August 10, 2012
After a performance of Mike Daisey's "The Agony and the Ecstasy of Steve Jobs" in Washington DC, Apple co-founder Steve Wozniak expressed concerns about cloud technologies. During a question and answer session after the show, the mastermind behind the immensely popular Apple II didn't hold back, saying there would be "horrible problems in the next five years" adding, "it's going to be horrendous." His comments echoed similar worries captured in cloud computing surveys: unease about the loss of control associated with cloud services. Phys.org covered the story in an article earlier this week
Wozniak's primary complaint about cloud technology is that services give end users a false sense of security regarding the ownership of their data. He went on to say:
With the cloud, you don't own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to. I want to feel that I own things … A lot of people feel, 'Oh, everything is really on my computer,' but I say the more we transfer everything onto the web, onto the cloud, the less we're going to have control over it.
As if to prove Wozniak's point, earlier this week tech reporter Mat Honan fell victim to a hack, which compromised his Google and Twitter accounts. Also, his iPhone, iPad and MacBook Air were remotely wiped as the hacker(s) gained access to his iCloud account. He described the incident in detail a few days ago.
While Honan's issues were certainly unfortunate, he blamed himself in part for failing to regularly back up critical data. On the other hand, it appears the exploit was more human error than technical. The hackers gained entry into Honan's digital life through faults in customer service operations at Apple and Amazon. An Apple representative gave the hacker access to Honan's iCloud account, which began the chain of events.
Network World has reported that Apple and Amazon have since updated their security practices to avoid similar events in the future. They also spoke with Alan Shimel, managing partner at The CISCO Group, who provided some insights regarding the matter. His suggestion is that cloud providers need to move beyond passwords, explaining that end users would be more secure with a two-factor method of authentication.
Apple may already be working on new end user security standards, as they recently agreed to acquire AuthenTec for $356 million. The company was known for enabling secure access to networks and mobile devices with identity management and fingerprint scanners.
Ultimately, security concerns exist in all technologies and cloud services are no exception. As long as end users are aware of the potential threats, they can better protect against unwanted access.
Image caption: Steve Wozniak of Apple Computer, Inc. in the late 1970s with an Apple II model personal computer. Source.
The ever-growing complexity of scientific and engineering problems continues to pose new computational challenges. Thus, we present a novel federation model that enables end-users with the ability to aggregate heterogeneous resource scale problems. The feasibility of this federation model has been proven, in the context of the UberCloud HPC Experiment, by gathering the most comprehensive information to date on the effects of pillars on microfluid channel flow.
Large-scale, worldwide scientific initiatives rely on some cloud-based system to both coordinate efforts and manage computational efforts at peak times that cannot be contained within the combined in-house HPC resources. Last week at Google I/O, Brookhaven National Lab’s Sergey Panitkin discussed the role of the Google Compute Engine in providing computational support to ATLAS, a detector of high-energy particles at the Large Hadron Collider (LHC).
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.