2010s computer history is packed with rapid technological advancement, and of course, some controversy. The last decade has seen radical changes in the way we interact with computing technology.
Based on the LINUX operating system, the UK Government and supporters wanted the machine to help improve the level of programming skills amongst UK children.
This is just one example of major computing events that has occurred throughout this decade. The aim of this section is to delve deeper into some of these momentous events.
The Apple iPad mobile device is still one of the most popular tablets in the world. Even the Business market is buying in to Apple mobile technology.
In the technology world these landmark advancements do not appear out of nowhere. They tend to evolve, through trial and error, with lots of mishaps along the way.
The Apple iPad Revolution (Opens New Window) article describes rise to fame of this device, starting in 2010 with the release of the first generation iPad.
The article also covers some IT Industries early efforts at mobile computing, including Tablet PC's and the Personal Digital Assistants (PDA's). In fact, the notion of mobile computing goes back over 40 years to 1968!
The sophisticated exploitation of software vulnerabilities defines the underbelly of 2010s computer history. Despite all the good advances we have seen such as Artificial Intelligence, Robotics and Wearable technologies for improving healthcare, criminality became very much an online event.
In 2018, the world was made aware of two new and serious vulnerabilities, called Meltdown and Spectre. These were specifically hardware-related vulnerabilities in the majority of Intel Processors since 1995. Think of the millions of devices affected!
Meltdown would basically allow malware to read the data of running software programs and the operating system in the system memory, or RAM. From here, passwords and sensitive data could be copied, or locked, and held to ransom. Multi-Factor Authentication is a must if available to help protect online accounts.
Spectre would basically allow malware to trick computer applications into leaking their data. This is because the secure isolation between running applications is flawed.
The majority of world software providers issued security patches for Meltdown and Spectre.
However, with the vulnerabilities present in critical business infrastructure, organizing the downtime to apply security patches is often a difficult task.
In my 20+ years of experience, convincing decision makers that taking a critical system offline, without any noticeable benefit to the business when services are resumed, is a difficult task.
I expect the 2020s not to be any different despite the warning and events of the 2010s.
We cannot discuss this era without mentioning cyberattacks. The decade is remembered for events such as the Stuxnet and Wannacry attacks.
Stuxnet was first discovered in early 2010 and was responsible for causing considerable damage to Iran's nuclear programme.
The worm or malicious code targeted Supervisory Control and Data Acquisition System (SCADA) and Programmable Logic Controllers (PLC) used in industries such as the nuclear industry to control machinery and the deployment of gasses.
Stuxnet is a malicious computer worm that replicates itself on to other computers once it has infiltrated a computer network. Once it could influence the SCADA and PLC devices, Iran's enriched uranium was effectively destroyed, putting their nuclear programme back years.
Zero-day attack worms like Stuxnet are difficult to stop. Generally, all computers in an organization need to be shut down immediately to prevent further spread. This is where the damage is done.
From here the vulnerability in the software that the worm is exploiting needs to be patched, coupled with an update from anti-virus companies to detect and nullify further threats from the worm in the future.
It is understood Stuxnet was developed by the United States and Israel, using a sophisticated espionage toolkit called Flame, and was targeted specifically an Iran's nuclear industry.
These types of attacks in the 2010s became known as cyber warfare, and the malicious code itself known as a cyber weapon.
It is expected this type of warfare will continue in to the 2020s and beyond, and will no doubt become more sophisticated as time goes on.
Seven years later the world was subject to another major cyberattack. In May 2017, the Wannacry ransomware attack devastated the National Health Service (NHS) in the UK, and other major organizations around the world.
Another zero-day even, Wannacry (Opens New Window) was developed as ransomware to extort money in the form of Bitcoin by the cyber criminals behind the attack.
The developers exploited software vulnerabilities in Microsoft's Operating Systems, named Eternalblue and DoublePulsar. These vulnerabilities are alleged to have been stockpiled by the NSA. However, because cyber criminals acquired knowledge about the vulnerabilities, the NSA informed Microsoft, who issued a patch before the Wannacry event.
Many organizations are not efficient at applying security patches, and therefore ransomware such as Wannacry can easily exploit these flaws to the financial gain of the cyber criminals.
