NSA Making Us Re-Evaluate USA

I don’t see any way to interpret the NSA mess as strengthening the United States.

For our research at the Tau Institute, this means we need to take a look at the Press Freedom Index (PFI) and possibly integrate it (and possibly other measures) into our algorithms and rankings, because I don’t see how a US that appears to be substantially less unfree than we all thought can be analyzed in the same light as before.

This will be a semi-complex, semi-tedious process. The factors we integrate into our research are derived and reported in diverse ways. Our challenge is to create a composite index that weighs them rationally. Integrating the PFI will be no different.

Good-bye, America
Whether terrorist attacks have truly been prevented – and could have been prevented only with the known and still unknown NSA programs – the reality is that the Fourth Amendment of the United States Constitution has been shredded by the current and prior administrations.

I think the Third Amendment also came close to violation during the recent police/military shutdown of Boston, and I eagerly await the day for some insane Member of Congress (say, Sen. Diane Feinstein or Rep. Pete King) to start huffing and puffing about how the Fifth Amendment protects terrorists and weakens America.

Additionally, President Obama has been no friend of the First Amendment almost from the day he took office and started chirping at his media critics. Millions of Americans are convinced that he’s also a sworn enemy of the Second Amendment.

Taking a further look, it’s clear that the Sixth, Seventh, and Eighth came under assault under the previous administration, and remain under duress. All this implies violations of the Ninth, and the Tenth looks like a quaint historical footnote.

That’s it. 10 for 10. The Bill of Rights are now as relevant as the Code of Hammurabi. James Madison weeps somewhere, as should we all. In the absence of enormous electoral outrage – and candidates to match – in 2014 and 2016, say good-bye to the United States of America as constituted in 1789.

So It’s Time to Update
I’m taking all this into account as I work with my colleagues to update our research at the Tau Institute. Operating from offices on a semi-restored college campus in Northern Illinois this past year, I’ve had some useful input from economists, mathematicians, and computer scientists as to how the factors we integrate into our Tau Index are weighted and interact.

You can google “Strukhoff Tau” or visit my personal website at www.rogerstrukhoff.sys-con.com to find the dozens of articles I’ve written about the research.

We are seeking to create a level playing field when examining the IT environments of 100+ countries. We mix in economic and social factors, as they impact how effective IT can be.

Our algorithms look at a number of publicly available measures – GDP, per capita income, cost of living, Gini coefficient, average bandwidth, broadband access, data servers, perception of corruption, and human development – to create an overall ranking as well as regional rankings and rankings by income tier.

We don’t weigh the factors in a traditional way – for example, by simply assigning a percentage of weight to each factor. The world is not really flat, and there are very few straightline measures that give an accurate picture of what’s going on in any particular country or region. Rather, I see a series of curves, slopes, and trajectories in how things work, and how they should be measured.

As an example, the Gini coefficient, which measures income disparity, is not plotted on a straight line, but on something called a Lorenz curve. Another example: The United Nations Human Development Index appears at first glance to be plotted on a straight line between 0 and 1, but its derivation includes several inputs, normalizations, logs, and geometric contortions along the way. These are just two examples.

So we use fractional exponents to create “curves of influence” that weigh the various factors on a relative basis. The perceptions of corruption index (PCI), for example, published by Transparency International, carries more weight in less developed countries than developed countries.

According to our calculations, it adds only 4.8% of the weight to Estonia, a country that does great overall but which could still lessen its corruption. It carries 10.7% of the weight in high-performing, un-corrupt Finland, but 20.2% of the weight in middling, corrupt Mexico.

As we project this factor on a curve, Mexico would improve its ranking with a better PCI, and the relative weight of the PCI would decline.

I’m happy to discuss all this with you at any time, and go into real depth about our numbers and how we derive them.

Something to Think About
Our preliminary work shows that if we were to integrate the Press Freedom Index into the mix, the United States’s overall ranking would not decline precipitously, primarily because the US is already a middling performer in our rankings. But it would lose more ground to Canada and many other developed nations that it already trails.

Meanwhile, Canada is already trying to lure educated technologists by offering a full citizenship program rather than the ludicrous indentured servitude of the US’s H-1B visa. Another country in the Americas, Chile (which already ranks higher than the US in our index and has a better perception of corruption), is encouraging technology startup through a direct government program.

Our research focuses on finding global leaders across regions and income tiers, identifying diamonds in the rough, and helping the laggards improve their situation. We are unbiased and agnostic when it comes to who “should” or should not lead. We have an additional office in Metro Manila and advisors from around the world.

The NSA revelations may not ultimately earn the wrath of the majority of the American people. If this turns out to be the case, then the future of the US will be even bleaker than it appears today.

