Gmail Outage – Is Cloud Computing To Blame?

Gmail Outage – Is Cloud Computing To Blame?

“There are no secrets to success. It is the result of preparation, hard work, and learning from failure.”
– Colin Powell, former US Secretary of State and Chairman of US Joint Chiefs of Staff.

Unless you are living under a rock, you must have come across the story of the Gmail outage a fortnight back. The question several observers are asking is, “Is cloud computing to blame?

First, here are the facts. On Sunday, 27 February, Gmail became inaccessible for some hours. When it did come back, several users were surprised to see their inboxes empty, other than two welcome messages from Google. Needless to say, they weren’t very pleased with it.

What added to their consternation was Google’s response, or rather lack of it. While it did put up a blog post assuring Gmail users that only 0.02% of users have been affected and that data recovery efforts were in progress, it did not give a timeline for the restoration to be completed. And there was good reason for Google’s reticence in declaring a time frame, considering it took them more than three days to solve the problem.

On Tuesday, 1 March, there were two updates at an interval of four hours. The first one said that service “has already been restored for some users, and we expect a resolution for all users in the near future. Please note this time frame is an estimate and may change.” This was followed by the update that “data for the remaining 0.012% of affected users has been successfully restored from tapes and is now being processed. We plan to begin moving data into mailboxes in 2 hours, and in the hours that follow users will regain access to their data. Accounts with more mail will take more time.

Finally, on Wednesday night (2 March), Google reported, “The problem with Google Mail should be resolved. We apologize for the inconvenience and thank you for your patience and continued support. Please rest assured that system reliability is a top priority at Google, and we are making continuous improvements to make our systems better.”

Now, Gmail is perhaps the most widely-used cloud computing-based service in the world today. Therefore, when it fails, even if only for three days, it does give rise to doubts on the dependability of the technology itself. Especially since Google had to resort to good old tapes to resolve the problem.

As for my opinion, I don’t believe that cloud computing as a whole should be blamed here. Yes, there were issues, but to use those as an excuse to deride or abandon cloud computing is akin to “throwing the baby out with the bathwater.” While multiple data centers as used in a cloud do provide redundancy, that quality is seriously undermined if the same software bug is allowed to penetrate each one of these data centers, as happened in this case.

Let’s look at one of the proposed alternatives to a cloud-based Gmail. Suppose all Gmail archival data is stored on tapes in a physical location, and that location is struck by an earthquake which destroys all the tapes, then how is that option any safer?

Here’s what CBS News technology correspondent Larry Magid had to say on the matter: “Look, anything has its risks. Any time there is an air disaster there are people who talk about why we shouldn’t fly, and then there are others who say, yes, but if you look at it compared to all the other ways of traveling, it’s much, much safer. I think that’s kind of what we’re dealing with right now. We did have – I wouldn’t call it a disaster – we had a serious problem, and it’s causing people like yourselves to question cloud computing. But you also have to look at it from the other side. For example, I am very capable of messing up my own system, thank you very much. Hard drives can crash; there are all sorts of risks on any type of technology. If you trade the hard drive for the cloud, in my opinion, you greatly decrease the risk of losing email.”

What people seem to forget is that cloud computing is a new technology scarcely a decade old, and consequently, vulnerable to teething problems (See: A History of Cloud Computing). Although I am in favor of the technology, I don’t deny the existence of manageable risks (See: Cloud Computing Risks (And How to Deal With Them). However, if weighed against the multiple benefits cloud computing offers (scalability, efficiencies, savings, etc,), the risks are definitely worth it.

As General Powell said, (the quote at the beginning of the article) learning from failure is one of the crucial ingredients of success. As long as Google learns from this incident, especially of the importance of true redundancy, cloud computing’s future is secure.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…