quick scan
WI-WE Progress
Progress: 88.40%   WWI-WE Version: 5
0 mandatory questions pending
26 questions total
22 questions answered
22 questions completed
4 questions pending
Popular WI-WE Tags

Mapping Wild Cards

Inspired by: FP7 » P2P networks as a predominant technology for data management

version: 5 / updated: 2010-06-25
id: #840 / version id: #167
mode: VIEW

Originally submitted by: Martin Fatun
List of all contributors by versions (mouse over)
Last changed by: Martin Fatun
WI-WE status:
unpublished

Source of inspiration

European Commission Framework Programme for RTD (FP7)

Theme/activity of inspiration

Theme 3 - ICT - Information & communication technologies

Sub-theme/area of inspiration

Pervasive and trusted network and service infrastructure

Optional reference/s to FP7 project/s

Use the following format: Project Acronym (Project Reference No.). Use commas if more than one project is associated to this Wild Card, for example: ALFA-BIRD (213266), SAFAR (213374), LAPCAT-II (211485)
VITAL++ (224287), NANODATACENTERS (223850)

Headline

(max. 9 words)

P2P networks as a predominant technology for data management

Description

(approx. 150 words)
Please describe the Wild Card (approx. 150 words)
P2P (Peer-to-Peer) is a technology that fosters self-deployment and self-organisation, thus, it is reducing operational costs, while it achieves optimised resource utilisation for the deployed applications and services.Therefore P2P network became the predominant technology for the data sharing, storage and management worldwide. Everybody counts on that that the data are situated somewhere in the net, but nobody takes care where exactly it is and wheather it is infallible and secure enough. Nevertheless, potential failure of such system, techical or intentional, may lead to irretrievable loos of data in global scale.

Keywords

ICT, P2P network, Peer-to-Peer, data storage, data management, data loss

Mini-description

(max. 250 characters)

Everybody counts on that that data are situated somewhere in the net, but nobody takes care where exactly it is and wheather it is infallible and secure enough.

Likelihood

Closest timeframe for at least 50% likelihood
Please use one of the following options:
now-2015

Features of life if the wild card manifests

Feature 1: business models and industrial environment
The market of free space and auctions to offer the best price
Feature 4: technology and infrastructure
Best usage of resources - sharing processors half used, sharing free hard disks Process & thrust
Feature 7: security and defence
A big opportunity for a real time big data exchange, but on the other side there is a big risk hacking and on purpose dissemination of viruses.

Type of event

Unplanned consequence of events/trends/situations (e.g. financial crisis, accidental breakthrough)

Type of emergence

please select (if any) describe related trend or situation
A counter trend/development/situation
(e.g. There is a massive decline in mobile phone usage due to fears of health hazards; Considerations of privacy lead to the banning of video surveillance in public spaces

Type of systems affected

Human-built Systems - E.g. organisations, processes, technologies, etc.

Classification

Mixed

Importance

please specify:
please select
Level 4: important for the whole world

Latent phase

Obstacles for early indentification

scientific filters (knowledge/technology access)
social filters (class, status, education level)

Manifestation phase

Type of manifestation

Very uncertain

Aftermath phase

Important implications
Transformation of a system (e.g. new applications, change in stakeholders relations/influence)

Key drivers or triggers

Provide up to 2 possible drivers or triggers of HIGH importance. Click on HELP to see examples:
please describe
Driver / Trigger 1
please describe
Driver / Trigger 2
Economic • Allowing renting my processor and disk space will be profitable for me
Environmental Energy savings

Potential impacts (risks & opportunities)

Timeframe options
Risks Opportunities
immediate
(within 1 year after the Wild Card manifests)
Data security

Potential stakeholders' actions

before
it occurs
after
it occurs
Policy actors (at the international, European and national levels) To ensure IPR law for virtual data To ensure IPR law for virtual data
Business actors (incl. SMEs) Need for improved security programs Need for improved security programs
Academic/Research sector New firewall technologies New compression algorithms

Relevance for Grand Challenges

where? please justify:
particularly relevant Europe world
Globalization vs. localization Global distribution of local data storage

Relevance for thematic research areas

please justify:
particularly relevant
ICT - Information & communication technologies
Research for the benefit of small & medium-sized enterprises (SMEs) May help SMEs to decrease cost of data storage

Pan-European strategies potentially helping to deal with the wild card

please justify:
particularly relevant
Facilitating and promoting knowledge sharing and transfer

 Features of a research-friendly ecology contributing to deal with the wild card

For further information about 'research-friendly strategies' click here

please justify:
particularly relevant
Addressing cohesion through a localised articulation between supply and demand
(e.g. making research institutions more engaged with their own context and local users; reinforcing knowledge flows into and out of regions; etc.