Author:- Stephen Harrison, B.Sc., M.Sc., MBCS, CITP, MInstM
Sharing over 20 years of IT experience with you 
More about me here

2010s Computer History
"I'm Just Another Guy" - Ed Snowden, June 9th 2013

2010s computer history is packed with rapid technological advancement, and of course, some controversy. The last decade has seen radical changes in the way we interact with computing technology.

Remember the Raspberry Pi Computer? (Opens New Window). This little device, which was six years in development, was released at its lowest cost of just £22, for the first time in February 2012.

Based on the LINUX operating system, the UK Government and supporters wanted the machine to help improve the level of programming skills amongst UK children.

This is just one example of major computing events that has occurred throughout this decade. The aim of this section is to delve deeper into some of these momentous events.


The Raspberry Pi (2012) with ports for a monitor, keyboard, and an RJ45 jack for network connectivity2010s Computer History
The Raspberry Pi (2012)
Source:- phys.org

Attention!

Just to let you know there are computer related adverts, or adverts personal to you, on this page that you may find useful

They help with the running of my site

If you are running an Ad Block and wish to see them, you can whitelist my site

Thank you for your time



2010s Computer History Milestone | The Apple iPad

The Apple iPad mobile device is still one of the most popular tablets in the world. Even the Business market is buying in to Apple mobile technology.

In the technology world these landmark advancements do not appear out of nowhere. They tend to evolve, through trial and error, with lots of mishaps along the way.

The Apple iPad Revolution (Opens New Window) article describes rise to fame of this device, starting in 2010 with the release of the first generation iPad.


Three Generations of the Apple iPad released though the 2010's under Steve Jobs2010s Computer History
Three Generations of the Apple iPad
Source:- CNet.com

The article also covers some IT Industries early efforts at mobile computing, including Tablet PC's and the Personal Digital Assistants (PDA's). In fact, the notion of mobile computing goes back over 40 years to 1968!

Return to the Table of Contents



Hardware and Software Vulnerabilities

The sophisticated exploitation of software vulnerabilities defines the underbelly of 2010s computer history. Despite all the good advances we have seen such as Artificial Intelligence, Robotics and Wearable technologies for improving healthcare, criminality became very much an online event.

In 2018 the world was made aware of two new and serious vulnerabilities, called Meltdown and Spectre. These were specifically hardware-related vulnerabilities in the majority of Intel Processors since 1995. Think of the millions of devices affected!

Meltdown would basically allow malware to read the data of running software programs and the operating system in the system memory, or RAM. From here, passwords and sensitive data could be copied, or locked, and held to ransom.

Spectre would basically allow malware to trick computer applications into leaking their data. This is because the secure isolation between running applications is flawed. 


2010s Computer History
Meltdown (Shield) and Spectre (Ghost) Logos
Source:- malwarebytes.com/

The majority of world software providers issued security patches for Meltdown and Spectre.

However, with the vulnerabilities present in critical business infrastructure, organising the downtime to apply security patches is often a difficult task.

In my 20+ years of experience, convincing decision makers that taking a critical system offline, without any noticeable benefit to the business when services are resumed, is a difficult task.

I expect the 2020s not to be any different despite the warning and events of the 2010s.


Return to the Table of Contents



Cyber Attacks

We cannot discuss this era without mentioning cyberattacks. The decade is remembered for events such as the Stuxnet and Wannacry attacks.

Stuxnet was first discovered in early 2010 and was responsible for causing considerable damage to Iran's nuclear programme.

The worm or malicious code targeted Supervisory Control and Data Acquisition System (SCADA) and Programmable Logic Controllers (PLC) used in industries such as the nuclear industry to control machinery and the deployment of gasses.

Stuxnet is a malicious computer worm that replicates itself on to other computers once it has infiltrated a computer network. Once it was able to influence the SCADA and PLC devices, Iran's enriched uranium was effectively destroyed, putting their nuclear programme back years. 


Part of The Flame Toolkit Code Used to Launch The Stuxnet Worm. Not surprisingly the secrecy surrounding such code makes it difficult to evidence2010s Computer History
Part of The Flame Toolkit Code Used to Launch The Stuxnet Worm
Source:- voanews.com/

Zero-day attack worms like Stuxnet are difficult to stop. Generally all computers in an organization need to be shut down immediately to prevent further spread. This is where the damage is done.

From here the vulnerability in the software that the worm is exploiting needs to be patched, coupled with an update from anti-virus companies to detect and nullify further threats from the worm in the future.

It is understood Stuxnet was developed by the United States and Israel, using a sophisticated espionage toolkit called Flame, and was targeted specifically an Iran's nuclear industry.

These types of attacks in the 2010s became known as cyber warfare, and the malicious code itself known as a cyber weapon.  

It is expected this type of warfare will continue in to the 2020s and beyond, and will no doubt become more sophisticated as time goes on.




Seven years later the world was subject to another major cyberattack. In May 2017 the Wannacry ransomware attack devastated the National Health Service (NHS) in the UK, and other major organizations around the world.

Another zero-day even, Wannacry (Opens New Window)  was developed as ransomware to extort money in the form of Bitcoin by the cyber criminals behind the attack.

The developers exploited software vulnerabilities in Microsoft's Operating Systems, named Eternalblue and DoublePulsar. These vulnerabilities are alleged to have been stockpiled by the NSA. However, because cyber criminals acquired knowledge about the vulnerabilities, the NSA informed Microsoft, who issued a patch before the Wannacry event.


The Wannacry Ransomware Attack Message Displayed on Infected Devices2010s Computer History
The Wannacry Ransomware Attack Message Displayed on Infected Devices

A lot of organizations are not efficient at applying security patches, and therefore ransomware such as Wannacry can easily exploit these flaws to the financial gain of the cyber criminals.

