Welcome!

Cloud Security Authors: Elizabeth White, Maria C. Horton, Liz McMillan, Ravi Rajamiyer, Pat Romanski

Related Topics: @CloudExpo

@CloudExpo: Article

Ahmad's War Provides Chance to Discuss Cloud

IT's Benefits Are Highest in the Most Forbidding Places

I had a chance to read the book, Ahmad's War, Ahmad's Peace, recently, published in 2005 and written by longtime NPR international correspondent Micahael Goldfarb. It is the story of a writer and teacher, Ahmad Shawkut, who suffered greatly under Saddam Hussein, then thought he had achieved intellectual freedom when Hussein was ousted, only to be murdered during the early days of the US occupation in Iraq.

The book had nothing to do with Cloud Computing, or technology for that matter, other than to offer brief descriptions of the satellite phones in use there and to note that Iraqi police stations had no computers. Its author generally maintained a measured tone throughout, with occasional bursts of rage when describing the gulf between what supercilious commentators in the US say happened versus what really did happen to many ordinary Iraqi citizens during this war.

Yet it struck me as another example of a place where IT could and should be used as a true liberating force.

IT Irony in the US and UK
There is appalling irony, and lots of it, in the US and UK today regarding how IT has been turned into a weapon by these countries' governments against their people. Ubiquitous cameras throughout London have now given the British government a perpetual view of its citizens acts and perhaps intentions, at least in their public lives. Meanwhile, in the US, domestic spying revelations no doubt form only the tip of an iceberg, and it turns out to be true that thousands of images of people's junk have been saved for future reference and who know what else.

Whatever one's opinion of Julian Assenge and WikiLeaks is, it seems that most would agree that Attorney General Eric Holder is being ludicrous with his "this is not saber rattling" threats to arrest a foreign citizen who published material at a foreign-based website. The US got to experience life as the world's lone superpower for a 12-year period from 1989 to 2001; it demonstrated that it was not the sort of imperium that would try to enslave the part of the world it couldn't obliterate, but also showed the world that it could not function as either the world's policeman or beacon of ethics.

Failure is the Only Option
The lost decade of the "aughts," precipitated financially by the Clinton administration's pursuit of Microsoft in court (go back and look, you'll see the dot-com crash started when Redmond was perceived as the evil empire), then socially by a mission that was not accomplished quite as expeditiously as the Bush administration thought, left the United States in an amazing financial mess, and seemingly toothless in international affairs.

The President flies to Denmark to try to convince sneering Euros to let Chicago have the Olympics. Fail. The Vice-President gets insulted by the country's Israeli allies in unprecedented fashion, only to accede to ever more demands. Fail. The President goes to India, begging for business from a nation with an average wealth 2% of the US. He moves onto South Korea, unable to secure the most basic trade agreement. He continues to Japan, where no one remembers even now that he was there. Fail, fail, and fail.

This is not a commentary on the President, but rather, the parlous situation the United States finds itself in today. These failures follow several decades of foreign misadventure, an increasingly obese and uneducated public that doesn't really like to vote much, and a debased media that thinks it's being destroyed by the Internet rather than by its own irrelevance.

Don't Abandon All Hope, Ye
But the great hope of IT as liberation technology lives elsewhere. It chips away at a priggish Chinese government's attempts to control it utterly. It serves as an invaluable tool for on-the-spot reporting of social disruption from Toronto to Bangkok. It is a key contributor to increased standards of living throughout the world, especially in those countries that are the most aggressive in its adoption, from Morocco and Senegal to Ukraine and Poland to Malaysia and Vietnam.

And Iraq. Ahmad Shawkut, in the book about him, was a dreamer, and an argumentative one, a guy who couldn't (wouldn't) put a lid on his opinions to save his own skin. He is not presented as wholly heroic, as the author notes the stress he put on his family and the futility of much of his utopian thinking. Mr. Shawkut loved the metaphysical, not the practical.

But he was undone by a place in which secrets and gossip pass quickly and unendingly through dark alleyways, as they have for thousands of years. If the police did, in fact, have some computers, if the populace did have wide access to the Web, if people were able to see beyond the limited horizon of the local ridgeline, then the Ahmad Shawkuts of the world could gain the influence they simply don't have today. Yes, in my opinion, Cloud Computing's potential to transform societies is even greater than its potential to transform datacenters.

One can only wish that the citizens of the US and UK can someday better restrain the power of their governments to misuse IT, just as other governments of the world can better bring IT's advantages to their citizens.

More Stories By Roger Strukhoff

Roger Strukhoff (@IoT2040) is Executive Director of the Tau Institute for Global ICT Research, with offices in Illinois and Manila. He is Conference Chair of @CloudExpo & @ThingsExpo, and Editor of SYS-CON Media's CloudComputing BigData & IoT Journals. He holds a BA from Knox College & conducted MBA studies at CSU-East Bay.

IoT & Smart Cities Stories
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...