My 2014 predictions are finally complete. If Open Source equals collaboration or credibility, 2013 has been nothing short of spectacular. As an eternal optimist, I believe 2014 will be even better:
- Big data’s biggest play will be in meatspace, not cyberspace. There is just so much data we produce and give away, great opportunity for analytics in the real world.
- Privacy and security will become ever more important, particularly using Open Source, not closed. Paradoxically, this is actually good news as Open Source shows us again, transparency wins and just as we see in biological systems, the most robust mechanisms do so with fewer secrets than we think.
- The rise of “fog” computing as a consequence of the Internet of Things (IoT) will unfortunately be driven by fashion for now (wearable computers), it will make us think again what have we done to give up our data and start reading #1 and #2 above with a different and more open mind. Again!
- Virtualization will enter the biggest year yet in networking. Just like the hypervisor rode Moore’s Law in server virtualization and found a neat application in #2 above, a different breed of projects like OpenDaylight will emerge. But the drama is a bit more challenging because the network scales very differently than CPU and memory, it is a much more challenging problem. Thus, networking vendors embracing Open Source may fare well.
- Those that didn’t quite “get” Open Source as the ultimate development model will re-discover it as Inner Source (ACM, April 1999), as the only long-term viable development model. Or so they think, as the glamor of new-style Open Source projects (OpenStack, OpenDaylight, AllSeen) with big budgets, big marketing, big drama, may in fact be too seductive. Only those that truly understand the two key things that make an Open Source project successful will endure.
- AI recently morphed will make a comeback, not just robotics, but something different AI did not anticipate a generation ago, something one calls cognitive computing, perhaps indeed the third era in computing! The story of Watson going beyond obliterating Jeopardy contestants, looking to open up and find commercial applications, is a truly remarkable thing to observe in our lifespan. This may in fact be a much more noble use of big data analytics (and other key Open Source projects) than #1 above. But can it exist without it?
- Finally, Gen Z developers discover Open Source and embrace it just like their Millennials (Gen Y) predecessors. The level of sophistication and interaction rises and projects ranging from Bitcoin to qCraft become intriguing, presenting a different kind of challenge. More importantly, the previous generation can now begin to relax knowing the gap is closing, the ultimate development model is in good hands, and can begin to give back more than ever before. Ah, the beauty of Open Source…
Tags: ai, AllSeen, big data analytics, Cloud Computing, cognitive computing, cyberspace, Fog computing, hypervisor, Inner Source, internet of things, IoT, meatspace, NFV, Open, open source, opendaylight, OpenStack, privacy, qCraft, robotics, SDN, security, transparency, virtualization
We are currently in Cybersecurity month here in the United States, which is to say that our country is trying to raise our awareness in regard to our virtual protection.
So, Cyber Security? What is security for cyberspace…? It’s difficult at times to think of an imaginary border that protects networks, computers, programs and data from attack, damage or unauthorized access. Unauthorized access… so hacking? Yes, but more devious with results that could even lead to injury or death of our population.
Imagine what would happen if, all of a sudden, one of our major cyber systems were “hacked”… What does that mean for us? Think. Just about our whole existence revolves around cyberspace. That’s right, systems operate virtually to be able to manage simple things like pay roll all the way to complex things like flight plans, take-off and landing. Cyberspace is where your Facebook lives, Twitter, personal email accounts, and all of your personal finance information. Has your account ever been hacked by a friend posting a funny blurb on your account? Or has your identity been stolen by a hacker? With technology becoming an extension of ourselves, it’s just important to protect ourselves. Let’s not create an episode of J.J. Abrams “Revolution” if we can avoid it…
What can we do about it? That’s the point of this month is for “us”… yes, us plain ole citizens, to be more proactive in protecting ourselves, our communities, and ultimately our country.
This is what the Department of Homeland Security says about how we can start protecting ourselves:
“Americans can follow simple steps to keep themselves, their personal assets, and private information safe online. Here are a few tips all Internet users can do to practice cyber security during National Cybersecurity Awareness Month (NCSAM) and throughout the year:
- Set strong passwords and don’t share them with anyone.
- Keep your operating system, browser, and other critical software optimized by installing updates.
- Maintain an open dialogue with your family, friends, and community about Internet safety.
- Limit the amount of personal information you post online and use privacy settings to avoid sharing information widely.
- Be cautious about what you receive or read online – if it sounds too good to be true, it probably is.”
Here is a glance at Cisco’s part in cybersecurity.
Check out this blog by Chris Coleman titled “The Virtual Maginot Line” and also be looking for blogs by other members of Cisco that are revolving around Cybersecurity month.
This is very simple. We have roughly 2 weeks left in this month. Let’s all do our part.
To learn more about the strategies mentioned in the video, visit OnGuardOnline.gov and DHS.gov/Cybersecurity.
Tags: Cisco, cybersecurity, cyberspace, government, Homeland Security, national cybersecurity awareness month, technology
I’ve had some recent discussions with colleagues in the armed forces regarding cyber security and how they consider “cyber” to be the fourth warfighting domain along with land, air, and sea. They describe how cyber has its own terrain made up of computing resources. As I further thought through this concept I saw a striking resemblance between the network and air warfare. To elaborate on this thought I must first set the context around the concept of air supremacy.
There are probably many different variations of the definition of air supremacy but let’s just use “the degree of air superiority wherein the opposing air force is incapable of effective interference” for the purpose of this blog. I borrowed this definition from NATO. There are two key words in the definition, “degree” and “effective.” Prior to achieving supremacy one must first move from parity, through superiority to eventually supremacy. Air parity is the lowest degree in which a force can control the skies above friendly units. In other words, prevention of opposing air assets from overwhelming land, air, and sea units. Read More »
Tags: application visibility control, cyber security, cyber space, cybersecurity, cyberspace, Flexible NetFlow, IP SLA, malicious threats, netflow, network as a sensor, network superiority