more accurate and informed decisions. 

 

White continues, “It is important to remember that to achieve these awe-inspiring advances, huge innovations had to be made behind the scenes.  Data storage may be less glamorous than the self-driving car it enables, but without it these technology advances wouldn’t be possible.  Today IT has come a long way and virtually everyone is touched by it in some form.”

 

It’s all about the data

 

At its birth, the Internet was described as the “information superhighway.”  With a modern understanding of the power of data – this sentiment takes on a renewed importance.  Data has the power to change our understanding of fundamental human behaviour, and to unlock far greater insight into a range of business, economic and social areas.  

 

Neil Barton, CTO at WhereScape, explains how data is transforming modern decision-making.  He says, "Fifty years ago, many business decisions were made simply with a calculator to add up income and subtract costs.  Today, however, a greater depth and breadth of data available has made decision-making more complex and the time it takes to gather, sort and analyse data for insight more critical to achieving a competitive edge.  Using manual methods to gather and work with the data required for actionable business analysis would take months of effort and just isn't practical in today’s real-time, instantaneous world.  It would leave you nailing the ‘closed’ sign on your business doors faster than you could say ‘calculator.’”

 

"Fortunately automation software now enables IT teams to intelligently automate the gathering of data and dramatically speed up the time it takes to derive business value from it.  Automating the process of data gathering can drive real business benefits and provide a flexible, template approach to personalisation for every business' unique decision-making requirements and data landscape.  So fifty years later, while more data availability has evolved and added perhaps greater complexity to decision-making, so have the tools that support our ability to leverage the data to our fullest advantage," Barton concludes.

 

Privacy – the new battleground

 

Technology advancements have driven the creation, exchange and use of data in every aspect of life.  Now, 2.5 quintillian bytes of new data are created every day, and the rate of growth is poised to increase exponentially over the coming years.  As the world begins to realise not only the power, but also the risks inherent in widespread data sharing, technology is also shaping our concept of privacy.       

 

Joseph Feiman, chief strategy officer at WhiteHat Security, explains, “Fifty years ago, we believed that our privacy was a given right: “My home is my fortress, with all documents that I keep in it!”  Fifty years later, we can see that the fortress is sitting on sand, semi-ruined and defenceless.  Growing desperate, we came to a conclusion that security technologies would protect our privacy: our personal data, most specifically.  We expected that data encryption, data masking and data tokenisation, network firewalls, web applications firewalls, passwords and IDs will re-build our ‘privacy fortress.’  These expectations are dangerous and naïve.  No technology, alone or in combination with other ones, will enable our privacy the way it was 50 years go.  The amount of manually and automatically generated data is increasing with a speed that no technology is able to encompass.  The combination of all of the above-mentioned security technologies has already failed to protect us.  We should have no expectations for a more-comprehensive protection by technologies. 

 

Feiman explains that the real solution is not technological, but cultural.  He says, “Within the next five years, government organisations and enterprises will realise that they are unable to protect all, ever-growing volumes of data, and will begin releasing them into open (or-semi open) access, making it available to everyone, to most/all people.  This will perfectly coincide with the growing openness of the modern society, where people share, with known and unknown people, the information that they would have never shared 5, 10, … 50 years ago.  They share it via Facebook and Twitter, postings on websites, blogs and social and professional Internet communities.” 

 

“Does the government have to protect an individual’s address, if the individual has already shared it via social media?  Does the healthcare organisation have to protect a terminal medical diagnosis, when the individual has already shared it among Internet social-group members?  That kind of already generally available information will constitute about 75 per cent of all personal information.  Relieved from the necessity to protect it, governments and enterprises will focus on protecting the remaining 25 per cent.  In that case, their chances to protect it will rise high enough.  We have been welcoming an open society.  So, we have it: society with lack of privacy.  Only culture, not technology, will help us live in it happily,” concludes Feiman.

The technology behind data protection

 

Garry McCracken, VP of Technology Partnerships at WinMagic, explains why encryption has taken on such importance in our modern age of data.  He says, “Encryption in one form or another has been around for thousands of years.  Cryptography does not require computers, but it is really only in the last 50 years because of computers that encryption has come of age.  During this time we have gone from encryption being used in mostly military and national security applications to almost every aspect of life.” 

 

“The Internet was one of the main drivers for the need for encryption.  Widespread access and use of the Internet, first for commercial transactions and then social networking, meant data was suddenly put at risk.  Protecting data with standards such as the Data Encryption Standard (DES) in the 70s was a good start but advances in computer power, as predicted by Moore's law, meant something much more secure was needed long term.  After a competition run by the US National Security Agency (NSA) the commercial world settled on Advanced Encryption Standard (AES) for bulk encryption for the Internet.  However, all that data in motion travelling around on the Internet eventually comes to rest on a laptop, phone, server or in the cloud, so the need to protect data at rest has grown too.  FDE (Full Disk Encryption) with AES is now pretty much standard for protecting data at rest, but even that is not the full story.  The Cloud – born out of the Internet – is allowing your data to be processed on other people’s computers,” continues McCracken.

 

As the volume of data being created and shared across various locations and devices increases every day, McCracken concludes that data 'in use' is “the next big problem to solve in the coming years.”

 

 

 

 

By Andy Mills, VP of EMEA, Cequence Security.
By Paul Birkett, VP Strategic Portfolio Management at Ricoh Europe.
By Liz Centoni, Chief Customer Experience Officer, Cisco.
By Lars Rensing, CEO of Protokol, DPP Solution Provider .
The IT world is moving faster than it has ever been. As a manufacturer, the only way to compete and...