Our data already shows that the United States is far from exceptional in our rankings, and I believe with all my heart that the verifiable Orwellian reality of the country today, if it does not change, will be its ruin, and our data will show this in the long term.

read more

Fathers of Clouds – A Tribute

For more than half a century, cloud computing has changed names more often than a Hollywood starlet.
Utility computing. Time share. Thin client. SaaS. PaaS. IaaS. While concepts have been added and capabilities grown, cloud computing was no more invented by Amazon or other modern vendors in the last seven years reality invented by reality shows. It’s simply been advance, repackaged and repurposed for as long as computer connectivity has existed.
In honor of Father’s Day, NJVC looks up the family tree of cloud computing to say thank you to six of the fathers of cloud computing. (And if you’re wondering about a gift, a single tie will suffice. Certainly, these guys understand how to share.)

read more

Gartner finds big shift to cloudy offices in 2015

According to the latest push from analyst house Gartner, to misquote Mark Twain, the reports of legacy’s death are greatly exaggerated.

Gartner’s most recent figures show that cloud office systems only represent 8% of the total office market – rising to 33% by 2017, and 60% – or 665 million users – by 2022.

The latter figures suggest a healthy state of affairs, with Gartner suggesting that the big push to cloud would occur in the first half of 2015.

Similarly, the use of email as software as a service (SaaS) will be at 10% by the end of 2014, and 33% by 2017.

Tom Austin, Gartner VP and fellow, said: “Despite the hype surrounding migration to the cloud, big differences in movement rates continue, depending on organisations’ size, industry, geography and specific requirements.”

Plenty of reports give greater adoption figures, but these can range from BYOD policy to the proliferation …

What Does Doorstep Milk Delivery Have in Common with Subscriptions?

Some of our customers and billing industry contacts are somewhat intrigued (or even bemused) by the upsurge in attention being given to the concept of “subscriptions”. Some are concerned that they’re missing something because, after all, subscriptions have been business-as-usual for most of us for years. So why all the fuss? Does the growth of subscription-type services delivered over the Internet indicate there’s some exciting new business model out there? Are we seeing fundamental changes in the way companies are doing business?
Part of the mythology surrounding subscription services is that there is something fresh and new about this, something that needs a new generation of billing systems optimized for subscriptions. This is puzzling. Subscription services have been around on the Internet since its earliest days. Actually, subscription services in various forms existed decades before the Internet appeared to change our lives. True, the Internet has opened up huge additional opportunities for subscription services, just as it has opened up all sorts of other opportunities – for content distribution, selling products, communicating, and more. In one way or another, we managed to do most of these things in the dark pre-Internet days, but the Internet had truly transformed the scale, reach and cost factors underpinning all of these business activities.

read more

Cloud Solutions and Technology

“Regulations and compliance are key trust topics with regards to cloud solutions and technology,” noted Sven Denecken, Vice President, Strategy and Co-Innovation Cloud Solutions, SAP AG, in this exclusive Q&A with Cloud Expo Conference Chair Jeremy Geelan. “But it is also more than security of access – it is portability of data and a clear definition of where the data resides.”
Cloud Computing Journal: The move to cloud isn’t about saving money, it is about saving time – agree or disagree?
Sven Denecken: Cloud of course does support more cost effective and quick approaches to a solution, if done right. Though the main business benefit is velocity, the right speed and direction is a combination that enables dedicated business functions, for example, HR, sales, finance and procurement, with the right solution, dedicated to their need, integrated into the existing environment (hybrid) and the ability to consume at the right speed.

read more

The Future of Tech Companies, the NSA, and Your Information

Guest Post by Lewis Jacobs

Verizon and the NSA

Last week, the technology world was turned upside down when the Guardian broke the news that the National Security Agency had directed telecommunications company Verizon to release customer call records and metadata on an “ongoing daily basis.”

Though the metadata doesn’t include the audio content of calls, it does include the phone numbers on both ends of calls, the devices and location of both parties involved, and the time and duration of calls.

The order was leaked by Edward Snowden, an analyst for defense contractor Booz Allen Hamilton at the NSA. The order targets both international and domestic calls, and it does not contain parameters for who can see the data or whether or not the data will be destroyed after NSA use.

Though the White House and the NSA say that the data will only be used for counter-terrorism efforts and other national security measures, the order nonetheless gives the federal government access to data from all of Verizon’s more than 100 million customers.

Since the story broke, there has been significant debate over whether the NSA is working within the regulations of the First and Fourth Amendments or whether it is violating citizens’ rights to free speech and privacy. The White House has defended the order as a necessary measure for national security. But critics, including the American Civil Liberties Union and several U.S. lawmakers, disagree.

