The Social Network of Machines, Software-Defined Storage, & the Data Protection Continuum

<a href="http://thebackupwindow.emc.com/?attachment_id=9329" rel="attachment wp-att-9329"><img class="aligncenter size-full wp-image-9329" alt="186923825-1" src="http://thebackupwindow.emc.com/wp-content/uploads/2014/03/186923825-1.jpg" width="445" height="385" /></a> <br / />The Second Machine Age is redefining our relationship with technology. From healthcare to transportation, our lives will be nearly unrecognizable to our children. Underlying this change is the next generation of the social network: a Social Network of Machines. This Social Network of Machines will be a vast infrastructure built on the Third Platform (i.e. mobile, big data, social, cloud) and fueled by near-ubiquitous metadata about machines and humans. In this two part series, we’ll first examine what technology drives the Second Machine Age. Then we will explore how we can avoid an “Accidental Architecture” on a global scale.

186923825-1

The Second Machine Age is redefining our relationship with technology. From healthcare to transportation, our lives will be nearly unrecognizable to our children. Underlying this change is the next generation of the social network: a Social Network of Machines. This Social Network of Machines will be a vast infrastructure built on the Third Platform (i.e. mobile, big data, social, cloud) and fueled by near-ubiquitous metadata about machines and humans.

In this two part series, we’ll first examine what technology drives the Second Machine Age. Then we will explore how we can avoid an “Accidental Architecture” on a global scale.

The Second Machine Age will insinuate technology into the most personal aspects of our lives. Many people already use devices to track and analyze their vital statistics – the metadata of the human operating system. Self-driving cars will obsolete automobile driving and track our every movement – the metadata of personal movement. While these changes should help reduce fatalities and increase our quality of life, they also pose a threat to privacy, freedom, and security.

Continue reading the post on our sister site Reflections.

About the Author: Stephen Manley