By A.Arputha Selvaraj APMP IIM CALCUTTA
“Combining social and mobile-- there is a new wave of opportunities coming up,
a growth of users, so mobile internet is clearly the next major computing cycle.”
-- Ram Shriram, founding board member of Google
Using cell phones on a mobile network is increasingly popular
In the future, internet will be global and wireless. Information will be at our
fingertips within seconds
Mobile Computing:TheWay of the
Future
Computers will be able to give us
information through gestural or more
organic means
We will be able to get information no matter
where we are
Majority of information will be delivered
before we even have to ask for it or send it
Homogenized culture… knowing people
before you even meet them, equal access to
information to everyone
Technology as a Sixth Sense
RFIDTagging
(Radio frequency Identification)
• RFIDs are small, easy to manufacture transponders that can be made as small as a
grain of sand
• Companies like Abercrombie and Fitch are already starting to experiment with this
technology to track inventory
• RFID tags could be implanted into anything, from a sweater to a box of cookies
• handheld smart phones interact with RFIDs
• Smart phones would make spontaneous networks between other nearby phones,
and gather information about whatever object the transponder is tagging
Technology
Arduino Chips
• Make objects ‘smart’
• Small, easy to make computing chips
• A man has programmed one so that his chair puts a tweet on twitter whenever it
senses noxious gases
• Mean we are delivered information before we even have to look for it
Technology cont…
• Projected Displays
• Wearable computer systems that turn almost
any surface into interactive display screen
•Develops a sixth sense through technology
Homogenization of culture… unity and acceptance of all walks of life
Privacy issues  as information becomes more available, controlling who sees
it will become more difficult
‘Online’ identities will be controlled through one online profile or email account
(like OpenID)
• If hacked, this could have disastrous consequences
Implications
How will we censor information? How will we control it?
Identity theft will be a major concern
• Quantum computers will replace today's computers, having the ability to break
encrypted code in seconds
•  today's computers would take 20 years to break same code
• Biometrics (finger prints, iris scan, voice recognition) will be highly used to identify
individuals
• DNA theft= theft of the future
• Even pacemakers could be hacked in future
Implications cont…
Make a ‘fake’ website that is a news website from the year 2050
Have an article special on online hackers and how to protect identity
This will be a good platform to introduce tagging, face-recognition, and other
technologies of the future
Information contained in articles, video (mock interviews), and possibly some
interactive content as a mock guide on how to better regulate privacy settings
and prevent identity theft
Project Concept
Email me : arputhaselvaraj@gmail.com
Thanks

Social Networking 2050

  • 1.
    By A.Arputha SelvarajAPMP IIM CALCUTTA
  • 2.
    “Combining social andmobile-- there is a new wave of opportunities coming up, a growth of users, so mobile internet is clearly the next major computing cycle.” -- Ram Shriram, founding board member of Google Using cell phones on a mobile network is increasingly popular In the future, internet will be global and wireless. Information will be at our fingertips within seconds Mobile Computing:TheWay of the Future
  • 3.
    Computers will beable to give us information through gestural or more organic means We will be able to get information no matter where we are Majority of information will be delivered before we even have to ask for it or send it Homogenized culture… knowing people before you even meet them, equal access to information to everyone Technology as a Sixth Sense
  • 4.
    RFIDTagging (Radio frequency Identification) •RFIDs are small, easy to manufacture transponders that can be made as small as a grain of sand • Companies like Abercrombie and Fitch are already starting to experiment with this technology to track inventory • RFID tags could be implanted into anything, from a sweater to a box of cookies • handheld smart phones interact with RFIDs • Smart phones would make spontaneous networks between other nearby phones, and gather information about whatever object the transponder is tagging Technology
  • 5.
    Arduino Chips • Makeobjects ‘smart’ • Small, easy to make computing chips • A man has programmed one so that his chair puts a tweet on twitter whenever it senses noxious gases • Mean we are delivered information before we even have to look for it Technology cont… • Projected Displays • Wearable computer systems that turn almost any surface into interactive display screen •Develops a sixth sense through technology
  • 6.
    Homogenization of culture…unity and acceptance of all walks of life Privacy issues  as information becomes more available, controlling who sees it will become more difficult ‘Online’ identities will be controlled through one online profile or email account (like OpenID) • If hacked, this could have disastrous consequences Implications
  • 7.
    How will wecensor information? How will we control it? Identity theft will be a major concern • Quantum computers will replace today's computers, having the ability to break encrypted code in seconds •  today's computers would take 20 years to break same code • Biometrics (finger prints, iris scan, voice recognition) will be highly used to identify individuals • DNA theft= theft of the future • Even pacemakers could be hacked in future Implications cont…
  • 8.
    Make a ‘fake’website that is a news website from the year 2050 Have an article special on online hackers and how to protect identity This will be a good platform to introduce tagging, face-recognition, and other technologies of the future Information contained in articles, video (mock interviews), and possibly some interactive content as a mock guide on how to better regulate privacy settings and prevent identity theft Project Concept
  • 10.
    Email me :arputhaselvaraj@gmail.com Thanks