What it means for the future

The controversy raises the question of whether or not other technology and telecommunications companies will be required to follow suit—or whether they already have. Amy Davidson at the New Yorker speculates that the leaked Verizon order is “simply one of a type—the one that fell off the truck.” Adam Banner at the Huffington Post wonders, “How many other ‘top secret’ court orders are currently in action with countless other information providers?”

The NSA is said to have been monitoring and collecting customer data from some of the world’s largest technology companies with the help of surveillance program PRISM. But many companies, including Google, Facebook, Microsoft, Yahoo, Apple, and AOL, have denied providing the government direct access to their users’ information. Google, one of the companies to deny any knowledge of PRISM, wrote an open letter to the Attorney General and the FBI requesting to make public any federal requests for data.

In any case, it’s unlikely that the NSA demanded customer information only from Verizon, meaning that the federal government could be (and probably is) accessing information about citizens through their phone providers, their email services, and their search engines. Faced with federal orders, there’s not much that technology companies can do in opposition.

The future of NSA technology surveillance will depend, of course, on its legality, which is yet to be determined. It’s unclear whether or not the NSA’s actions fall under the provisions of the Patriot Act, the FISA Amendments Act, the Constitution, and federal government’s system of checks and balances.

The American Civil Liberties Union recently announced their plan to sue the White House Administration for violating the privacy rights of Americans. On the other side, whistleblower Edward Snowden is currently under investigation for the disclosure of classified information, an offense that could result in life in prison.

This article was submitted by Lewis Jacobs, an avid blogger and tech enthusiast. He enjoys fixing computers and writing about internet trends. Currently he is writing about an internet in my area campaign for local internet providers.

Sources:

http://www.newyorker.com/online/blogs/closeread/2013/06/the-nsa-verizon-scandal.html

http://www.huffingtonpost.com/adam-banner/the-nsa-and-verizon

http://money.cnn.com/2013/06/11/technology/security/google-government-data/

http://money.cnn.com/2013/06/07/technology/security/nsa-data-prism/

http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-need-to-know-about-the-nsa-scandal/

Managed Service Provider Selects Zyrion Cloud Monitoring Solution

Zyrion Inc., a provider of Cloud and IT Monitoring software solutions, on Wednesday announced at Cloud Expo New York that United Technology Group (UTG), a provider of information technology solutions headquartered in Atlanta, has selected Zyrion’s Traverse Cloud monitoring software for offering managed services to their clients.
UTG is one of Atlanta’s fastest growing Managed Service Providers and a leading provider of information technology solutions for mid-sized enterprise and small businesses nationwide. UTG provides reliable, consulting and scalable technology solutions ranging from Cloud, virtualization, secure networking, storage, unified communications as well as backup and disaster recovery services to achieve optimal efficiency and full security with client networks.

read more

Six Not-so-Blind Men and the Cloud Elephant

As with everything else, the best way to get a view of a new technology area is by asking for independent opinions. The old adage of the 6 blind men and the elephant comes to mind. Coincidentally, there were six “blind men” on the panel, including our very engaging host, Mr. Geelan. And there were views that converged in a common theme – Cloud Connects.
The discussion was very entertaining, as all panels mediated by Jeremy are. Interestingly, the analogy went into elephants and other sorts of fauna. To me the Cloud elephant is the right animal to summarize this discussion around – my mind went to the old Indian fable of six blind men and the elephant (I did drop the word “blind” because the panel is obviously not blind and was made of very experienced leaders in this industry J). But it was six men with different views, yet converging on the same theme of how cloud computing fits into this world and the future.

read more

WSO2 and SUSE Presenters at Cloud Expo New York

WSO2 on Thursday announced that WSO2 Vice President of Technology Evangelism Chris Haddad and SUSE Business Development Manager Frank Rego will lead a joint presentation at 12 International Cloud Expo. The session, “Bridging IaaS and PaaS to Deliver the Service-Oriented Data Center,” is part of the event’s Enterprise Cloud Computing Track on Thursday, June 13, 2013. The Cloud Expo conference is being held June 10-13, 2013 at the Javits Center in New York City.
Bridging IaaS and PaaS to Deliver the Service-Oriented Data Center
Increasingly, enterprises are adopting private infrastructure as a service (IaaS) clouds to take advantage of the scalability and flexibility inherent in cloud environments while avoiding the security and latency issues inherent in publicly hosted settings. As a result, organizations are also reevaluating how to optimize their future application delivery models.
This session will examine how IT professionals can efficiently and flexibly tackle the challenges of the modern connected enterprise using a combination of IaaS and platform as a service (PaaS). It also will discuss how a private PaaS can leverage the automation and scalability of a private IaaS solution, such as the OpenStack-based SUSE Cloud, to deliver secure, standardized development environments that enable migration to an agile, service-oriented delivery model. The presentation will run from 8:15-9:00 a.m. on Thursday, June 13, 2013.

read more