Microsoft May Have a Killer Cloud App – Live Mesh

Microsoft Mesh LogoGot a technical briefing on Live Mesh today in Redmond, and I’m impressed – particularly by the demonstrated commitment to interoperability through adhering to web standards – and the very cool Live Desktop giving you remote access to all your files and folders from any device (work computer, home laptop, mobile phone) with  the new Microsoft Device Connectivity Service.

This is what will bring Cloud Computing down to earth.

Continue reading

Tempted to “Skimp” on IT Security?

FACT: According to a study presented at last week’s annual RSA Conference on cyber security, by Palo Alto Networks CTO Nir Zuk, “Users are routinely, and fairly easily, circumventing corporate security controls. And that is because traditional firewall technology was not meant to grapple with the diversity of Internet applications of recent years.”

ANALYSIS: Security has been an even hotter topic than usual for the past month, what with new national-level attention to cyber security and, for Microsoft, a culmination of sorts of various strands of effort into our new “End to End Trust” initiative.  My boss, Jim Simon, attended the RSA Conference in San Francisco, with his boss, Craig Mundie, Microsoft’s Chief Research and Strategy Officer.  Craig laid out Microsoft’s “End-to-End Trust” vision, designed to provide users more control over online and enterprise systems.  His keynote was widely covered (even by offbeat security blogs, like RiskBloggers.com) so I don’t need to rehash it.

Nir Zuk’s presentation was interesting – and not just because he’s one of the true pioneers of firewall technology.  He really understands secure enterprise environments, something I’m talking about increasingly with government organizations, who are learning the hard way the need to protect their data, apps, and computing platforms.  

Continue reading

Google App Engine and the Gathering of Clouds

How many Cloud Computing platforms would you say there are today? 

Some abhor the notion of there being multiple clouds – by this thinking there is only one “cloud” in an almost Zen manner, meaning “the grid” and the ability to reach in, somewhere somehow, and use someone else’s compute capacity, web apps, services, storage, etc.  Some others, however, as Amazon and others roll out their branded ability to do that reach, are beginning to call these “clouds” — I prefer to think about them as distinct platforms enabling cloud computing, but that’s starting to become a hazy definition. 

Next week the world will hear more about Microsoft’s Mesh strategy.

I feel like an observer out on a prairie on a hot summer afternoon, watching the sky as cumulo-nimbus shapes emerge and burgeon across the horizon.  The multiplicity is going to inevitably lead to feature differentiation, competitive marketing, a full hype cycle with naysayers and boosters (see Fortune magazine), down-market competition, shoddy wannabe clouds, boom and bust, market shake-out, etc. etc. – good times! 

How many such platforms (how many clouds) will there be in future?  How many should there be?  And if multiplication really occurs, is this any different from “utility computing” and aren’t we heading back to the days of the mainframe-model of time-sharing?

Continue reading

Google’s Argument to Enterprise IT: “Trust Us”

FACT:  Yesterday, Google’s Dave Girouard, VP of enterprise sales, gave a keynote speech on “The Evolution of Cloud Computing” at FOSE, a Washington trade-show focusing on federal government and military IT customers.  According to a Washington Post reporter’s blog account afterwards:

[Girouard said] “Google will have to do things differently” to work with defense and intelligence agencies, where data security and privacy are held to the tightest standards. But he argued that having information spread across hundreds of different servers is actually more secure than housing data on a few servers at a specific location. “Security is now more virtual than physical,” he said.

ANALYSIS:  The Google salesman (Girouard is VP of enterprise sales) was speaking at FOSE on the same day I made an April Fools blogpost featuring a lame “Cloud Computing” joke (see it here, come back when you stop laughing).  

This year I’m at FOSE as neither buyer nor speaker; the past couple of years I spoke at FOSE, as a DIA official, and I always enjoy walking the exhibit floor, plus I was curious about Girouard’s take on Google’s current move into the federal space.

To be honest I’ve met him before when he was with Virage and he’s a fine fellow, a good salesman.

The rhetoric of his main pitch, though, seems to be battling uphill, and I’m not sure he gets a nuanced distinction.

Continue reading

Microsoft Research Reclaims Value of Pi

pi-techFACT: Educators in the state of Alabama are chafing as the state celebrates a dubious anniversary: today marks ten years since the Alabama state legislature voted to change the value of the mathematical constant pi from 3.14159… to the “Biblical value” of 3.0.  Ramifications were felt across the state. 
Now, a team of Microsoft Research computer scientists have announced success in a groundbreaking effort to refactor the Biblical value, using modern high-performance computing hardware and machine-translation technologies on the original Old Testament texts.
  
ANALYSIS:  Looking back, an April 1998 issue of Science and Reason newsletter written by physicist Mark Boslough recounts the political and cultural battles which went behind the Alabama legislative change. The legislature of the “Yellowhammer State” justified the change by citing biblical injunction. As one supporter put it: “the Bible very clearly says in I Kings 7:23 that the altar font of Solomon’s Temple was ten cubits across and thirty cubits in diameter, and that it was round in compass.”

The use of “3.0” as the value of pi led to problems in schools, businesses, and local scientific pursuits, including a group of frustrated engineers at the NASA research facility in Huntsville.  According to NASA/Huntsville’s director of special projects “Dr.” Jim Simon (doctorate pending), “We had strayed from using our Microsoft software and instead had been trying to figure out how to use an advanced Google search platform, which was sold to us as a powerful Cloud Computing system.”

Unfortunately, that effort proved frustrating for the “rocket scientists” any time they used calculations involving pi, based on the Alabama-standard value of 3.0, mostly because they were under the mistaken impression that they were contractually barred from using Cloud Computing on any sunny days. Given the hospitable local weather that left them unable to use their computers for an average of 290 days each year.

Continue reading

From Microsoft’s Cloud – PopFly

I mentioned PopFly in my last post – many Web users are now beginning to appreciate how it enables the fun and ease of innovation for non-technical people. Go to www.popfly.com/ and set up your own account (free of course), and you’ll be able to create usable, powerful “tools” out of the Cloud, or with your own data. 

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

Using Web 2.0 in a top-secret environment

Network World magazine has just posted a podcast interview which I recorded with editor Paul Desmond about a month ago, just after speaking at their “IT Roadmap” conference in December. The interview topic is “Using Web 2.0 tech in a top secret world,” and we discuss the DIA and Intelligence Community experience with social networks, wikis, and blogs.  We also discuss cloud computing, enterprise IT, SOA, IARPA, and the challenges of deploying secure software. Representative quote: “Intelligence analysts are much like ‘knowledge workers’ on Wall Street or in the media, they know what’s going on on the Internet, they know what they want, they know what they need, and it’s in the IT side’s interest to try and service them.”

At the end Paul was gracious enough to ask about my new role with Microsoft’s Institute for Advanced Technology in Governments. If your daily life has a 17-minute hole which you need to fill, then dim the lights, crank up the speakers, and mellow out to the Quiet Storm (I was using my NPR voice)….

Email this post to a friend


AddThis Social Bookmark Button