This is another example of what I think is to come throughout the next decade and beyond.

Return to the Table of Contents



Edward Snowden

Ed Snowden in the notorious U.S. whistleblower who worked for the Central Intelligence Agency (CIA) and leaked highly classified information from the National Security Agency (NSA) in June 2013.

The data included detailed knowledge about global surveillance programs, including covert access into private citizen e-mail and instant messaging accounts by U.S. authorities, and  citizen mobile phone location data, to name but a few.

The U.S. authorities were quick to issue a warrant for Snowden's arrest, but he eventually fled to Russia. From a government perspective, what Snowden did put a lot of undercover agents lives at risk.

From Snowden's perspective, he sees what he did as his civic duty, as citizen's should have a right to know when their governments and people in power are up to, and how their private data, is actually not private.

Where do you sit in the debate?

Edward Snowden - The CIA Whistleblower2010s Computer History
Ed Snowden - The CIA Whistleblower
Source:- wikipedia.org

From Facebook and Cambridge Analytica's alleged manipulation of data to influence elections and referendums in the late 2010s, to the 11.5 m leaked Panama papers from the offshore law firm Mossack Fonsecra that outed rich individuals tax avoidance schemes, whistleblowing in a connected digital world is likely set to continue in the coming decades.

Return to the Table of Contents



Silk Road

Silkroad was an online black market site only accessible on the Dark Web through a TOR, or The Onion Ring, Web Browser.

The Dark Web has no jurisdiction and this enabled the founder, Ross Ulbricht, to set up the site in February 2011.

The site mainly sold illegal drugs, which accounted for 70% of the total trade. Other illegal products included fake drivers licences. Over an estimated 2 years period, Silk Road made over 1.2 m transactions and collected over  9.5 m bitcoins, or $1.2bn in revenue.


A Screenshot of Silk Road on the Dark Web Selling Illegal Substances2010s Computer History
A Screenshot of Silk Road on the Dark Web
Source:- medium.com

In October 2013, the Federal Bureau of Investigation (FBI) seized and shut down the site. Its founder was arrested and ultimately sentenced to life in prison without parole for his crimes on the 29th May 2015.


The Message Greeting Silk Road Visitors After It Was Seized By The FBI2010s Computer History
The Message Greeting Silk Road Visitors After It Was Seized By The FBI
Source:- wikipedia.org

Silk Road is just one of many sites on the Dark Web, including Black Market Reload, which sold illegal drugs and other illegal merchandise such as stolen credit cards and firearms. 

It will come as no surprise after Silk Road collapsed, the owner of Black Market /reload shut down their site.


Black Market Reload Logo - Notice The Dark Web URL - Looks Different To What You Are Used To2010s Computer History
Black Market Reload Logo - Notice The Dark Web URL - Looks Different To Normal
Source:- wikipedia.org

The Dark Web is likely to remain constant as a hotbed of illegal activity in to the next decade, and potentially beyond. This is despite the increase in law enforcement combing the Dark Web and targeting the shutdown of illegal activity.

Return to the Table of Contents



DeepMind Artificial Intelligence

Founded in September 2010, DeepMind Technologies develops Artificial Intelligence (AI) systems to "solve problems and advance scientific discover for all".

AI is basically an artificial neural network that aims to mimic human short-term memory. Based on machine learning, early successes included the AlphaGo program that beat a European Go Champion in October 2015.

Following DeepMind's gaming successes, it turned its attention to more serious issues, such as solving the problem of protein folding in 2016. This is an incredibly difficult problem to solve in science, but the evidence suggests DeepMind is making good progress understanding this issue as the 2010s came to an end. 


2010s Computer History
DeepMind Logo
Source:- venturebeat.com

The quality AI can bring to people's health and well being, such as supporting clinicians in diagnosing Radiology scans, there are still issues the need to be addressed, including data security, and ultimate control over AI automation.

Return to the Table of Contents



Windows 10

Microsoft Windows 10 was made available to the public on the 29th July 2015. It superseded the ill fated Windows 8, released in 2013.

Windows 10 succeeded where Windows 8 failed in delivering a consistent user experience across different devices classes i.e. desktop PC, Laptops and Tablets.

The Operating System's security was also improved, including improvements to biometric authentication through the Windows Hello platform. Microsoft Edge was also introduced as the successor to Internet Explorer.

Other features in the new operating system includes Cortana, Microsoft's equivalent to Apple's Siri, and improved parental controls.

In a change to previous operating systems, Microsoft release feature updates every six months.

Microsoft tends to release new operating system every 10 years. Windows 10 mainstream support ending on the 9th January 2024.


Microsoft Windows 10 Graphical User Interface (GUI)2010s Computer History
Microsoft Windows 10 Graphical User Interface (GUI)

Return to the Table of Contents



2010s Computer History | Final Thoughts

2010s computer history is packed with an eclectic mix of impressive technological advancements, coupled with some serious issues that impacted human society throughout the decade.

Google Glass, Streaming TV, Wireless Air Pods, Virtual Reality Headsets, Internet of Things, Big Data, Cryptocurrencies, the list of new technologies is endless.

The video below is a review of the best new technology released in the 2010s.

Having lived though the 2010s in a technical leadership position, I can honestly say the changes I have witnessed have, overall, been for the betterment of human society. I am looking forward to what the next decade brings.

For more information on computing events, take a look at Computer Hop's history section (Opens New Window).

What a decade for technology!




You Are Here:-
  1. Computer Help
  2.  ›
  3. 2010's Computer History




Top Trending Related Articles


Return to the Table of Contents