This is another example of what I think is to come throughout the next decade and beyond.
Ed Snowden in the notorious U.S. whistleblower who worked for the Central Intelligence Agency (CIA) and leaked highly classified information from the National Security Agency (NSA) in June 2013.
The data included detailed knowledge about global surveillance programs, including covert access into private citizen e-mail and instant messaging accounts by U.S. authorities, and citizen mobile phone location data, to name but a few.
The U.S. authorities were quick to issue a warrant for Snowden's arrest, but he eventually fled to Russia. From a government perspective, what Snowden did put many undercover agents lives at risk.
From Snowden's perspective, he sees what he did as his civic duty, as citizen's should have a right to know when their governments and people in power are up to, and how their private data, is actually not private.
Where do you sit in the debate?
From Facebook and Cambridge Analytica's alleged manipulation of data to influence elections and referendums in the late 2010s, to the 11.5 m leaked Panama papers from the offshore law firm Mossack Fonsecra that outed rich individuals tax avoidance schemes, whistleblowing in a connected digital world is likely set to continue in the coming decades.
Silk road was an online black market site only accessible on the Dark Web through a TOR, or The Onion Ring, Web Browser.
The Dark Web has no jurisdiction and this enabled the founder, Ross Ulbricht, to set up the site in February 2011.
The site mainly sold illegal drugs, which accounted for 70% of the total trade. Other illegal products included fake drivers licences. Over an estimated 2 years period, Silk Road made over 1.2 m transactions and collected over 9.5 m bitcoins, or $1.2bn in revenue.
In October 2013, the Federal Bureau of Investigation (FBI) seized and shut down the site. Its founder was arrested and ultimately sentenced to life in prison without parole for his crimes on the 29th May 2015.
Silk Road is just one of many sites on the Dark Web, including Black Market Reload, which sold illegal drugs and other illegal merchandise such as stolen credit cards and firearms.
It will come as no surprise after Silk Road collapsed, the owner of Black Market /reload shut down their site.
The Dark Web is likely to remain constant as a hotbed of illegal activity in to the next decade, and potentially beyond. This is despite the increase in law enforcement combing the Dark Web and targeting the shutdown of illegal activity.
Founded in September 2010, DeepMind Technologies develops Artificial Intelligence (AI) systems to "solve problems and advance scientific discover for all".
AI is basically an artificial neural network that aims to mimic human short-term memory. Based on machine learning, early successes included the AlphaGo program that beat a European Go Champion in October 2015.
Following DeepMind's gaming successes, it turned its attention to more serious issues, such as solving the problem of protein folding in 2016. This is an incredibly difficult problem to solve in science, but the evidence suggests DeepMind is making good progress understanding this issue as the 2010s came to an end.
The quality AI can bring to people's health and well being, such as supporting clinicians in diagnosing Radiology scans, there are still issues that need to be addressed, including data security, and ultimate control over AI automation.
Microsoft Windows 10 was made available to the public on the 29th July 2015. It superseded the ill fated Windows 8, released in 2013.
Windows 10 succeeded where Windows 8 failed in delivering a consistent user experience across different devices classes, i.e. desktop PC, Laptops and Tablets.
The Operating System's security was also improved, including improvements to biometric authentication through the Windows Hello platform. Microsoft Edge was also introduced as the successor to Internet Explorer.
Other features in the new operating system includes Cortana, Microsoft's equivalent to Apple's Siri, and improved parental controls.
In a change to previous operating systems, Microsoft release feature updates every six months.
Microsoft tends to release a new operating system every 10 years. Windows 10 mainstream support ending on the 9th January 2024.
2010s computer history is packed with an eclectic mix of impressive technological advancements, coupled with some serious issues that impacted human society throughout the decade.
Google Glass, Streaming TV, Wireless Air Pods, Virtual Reality Headsets, Internet of Things, Big Data, Cryptocurrencies, the list of new technologies is endless.
The video below is a review of the best new technology released in the 2010s.
Having lived though the 2010s in a technical leadership position, I can honestly say the changes I have witnessed have, overall, been for the betterment of human society. I am looking forward to what the next decade brings.
For more information on computing events, take a look at Computer Hop's history section (Opens New Window).
What a decade for technology!