The Industrial Revolution, powered by oil and other fossil fuels, is spiraling into a dangerous endgame. The price of gas and food are climbing, unemployment remains high, the housing market has tanked, consumer and government debt is soaring, and the recovery is slowing. Facing the prospect of a second collapse of the global economy, humanity is desperate for a sustainable economic game plan to take us into the future.
Here, Jeremy Rifkin explores how Internet technology and renewable energy are merging to create a powerful “Third Industrial Revolution.” He asks us to imagine hundreds of millions of people producing their own green energy in their homes, offices, and factories, and sharing it with each other in an “energy internet,” just like we now create and share information online.
Rifkin describes how the five-pillars of the Third Industrial Revolution will create thousands of businesses, millions of jobs, and usher in a fundamental reordering of human relationships, from hierarchical to lateral power, that will impact the way we conduct commerce, govern society, educate our children, and engage in civic life.
Rifkin’s vision is already gaining traction in the international community. The European Union Parliament has issued a formal declaration calling for its implementation, and other nations in Asia, Africa, and the Americas, are quickly preparing their own initiatives for transitioning into the new economic paradigm.
The Third Industrial Revolution is an insider’s account of the next great economic era, including a look into the personalities and players — heads of state, global CEOs, social entrepreneurs, and NGOs — who are pioneering its implementation around the world.
The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. We strongly recommend this book for policymakers and researchers so that they may stay abreast of the latest research and develop a greater understanding of cyber security issues.