What Does The Wizard Of Woz Have Against Cloud Computing? Part 2

What Does The Wizard Of Woz Have Against Cloud Computing? Part 2

The Wizard Of Woz  – Part 2

This is the concluding part to an earlier article. Now that we know what Steve Wozniak, one of the greatest technical minds of our time, had to say about cloud computing (and why he said it), let us look at the issue through several different lenses.

One is the lens of frivolity. This may be an easy way to dismiss Wozniak’s criticisms by citing the casual nature of the interaction and the range of issues covered – from public education (he once did a stint as a school teacher) to reality TV (having participated in “Dancing with the Stars”). However, considering that Wozniak had followed up his remarks with a strongly worded post within three days, this reason doesn’t hold water. Next comes the lens of personal prejudice. This is somewhat borne out by the fact that Wozniak, in his aforementioned post, cited an unpleasant personal experience to bolster his criticism of cloud computing. While there’s no denying that problems like the ones mentioned by him do exist, can it wish away the multiple benefits in performance and cost-effectiveness businesses going on the cloud are seeing? If not, doing away with cloud computing will be akin to throwing the baby out with the bathwater.

Also, there’s a possibility that Wozniak, in spite of his tremendous intellect and technical prowess, is just wrong. And he will not be the first intelligent person who has failed to get the grips on new technology. If we consider cloud computing, one may recall what Oracle CEO Larry Ellison had to say about cloud computing not too long ago – “What is it? It’s complete gibberish. It’s insane. When is this idiocy going to stop?” Contrast that with he says today.

Even beyond the realm of the clouds, here are some quotes attributed to doyens of the IT industry:

I think there is a world market for maybe five computers.” – Thomas Watson, chairman of IBM, 1943.

There is no reason anyone would want a computer in their home.” – Ken Olson, chairman and founder of Digital Equipment Corp., 1977.

And here are some quotes from beyond IT that proved to be disastrously wrong, even if they did come from reputable source:

The Americans have need of the telephone, but we do not. We have plenty of messenger boys.” – Sir William Preece, chief engineer of the British Post Office, 1876.

Radio has no future. Heavier-than-air flying machines are impossible. X-rays will prove to be a hoax.” – Lord Kelvin, British scientist, 1899.

While theoretically and technically television may be feasible, commercially and financially it is an impossibility.” – Lee DeForest, inventor.

The point I’m trying to make is this: advances in technology can often stump the most brilliant of minds.

Of course, now we come to the final view – Steve Wozniak is absolutely right. While I’m not averse to admitting that cloud computing does have problems, I’m not willing to think that, as Wozniak said, “the cloud sucks.” Reader comments are invited.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…