Google Wins One Battle, Microsoft Wins Another, But The War Continues

Google Wins One Battle, Microsoft Wins Another, But The War Continues…

On an article published more than a year ago on January 7, 2011, I had written “Microsoft and Google have never been the best of friends, and this mutual dislike has extended to their ventures in the cloud computing space as well. Both these technology behemoths fully realize the immense potential of cloud computing and have been intensely competitive in trying to get one up on the other…..” The article dealt with Google’s lawsuit challenging the US Department of Interior’s adoption of Microsoft’s Business Productivity Online Suite, later renamed as Microsoft 365 (See: Google Wins Court Ruling Against Microsoft In Cloud Computing Contract).  Now, to add insult to Microsoft’s injury, Google ended up winning the same contract it challenged.

In early May, the Department of Interior had awarded Onix Networking, a Google Apps reseller and party to the aforementioned lawsuit, a seven-year contract worth almost $35 million. Secretary of the Interior Ken Salazar went on record  praising the merits of this move, “Implementing a Department-wide, cloud-based email system that helps modernize the ways we do business while cutting costs is good government, plain and simple.”

Microsoft, left licking its wounds, responded diplomatically. “Although we are disappointed by this award, we will engage with our partners and DOI to review and understand the reasons for this decision. Microsoft remains committed to providing our customers with the cloud services that have the performance, security, privacy and other capabilities they expect and deserve,” it said in a statement.

However, it struck back soon enough. Earlier this month, the US Department of Transportation’s Federal Aviation Administration (FAA) announced its choice of Microsoft 365 to meet its email and web conferencing requirements. The contract, worth around $91 million over a one-year base period and six option years, was awarded to Computer Sciences Corp. (CSC).

Understandably, Microsoft made its pleasure known. “The FAA’s mission is essential to how our nation functions, and the agency’s decision to implement Office 365 validates our approach to enterprise security, privacy and compliance in the cloud. Microsoft has supported government agencies such as the FAA for nearly 30 years, and as a committed partner we’ll continue to innovate in ways that help our public-sector customers improve efficiency and reduce operating costs while delivering better citizen services,” said Curt Kolcun, vice president of US Public Sector at Microsoft.

Almost every business hankers for government business, and those in cloud computing are no different. Besides the obvious large contract values, getting government approval is synonymous to convincing doubtful bureaucrats of the efficacy and efficiency of their services, something with immense commercial implications in an emerging and dynamic field of cloud computing. In other words, the value of government endorsement goes beyond immediate top line impact (See: Can the US Government “Lead by Example” in Cloud Computing Adoption?).

By Sourya Biswas

Sorry, comments are closed for this post.

Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…