in. Part 1: Fantasies about the Internet of the Future
Disclaimer: We open a series of stories describing various issues and problems related, for the most part, to the present and future of the Internet and our vision of possible solutions. Often, announcements of projects mentioned in stories will be published afterwards. We ask you to treat us with an understanding: something will be changed, but something will remain fantasies; today we are a small team, but with a great desire to do in this world, even if at first a little, but better.
Victor returned home in a good mood - he managed to get another rarity for his collection of the past. Carefully taking out a small thin and transparent plastic box with the logo of a company that had sunk into oblivion from the paper bag, he turned it in his hands with interest. Then, with a sinking heart, he opened it and brought it to the sunny window to better view the contents. In front of him was a disc labeled “CD-R 650Mb”. With a light click, he disconnected the disk from the substrate and turned it over, Victor saw a subtle multicolored sun glare running across the room reflected on the back of the disk.
- You got it!
Victor's younger brother flew into the room like a whirlwind.
- Give! Let me have a look!
Having snatched a little thing flaming in the sunshine from his brother’s hands, he, not paying attention to Victor, who was displeased with such an unceremonious attitude to rarity, brought the disk closer to his eyes.
- Hmm ... And here is only 650 megabytes? However, they didn’t save much money in the past on personal space if they wrote all their data on such large, but tiny disks. I can imagine what mountain they need to record at least one holographic film!
The brother grinned, but did not once again talk about what formats used to be and how much space they occupied on the media, but sat down at the table-screen and, having swiftly passed the password gesture, opened his personal “in” page. Few people mentioned this name in a conversation, for everyone it was a single entry point, respectively, and there was no sense in somehow identifying it. They spoke simply generalized - the network. However, Victor read that not so long ago it was divided into separate fragments called websites and it was necessary to know their addresses in order to find the necessary information. She was searched directly on the sites, or through very popular services then called search engines. He even knew the name of one of them, but it was funny and constantly flew out of his head.
Only then projects began to appear, the authors of which approached the issue on the other hand and interchanged the essence of things - now the information began to search for the user. Victor was young and only recently began to engage in web development, but he had already heard stories from senior colleagues that earlier, instead of just developing the logic and functionality of projects and filling them with data, I had to think about such things as a separate design and UI for each (!) site - here he always felt insanely sorry for users trying each time to understand how, where and what is located, and at the same time be content with only the functionality that the owner of the resource considered it necessary to add. Or vice versa, unnecessary elements of an imposed UI loomed before our eyes. And the developers at the same time came across an insidious beast and his name was cross-browser! Victor didn’t fully understand what kind of problem this was, but the expression on the faces of the narrators gave some idea of the scale of the disaster. Also phrases like “to display normally on everything, $ # @ !, device zoo!” Were drawn in his mind by terrible monsters that web developers fought with like knights in sparkling armor. Victor also liked to read about knights.
He also vaguely imagined what a word like “caching” means, but he knew that in those days there was not only a slow connection, but he also had to pump tons of garbage responsible for displaying each individual site, and much of all this disgrace more than once duplicated! However, he tried not to be so gullible and not to believe every word of the storytellers - often it seemed to him that the elders simply act out him, telling tales and chuckling behind him. Although the narrative of the attacks is called the terrible word DDoS or XSS, SQL injection, he listened with his mouth open, imagining virtual battles for some reason in the style of pirate times, apparently from the fact that the word “pirates” also popped up from time to time to mention the experienced . But he still had to ask about this in detail later. Even if this is true, now there simply cannot be many types of attacks, the system only accepts data in pure text and gives them away, this data cannot harm either the client or the server by default. In addition, this approach allows you to instantly send tiny kilobyte pages, because only useful data comes to the client side or back to the server without HTML and JS, CSS garbage.
He also knew that before pages were torn off from the universal processing by the semantic core of the network, and the very search engines that he already mentioned today were engaged in this task in a very limited amount. He represented them with colossi on feet of clay. Victor liked to find colorful analogies. Every day millions went to them to bow in order to get an answer - where is the information they need on the network and woe to you if you do not know how to ask correctly! He also heard blood-cold stories about spam and inappropriate ads everywhere. They say that she was on almost all sites. Victor found it very useful that the network was offering at the right time the goods he needed based on his preferences and requirements for them, but he did not understand what it was worth showing everyone the same advertising information. Authors of articles, books, music, videos, manufacturers of various goods - everyone had to participate in a crazy race for consumers, and they, in turn, also searched for the information and products they needed. Incredible means were spent on advertising, which, of course, was strongly reflected in prices, not to mention the fact that almost never advertising was objective and simply deceived consumers, and at best embellished the goods. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests. that almost never advertising was objective and simply deceived consumers, and at best embellished the product. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests. that almost never advertising was objective and simply deceived consumers, and at best embellished the product. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests.
Victor again felt terribly sorry for the users. He represented them as unhappy little animals clinging to a huge maze, trying to get to the information they needed through the jungle of ads and spam that grew in abundance around in the form of huge trees and tried to catch the user with their crooked branches. And even if it was possible to avoid them, it was too early to rejoice, I also had to look at my feet, otherwise you risk falling into the trap of scam sites scattered all over the network. The Trust Level concept was not yet in use as a universal tool that forever freed the network from scammers and spam.
