And life goes on
By the end of 2008, the USA economical struggles have spread through out the world and everybody is trying to stay afloat. The military conflicts turn more and more into guerrilla wars where the only winners are the corporations supplying equipment to the rivaling parties.
Internet continues its rapid growth, thanks to new technological advancements enabling huge volumes of data to be transferred at high speeds and low costs. Becoming an industry with low barriers of entry, the developers orient themselves to more open source solutions, trying to cut costs and increase efficiency. The move towards applications distributed over the global network makes investing in large and expensive software unacceptable. The constantly evolving browsers have become the main tool used by common people. The network has become a second reality, standing on equal bases with the actual one.
By 2009 and 2010, most governments have invested into cyberwar capabilities. The latter has been recognized as a tool for conducting warfare but still remains with secondary importance. More money is allocated to the development of UVs – unmanned vehicles – no matter whether air, land or sea oriented. Together with the civil organizations, the military is trying to cut costs and become more efficient. The huge prices of oil and other resources become a major expense in their budgets and there is a move towards more effective and successful military operations.
Around 2015 couple of new types of resources has been developed and marketed but the final decision still depends on the large fuel corporations such as Royal Dutch Shell, Gasprom, Lukoil, Total, etc. Their infrastructures and investments have not yet fully paid off, and the big industries find it difficult to make the necessary technological turn. Nuclear energy comes back to focus and there are new developments in that area.
During the beginning of the second 21st century decade, cyber crime and all similar activities have been clearly defined and the Internet architecture has evolved in such a way that it is easy to see who did what. Under the threat of monitoring VPNs have become a fashion and the global network transforms into a sea of private ones. The high quality of open source solutions has made it hard to penetrate well configured software and the major threat of hacks remains from within the organization.