Monday, August 13, 2012

Episode 23: Cloud will never oust the desktop as Mayor

Yup. You did just read that on a Cloud professional's blog. And I meant every word of it. And it's true too. The cloud will never replace the 'desktop machine' (or 'localised IT infrastructural assets' for those who want to be pedantic & play along at home!). And before you say it, your friendly neighborhood cloud sales person isn't right. Your friendly neighborhood cloud sales person wants to sell you services, & all the spoils that come their  way for making their targets. And they've just read that opening salvo & gotten annoyed by it. Very annoyed.

The cloud is very good at a great deal many things. Sure, it can simplify lots of complicated purchasing into 'consume-on-demand' ICT in nice neat easy-to-use services. Sure it means you're not making CAPEX spends in such an indefinite set of economic & trading circumstances that otherwise kills your ability to be flexible to the market. And sure, it means you can offload some expensive aspects of your requirements to being someone else's problem as a managed service. And they're all very laudable selling points.

But, and this is the biggie - Cloud has become something used BY the desktop. That's right. Cloud is an augmentation to the desktop. Access to cloud services still requires a machine with an OS, with storage to install accessibility software of some sort (browsers, VPN clients, dedicated applications etc.). Even on your mobile devices, you're still dependant on them carrying the traditional 'desktop-architecture'  to access your cloud for management or productivity.

And no, desktops in the Cloud isn't the answer. In fact, it's damn near a non-runner. Purely aspirational in-fact. And Why? Much as there are those who are loathe to admit it, Microsoft owns the market when it comes to productivity computing. They also don't allow their Windows desktop licensing to go near ANY form of multi-tenancy solutions for hosted desktops. Sure there's OnLive, but that is a riddle wrapped in an enigma wrapped in a giant 'how-in-the-hell' blanket.

Given the cloud as a whole is multi-tenancy, unless Redmond reverses its stance on Windows Desktop licensing, this will never happen save for those few businesses who implement on-site virtualisation, which will be for reasons other than cost-effectiveness, but only at the 500 seats or more space.

And no, it's not realistic to expect or suppose there'll be a shift by everyone to using a Google Chromebook, or even to ClamCase's laptop dock. It's just not going to happen. Nor is it realistic to expect that everyone is going to shift to tablet computing eschewing notebooks or desktop machines. There's too much of our daily computing lives in the world that simply will not transfer to mobile. That is clearly visible in markets such as MMO gaming with 9.1m players of World of Warcraft, or the 1m players of Star Wars: The Old Republic, or high end games such as EVE online. If anything, mobile computing devices are simply companion devices. Yup, I just said that too - you didn't misread.

Tablet machines are great for low-interaction computing needs from wherever you find comfortable - be it on a giant bean bag, at your favorite coffee shop, or your favorite park on that bench in front of the lake with the ducks, or even lazing on your couch. Smart phones are in the exact same boat. But I can tell you that you are not going to knock out your end-of-year accounts on those devices. Sure, there are some who will say "But Ian, I do." And if you're one of those, good for you. But you're in an extreme minority that isn't growing, nor will it.

And the most important fact is that people fear change. People will not willingly give up the security of their disks in lieu of those in the Cloud. Cloud writers/gurus/warriors/evangelists/bloggers/watchers often live in a world which is purely aspirational, not filled with FUD (which is often perpetuated by cloudwashers & marketeers), & where their ideals exist peaceably. It's a mind share that right now in the current climate just cannot be overcome by slick-salesmanship, good marketing or even divine intervention. And historically, it's an easy to prove case also.

The cloud while nothing revolutionary, does have many chops that can help your business. It can become a very good friend to your business. But, the cloud will forever be just a drinking buddy to your 'desktop'. They'll be best friends. They'll get drunk together, sometimes sing some great tunes while getting along famously, other times they'll fight like a pair of rummies & not talk to each other. But, they will become closer & share even more with each other. And, we will all look on like concerned friends, continuing to wonder how it will all end. And the cloud should accept that. So should you. And your friendly neighborhood cloud sales person.

Blog Awards Ireland Nomination

Yup, that's right. Clouded Issues has been nominated for another award. This time in the category of 'Best Technology Blog' with Blog Awards Ireland . It's nice to see the blog involved in these kind of things. Would it be nice to win? Sure, but it's nice to get it out there to people outside its core readership too.

