Bill Gates Caves In To The Cloud?

Bill Gates Caves In to the Cloud?

Apparently, even Bill Gates battled his own personal Bogeyman.

A new article penned by Austin Edwards, aka “The Motley Fool,” alleges that the technological legend was forced into an early retirement by a fear of the then unknown and upcoming “cloud.” Apparently Mr. Gates had sent a foreboding message to the top flight members of his company, alerting them to a “disruptive wave [which was] about to wash over the entire world, forever changing the way we get information and do business.” To save face, Gates would never publicly name the cloud as this “wave” and foe that even his particular genius could not hold off.

But it doesn’t require Mr. Gates’ brilliance to identify cloud computing as the new tech vogue with the vroom to endure. Its reach has already crept into how the general public interacts with the Internet, and has even influenced how people communicate with one another within the Web. In his article, the Motley Fools expands his argument by comparing this boom in cloud computing to the advent of electricity.

Everyone can simply ‘tap into’ the cloud,” he believes, in order to access a gamut of tools and resources that sustain businesses and personal lives both on and away from our computers. “[Just] like [with] electricity,” the cloud is becoming an “enormous” industry.

But “enormous” doesn’t equal invincible. Gates’ Microsoft continues to rank as a vanguard within the cloud, having shape-shifted as an strategy of adaptation to modernity, or of survival in futurity. A bevy of well-advertised products, including Microsoft 365, Windows Azure, and the management- and security-specific Windows Intune, trends well with consumers. Not to mention the brand-name appeal: people are just more likely to buy a cloud product with Gates’ stamp prominent.

The thorny riskiness inherent to the cloud also continues to lodge itself deeper in the technology’s side. Should a cloud company suffer a power outage, organizations involved with it ache in turn. Such a threat will always prevent cloud computing from maximizing its potential to trounce Microsoft and other such juggernauts.

In actuality, the cloud is slowly but surely threatening substantial upheaval to another big hitter: the corporate world. Jobs centered on internal IT development within this sector are on the fence, with cloud computing brandishing an ax not far away. Up to half a year is required to develop a new corporate server; in the cloud, that time shrinks to mere hours. Plus, the cloud is also reducing the need for copious staff to maintain the groundwork once in place.

Perhaps the cloud never truly played the role of Gates’ Bogeyman; it was too busy consternating corporate America.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…