Welcome!

Agile Computing Authors: Liz McMillan, Jonathan Fries, Elizabeth White, Craig Lowell, Pat Romanski

Related Topics: Release Management , @CloudExpo

Release Management : Article

Assange, WikiLeaks, Cloud, and Fascism Renewed

The WikiLeaks Acolytes Are Catalysts for the Opposite of What They Want

Cloud Computing has been flexing its muscles over the past week, much to the discomfiture of the American government and numerous other diplomats worldwide.

The ability for Julian Assange and his acolytes to keep the information flowing on the one hand, and to paralyze websites of those that they oppose on the other, demonstrates the original brilliance of the Internet's decentralized structure and protocol.

These cyber-gymnastics will, unfortunately, most likely provoke a reaction opposite of that intended by WikiLeaks and its supporters. 

Rather than bullying governments into a new era of transparency and disclosure, it is likely to unleash an underlying fascism that will manifest itself in increased calls for insane ideas like Internet kill switches, international prior restraint treaties, and strengthened Patriot Act-type nonsense under the guise of anti-terror laws.

If you think the American government has acted fascistically in the past, well just wait, you ain't seen nothin' yet. Just as it is now clear that the so-called War on Terror transcends political parties, it will become equally clear that a riled-up donkey is at least as dangerous as an angry elephant.

Who Is On Your Side?
Well played, laddies! You now have noted democracy icon Vladimir Putin on your side, and somewhere, China's leaders are smiling.

It struck me as ironic that many of the world's most technically adept people--ie, geeks--are now telling diplomats how to do their jobs. I can't think of a less diplomatic gathering than a roomful (real or virtual) of geeks; perhaps a room full of umpires or DMV employees.

Opaque, misleading, treacherous diplomacy has been a fixture of all civilizations for thousands of years. The revelations coming out of the WikiLeaks diplomatic cable fiasco hardly seem to qualify as anything of a major major nature.

As one German diplomat has commented, "you should hear what we say about you (Americans.)" And anyone who's ever worked in an organization of any size can no doubt recount politics and business moves of a far dirtier nature than anything that's come of light from the WikiLeaks leaks.

Diplomatic Code
But the episode does make me wonder what would happen if geeks ran the diplomatic corps. I guess we'd have reports of "a frank exchange of flame," "agree to mutually trash one another," and "my esteemed hopeless idiot colleague."

The flip side of this is the question of what would happen if diplomats wrote software?

If diplomats had created MS-DOS and Windows, for example, we'd have had the Blue Screen of Denial all these years. The Mac OS would throw a smiley face your way rather than a bomb when it crashes.

There would be no "404 error - page not found" but instead a "404 episode - page accord expected." You would never have a "registry error," but instead a "senior-level communique."

In a world of software created by diplomats, we'd no doubt be faced with inscrutable error messages, a confusing welter of non-standard standards, defiant stonewalling from companies whenever anything went wrong, and an inability to find out for sure what is really going on inside our systems.

Oh wait, maybe diplomats did write all this software after all! Maybe geeks are the same people, playing some sort of double-role spy game on the rest of us.

What is True?
Or maybe geeks are simply the yang to diplomats' yin--whereas diplomats are liars who speak facts as if they are opinions, geeks are truth-tellers who speak opinions as if they are facts.

The DDOS attacks on Visa, Mastercard, et al perfectly demonstrate the concept of the anti-corporate tripwire that exists in the minds of so many of Assange's supporters. These folks are just waiting for an excuse to launch against one of the evil corporate masters who control the world today. 

Their mission is a political mission, one that should be viewed as an outlier position within the political spectrum.

To my mind, there's nothing inherently wrong with that. Accepted political debate in the US these days, for example, maddeningly runs the gamut from slightly center-left to slightly center-right.

But the idea that a "war" has been declared is the sort of dangerous talk that gets people killed. The famous Churchillian dictum that "jaw jaw" is preferable to "war war" is an evergreen.

One of Mr. Assange's stated goals is to end the war in Afghanistan. Well, who's against that except for all of the powebrokers in Afghanistan who benefit from the continued largesse of the US and its increasingly slim roster of allies?

Setting aside for a moment whether he's chosen a wise way to pursue his goal, one has to ask how declarations of a new war from some of his backers will end the old one.

War talk is cheap to create, but becomes dreadfully expensive when taken seriously. And you can believe with all of your heart and soul that the US government is taking it seriously, and actively (joined by the tacit approval of the usual suspects who enjoy letting the US be the bad guy in geopolitical affairs).

It's time for the geeks to tone down the rhetoric a bit, to stop promulgating the "fact" that Mr. Assange is some sort of political prisoner, and to stop using WikiLeaks activity as a pretext to act on pre-conceived conspiracy theories about American arrogance and corporate malfeasance. 

Keep it technical, laddies.

Go ahead and mirror WikiLeaks utnil you've run out of IP addresses; but keep the war talk and actual cyberattacks to a minimum, please. It's not helpful, and is likely to provoke the opposite reaction from what you intend. Read this scolding from Reporters Without Borders to get the big picture: http://bit.ly/9lgLGE

More Stories By Roger Strukhoff

Roger Strukhoff (@IoT2040) is Executive Director of the Tau Institute for Global ICT Research, with offices in Illinois and Manila. He is Conference Chair of @CloudExpo & @ThingsExpo, and Editor of SYS-CON Media's CloudComputing BigData & IoT Journals. He holds a BA from Knox College & conducted MBA studies at CSU-East Bay.

@ThingsExpo Stories
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...