Yet again, it is the only Cloud Computing blog nominated in its category - much like the Eircom Spiders last year. Fingers crossed - but either way, it'll be a cracking event & a cracking night (this time without the black-tie requirement 8-)  )

Tuesday, August 7, 2012

Episode 22: When the rain from the cloud is just your tears

The tale of Mat Honan's remotely wiped Apple products has now been committed to the lore of the Internet. But this tale as with any comes with a proviso that has long been the anchor of the 'superhero' story; "With great power comes great responsibility." Our reliance on technology as the super-hero in our modern life has set us up for spectacular falls, akin to any great fallen-hero story-arch.

We have great power in our hands with our smart phones, mobile devices, cloud-enabled hand-held & remote technologies, & yet we wield these powers with little to no real responsibility. Mat Honan originally supposed that his accounts were brute force attacked (something he later retracted), but days later we learn they weren't. He was the victim of social engineering; the attackers rang Apple support, managed to pass through their security protocols due to "Apple's centralised single user account approach."

Blaming Apple is easy, but the fact is we are seeing further centralisation of our online lives with more & more of our accounts & services being linked together via our Twitter, OpenID or Facebook accounts. Each node we link in this way just increases our vulnerability. With security compromises of user databases on the rise, our entire 'digital life' faces compromise from any one of the countless services we interlink.

But that's not even the bigger risk. Publicising information about ourselves in such a carefree manner on social networking sites gives 'hackers' (calling them this when we make it this easy for them denegrates those who are 'real' hackers) less work to do when searching for information to use against us in a social engineering scam, when they wish to target someone.

The real threats as a result of our digitalisation is not our own personal Twitter, Facebook, LinkedIn, or Tumblr accounts - the real risk is our employers, & our businesses. As we increase the drive towards BYOD, our personal & business accounts become increasingly intermingled, something Honan discovered when his employer Gizmodo experienced as part of his account compromise, where tweets from Gizmodo were sent by the hacker.

Very few security breaches today are carried out by brute force. Most are the net results of social engineering, or end user stupidity - the breaches of Irish Department of Foreign Affairs systems by people linked to Anonymous earlier this year showed that stupidity really was the over-arching issue, with passwords such as 'Password1', which demonstrated two failures;
  1. A failure culturally within the Department of Foreign Affairs ICT to educate users about the security of ICT systems, & to ensure a clear understanding of the requirement to always operate a 'strong password' policy
  2. A failure of the users themselves to understand that given the sensitivity of information they handle from where they work, that security should always be to the forefront of their thoughts when working within ICT systems
Security breaches are often where 'hacker' opportunism meets 'end user complacency'. I have always maintained that the biggest threat to any business is not external, but at every level inside a business, even more so at executive level. Social Networking as powerful a tool as it is for good to be used by us, can just as easily be turned against us at a moments notice.

To protect you from yourself, there are a few simple steps I would recommend & suggest:
  • every time you "link" a social media account to another account or app, ask yourself "Am I really happy with this connection being made permanently? What's this company's history on security like?"
  • If you authorise an app to link to one of your social networking accounts, regularily review that connection - if you don't find yourself using it often, revoke access until it is absolutely needed again - don't leave authorisations blindly open
  • Who can view your social networking streams? How much information do the reveal about you? Perhaps the only people who should see your streams are those you know, & not the great wide world.
  • Are your personal passwords themed with your work password choices? If they are, address it immediately. 
  • Do you save passwords in your browsers, or directly in applications? If so, remove them. Then change your passwords.
  • Is your password comprised of a word with numbers, even with capitals? If so, this is hacker101 from a dictionary list. Even words where letters are replaced with numbers are straight from hacker101; i.e. 'l33t' should ring a bell with most.
  • Do you use the same password for multiple services? If so, this is a rookie mistake, & often how many online gamers accounts get compromised. Using the same password or variants of over & over is just putting you one step at a time closer to getting burned. Badly.
  • Ask yourself can anything I reveal or have revealed on my social networking sites help lead someone to one or more of my passwords? If your answer is 'yes' or 'I'm not sure', you've a problem you need to address.