ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

4 Reasons the Future is Really Scary

Updated on February 22, 2015

The Iron Man Series is Losing its Sci-Fi Factor

There are some limitations of course, but in reality, technology resembling the Iron Man Suit is becoming closer and closer to actual military use. It seems that concepts reserved for video games and superhero movies are now being developed without CGI. For example, the company Raytheon has developed a machinery exoskeleton that is capable of drastically enhancing human force. Aside from artificial muscle enhancement, the exoskeleton (named EXOS 2), is designed to support its own weight, carry stronger armor, and provide for soldiers to carry heavier supply packs.

In fact, a compilation of extant technologies allows us to build an almost fully functional Mark 1 at this very moment. All capabilities are accounted for, including its bullet proof exterior, firepower, and short range propulsion. Basically, the only component we don’t have (and might never have) is the arc reactor. The arc reactor is entirely artistic license because the outstanding qualities it possesses are impossible. Scientists have practically written off the possibility of having such a minuscule power source that emits the same amount of energy as an entire nuclear plant.

Aside from Iron Man, it is not foolish to assume our younger generation will witness scenes of advanced warfare from a theater rolling before their eyes.

Infections Will Work Faster Than We Do

Antibiotics don’t pose much of a threat by themselves. However, with the help of humans and incompetence, the same material we use to fight infections can make them stronger. Antibiotics are used to treat infections induced by living things. Bacterial infections are in fact living organisms, and like all living things, have the same priority: survival and reproduction. To achieve this, all living things (humans and bacteria alike) are capable of adaptation.

So how are extremely unintelligent beings defending themselves against our medicine? The answer is misuse of antibiotics. People are continuously taking antibiotics when they don’t need them, or not taking them when they do. Antibiotics can only fight living things. Therefore, when taken to appease strep throat (which is caused by bacteria), they work wonders. However, when taken for a sore throat (caused by a non-living virus), not only do they not work, they provide a perfect opportunity for any tiny concentrations of bacteria around the body to have a first-hand look at what will be prescribed to kill them.

Armed with this valuable information, they pass it along to their multiplying offspring. These new bacteria will be immune that version of antibiotics. Then, if they are contagious and passed on to someone else, they too will have a resistant infection. These mistakes will result in infections that can work faster that new medicines can be developed and fatal infections.

Gordon Moore
Gordon Moore | Source

The Completion of Moore's Law (aka the Tech Biz Meltdown)

Moore’s law is essentially an observation made by Gordon E. Moore in the 70s that asses the possibility of a point in the future where computers everywhere will no longer be able to operate the way we know them to function today. The problem lies with the computer industry’s complete reliance on transistors.

Ready for some hardcore science? (Not so) basically, transistors are extremely small parts on all electronics that play an enormous role in their function. Transistors work similarly to a switch, stopping and starting the flow of electricity, minus a manual trigger. This action is associated with computer processing, and is vital to all the functions of which our modern computers are capable. According to a bunch of complicated computer science (which they probably have an entire college course on somewhere), these transistors must double each year in order to keep up with the rapid growth of technology.

To fit this exponential growth in transistors, they must continue to become smaller. And they have been. Since the beginning of production of transistors, they have been reduced in size by 98.86%. But with the good comes the bad, and in this case, the bad is very, very bad. Because transistors are forced to become smaller and smaller, they will reach a point when they will actually begin to become weaker. These transistors will have barriers that have been reduced to the point where they are not able to contain electric flow, causing leakage, waste of power, and slowing the speed of all computers. These issues have the potential to hinder communication and compromise our virtual reliance. Rest assured that there are many people working right now to avoid this problem, but it definitely is one we must solve in the near future.

Cyber Terrorism

With the Sony Pictures scandal involving the controversial release of The Interview still fresh in our minds, it has now become a reality for most of us that boundaries guarding virtual property are built with mutual respect more than tangible fortifications. Surely, a business such as Sony that is aware of the importance of keeping files containing unreleased movies, client/employee info, and other property private, would have professionals on their side working to protect their business. Evidently so, these professionals were not enough.

It is hard to tell exactly what would happen in a full-fledged cyber attack, simply because it has never really happened. We have seen attacks on businesses and individuals, but these were generally geared towards monetary gain. These issues generated little to no fear within our society, only reinforcing the importance of personal security where identity and finance information are jeopardized. So what would happen if a country decided inflict a cyber attack for a more large-scale purpose? The answer is nothing good.

One particular concern with substantial merit is an attack on our nation’s Power Grid. The Power Grid is essentially a series of electric highways stretching across the country. Essential to our everyday function, the Power Grid directs large amounts of power to different regions where it may be diverted further to eventually reach our houses, businesses, ect. Obviously, if the Power Grid suffered a successful assault, we would be virtually crippled as far as defense is concerned. Without electricity, we cannot generate radio waves that allow communication through cellphones, internet, and wireless signals. We would have to depend on our saved stores of energy to organize a defense and mobilize a counter maneuver. Most likely, by the time this has been achieved, the actual attack will already have happened.

The reason our Power Grid is so vulnerable is because it was built long before we had the foresight to predict a futuristic situation in which an attack on our electricity supply would be feasible. Additions to the Power Grid have been made, but many experts agree that it is one of the largest gaps in our national security.


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)