But the most insidious were social networks! Many users did not even suspect or simply did not listen to people warning about the danger of giving their personal data to such resources. Listening to stories about such networks, Victor only shook his head in amazement and incredulity. Now each user had a separate reliable Vault-server jealously storing the owner’s data, and they seriously punished them for stealing personal information, but so that someone voluntarily gave them to someone ?? No, apparently, these are still the same stories or at least very exaggerated stories, like many other things that senior colleagues told him about the past of the Internet. The only thing he had no doubt about was that almost all of the information was stored by users not as it is now on Vault-servers, but locally or on disks like
Victor returned home in a good mood - he managed to get another rarity for his collection of the past. Carefully taking out a small thin and transparent plastic box with the logo of a company that had sunk into oblivion from the paper bag, he turned it in his hands with interest. Then, with a sinking heart, he opened it and brought it to the sunny window to better view the contents. In front of him was a disc labeled “CD-R 650Mb”. With a light click, he disconnected the disk from the substrate and turned it over, Victor saw a subtle multicolored sun glare running across the room reflected on the back of the disk.
- You got it!
Victor's younger brother flew into the room like a whirlwind.
- Give! Let me have a look!
Having snatched a little thing flaming in the sunshine from his brother’s hands, he, not paying attention to Victor, who was displeased with such an unceremonious attitude to rarity, brought the disk closer to his eyes.
- Hmm ... And here is only 650 megabytes? However, they didn’t save much money in the past on personal space if they wrote all their data on such large, but tiny disks. I can imagine what mountain they need to record at least one holographic film!
The brother grinned, but did not once again talk about what formats used to be and how much space they occupied on the media, but sat down at the table-screen and, having swiftly passed the password gesture, opened his personal “in” page. Few people mentioned this name in a conversation, for everyone it was a single entry point, respectively, and there was no sense in somehow identifying it. They spoke simply generalized - the network. However, Victor read that not so long ago it was divided into separate fragments called websites and it was necessary to know their addresses in order to find the necessary information. She was searched directly on the sites, or through very popular services then called search engines. He even knew the name of one of them, but it was funny and constantly flew out of his head.
Only then projects began to appear, the authors of which approached the issue on the other hand and interchanged the essence of things - now the information began to search for the user. Victor was young and only recently began to engage in web development, but he had already heard stories from senior colleagues that earlier, instead of just developing the logic and functionality of projects and filling them with data, I had to think about such things as a separate design and UI for each (!) site - here he always felt insanely sorry for users trying each time to understand how, where and what is located, and at the same time be content with only the functionality that the owner of the resource considered it necessary to add. Or vice versa, unnecessary elements of an imposed UI loomed before our eyes. And the developers at the same time came across an insidious beast and his name was cross-browser! Victor didn’t fully understand what kind of problem this was, but the expression on the faces of the narrators gave some idea of the scale of the disaster. Also phrases like “to display normally on everything, $ # @ !, device zoo!” Were drawn in his mind by terrible monsters that web developers fought with like knights in sparkling armor. Victor also liked to read about knights.
He also vaguely imagined what a word like “caching” means, but he knew that in those days there was not only a slow connection, but he also had to pump tons of garbage responsible for displaying each individual site, and much of all this disgrace more than once duplicated! However, he tried not to be so gullible and not to believe every word of the storytellers - often it seemed to him that the elders simply act out him, telling tales and chuckling behind him. Although the narrative of the attacks is called the terrible word DDoS or XSS, SQL injection, he listened with his mouth open, imagining virtual battles for some reason in the style of pirate times, apparently from the fact that the word “pirates” also popped up from time to time to mention the experienced . But he still had to ask about this in detail later. Even if this is true, now there simply cannot be many types of attacks, the system only accepts data in pure text and gives them away, this data cannot harm either the client or the server by default. In addition, this approach allows you to instantly send tiny kilobyte pages, because only useful data comes to the client side or back to the server without HTML and JS, CSS garbage.
He also knew that before pages were torn off from the universal processing by the semantic core of the network, and the very search engines that he already mentioned today were engaged in this task in a very limited amount. He represented them with colossi on feet of clay. Victor liked to find colorful analogies. Every day millions went to them to bow in order to get an answer - where is the information they need on the network and woe to you if you do not know how to ask correctly! He also heard blood-cold stories about spam and inappropriate ads everywhere. They say that she was on almost all sites. Victor found it very useful that the network was offering at the right time the goods he needed based on his preferences and requirements for them, but he did not understand what it was worth showing everyone the same advertising information. Authors of articles, books, music, videos, manufacturers of various goods - everyone had to participate in a crazy race for consumers, and they, in turn, also searched for the information and products they needed. Incredible means were spent on advertising, which, of course, was strongly reflected in prices, not to mention the fact that almost never advertising was objective and simply deceived consumers, and at best embellished the goods. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests. that almost never advertising was objective and simply deceived consumers, and at best embellished the product. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests. that almost never advertising was objective and simply deceived consumers, and at best embellished the product. They say that then the pieces of the network called sites simply could not distinguish between users and did not know about their interests.
Victor again felt terribly sorry for the users. He represented them as unhappy little animals clinging to a huge maze, trying to get to the information they needed through the jungle of ads and spam that grew in abundance around in the form of huge trees and tried to catch the user with their crooked branches. And even if it was possible to avoid them, it was too early to rejoice, I also had to look at my feet, otherwise you risk falling into the trap of scam sites scattered all over the network. The Trust Level concept was not yet in use as a universal tool that forever freed the network from scammers and spam.
But the most insidious were social networks! Many users did not even suspect or simply did not listen to people warning about the danger of giving their personal data to such resources. Listening to stories about such networks, Victor only shook his head in amazement and incredulity. Now each user had a separate reliable Vault-server jealously storing the owner’s data, and they seriously punished them for stealing personal information, but so that someone voluntarily gave them to someone ?? No, apparently, these are still the same stories or at least very exaggerated stories, like many other things that senior colleagues told him about the past of the Internet. The only thing he had no doubt about was that almost all of the information was stored by users not as it is now on Vault-servers, but locally or on disks like