Categories
Cloud

John McCarthy: Father of cloud computing dies

“If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility… The computer utility could become the basis of a new and important industry.” — John McCarthy (speaking at the MIT Centennial in […]

Categories
Cloud

VDI: Virtually Dead Idea?

I’ve been meaning to give my blog some attention (it’s been almost a year since my last post, and a busy one at that) and Simon Crosby’s (@simoncrosby) VDwhy? post seems as good a place to start as any. Simon and I are both former Citrix employees (“Citrites”) and we’re both interested in similar topics — […]

Categories
Cloud

Citrix OpenCloud™ is neither Open nor Cloud

I’ve been busying myself recently establishing the Open Cloud Initiative which has been working with the community to establish a set of principles outlining what it means to be open cloud. As such Citrix’s announcement this week that they were “expanding their leadership in open cloud computing“(?) with the “Citrix OpenCloud™ Infrastructure platform” was somewhat […]

Categories
Cloud Trademarks

Trend Micro abandons Intercloud™ trademark application

Just when I thought we were going to be looking at another trademark debacle not unlike Dell’s attempt at “cloud computing” back in 2008 (see Dell cloud computing™ denied) it seems luck is with us in that Trend Micro have abandoned their application #77018125 for a trademark on the term Intercloud (see NewsFlash: Trend Micro […]

Categories
Cloud

Introducing Planet Cloud: More signal, less noise.

As you are no doubt well aware there is a large and increasing amount of noise about cloud computing, so much so that it’s becoming increasingly difficult to extract a clean signal. This has always been the case but now that even vendors like Oracle (who have previously been sharply critical of cloud computing, in […]

Categories
Internet Security Standards

Face it Flash, your days are numbered.

It’s no secret that I’m no fan of Adobe Flash: Why Adobe Flash penetration is more like 50% than 99% Towards a Flash free YouTube killer (was: Adobe Flash penetration more like 50%) HOWTO: Fix OS X by uninstalling Adobe Flash It should be no surprise then that I’m stoked to see a vigorous debate […]

Categories
Lab Security

HOWTO: Set up OpenVPN in a VPS

If, like me, you want to do any or all of the following things, you’ll want to tunnel your traffic over a VPN to a remote location: Access media services restricted by geography (Hulu, FOX, BBX, etc.) Bypass draconian censorship Conceal your identity/location/etc. Protect your machine from attackers etc. You could of course use a […]

Categories
Big Data Standards

NoSQL “movement” roadblocks HTML5 WebDB

Today’s rant is coming between me and a day of skiing so I’ll keep it brief. While trying to get to the bottom of why I can’t enjoy offline access to Google Apps & other web-based applications with Gears on Snow Leopard I came across a post noting Chrome, Opera to support html5 webdb, FF […]

Categories
Australia Cloud

Press Release: Cloud computing consultancy condemns controversial censorship conspiracy

SYDNEY, 24 December 2009: Sydney-based Australian Online Solutions today condemned the government’s plans to introduce draconian Internet censorship laws in Australia. Senator Stephen Conroy (Minister for Broadband, Communications and the Digital Economy) recently announced the introduction of mandatory Internet Service Provider (ISP) level filtering of Refused Classification (RC)-rated content as well as grants to encourage […]

Categories
Australia Internet Politics

A word on the Australian Internet censorship scandal

I’ve had a quick scan over Senator Stephen Conroy‘s infamous, long-awaited report on the efficacy of current Internet filtering technology and find it to be nothing short of scandalous. Without getting into the nitty gritty details (for example, how a filtering solution can achieve the impossible by improving rather than degrading the performance of encrypted, random transfers), it […]