Feeds

Internet pioneer Vint Cerf predicts the future, fears Word-DOCALYPSE

Big data? More like big problems for our grandchildren

Internet Security Threat Report 2014

Big data may turn out to be a big mystery to future generations, godfather of the internet Vint Cerf has warned.

The pioneering computer scientist, who helped design the TCP/IP protocol (along with Robert Kahn) before going on to work as chief internet evangelist for Google, has claimed that spreadsheets, documents and various collections of data will be unreadable by future generations.

In an interview on Monday, Cerf illustrated the problem by discussing how his up-to-date version of Microsoft Word can't read Powerpoint files created in 1997.

"I'm not blaming Microsoft," he said. "What I'm saying is that backward compatibility is very hard to preserve over very long periods of time."

Discussing scientists who are now busily gathering massive amounts of data, he warned that unless the data recording techniques of their projects is preserved by using metadata, the information will be useless to future boffins. The problem is compounded if the research is carried out and recorded by private companies, which may go bust with the loss of all information about their methodology.

"If you don't preserve all the extra metadata, you won't know what the data means. So years from now, when you have a new theory, you won't be able to go back and look at the older data," he continued.

"We won't lose the disk, but we may lose the ability to understand the disk."

He spoke of the need for a "digital vellum that will preserve not only the bits, but a way of interpreting them as well," referring to the ancient practice of using animal skin to produce durable books or documents.

Cerf also contrasted the problems of modern data storage with the example of Pulitzer Prize-winning biographer Doris Kearns Goodwin, who visited more than 100 libraries whilst writing a book called Team of Rivals about President Lincoln and his government.

There is hope, however.

"It may be that the cloud computing environment will help a lot. It may be able to emulate older hardware on which we can run operating systems and applications," Cerf added in his chat to Computerworld. ®

Internet Security Threat Report 2014

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.