What Does The Wizard Of Woz Have Against Cloud Computing? Part 1

What Does The Wizard Of Woz Have Against Cloud Computing? Part 1

The Wizard Of Woz

When Steve Jobs died last year, the world mourned. And rightfully so. Very few in the history of personal computing and consumer electronics have had as profound an influence as Jobs, and his journey to make Apple the most valuable company in the world, even after being forced to leave the company he co-founded followed by his triumphant return, is a lesson that will be taught to business leaders for generations.

Even before the anointment of Jobs as the “Father of the Digital Revolution” after his death, he was edified as a pioneer who made Apple the epitome of innovation. While there’s no denying Jobs’ massive contribution towards bringing the iPod, the iPhone and the iPad to life, many forget the immense contribution put in by the “other Steve” at the beginning of the Apple journey. However, Steve Wozniak, or Woz (or Wizard of Woz, in allusion to the eponymous character in the famous book), deserves to be known as more than the “other Steve.”

If Jobs’ was the brain that envisioned the commercial implications of the personal computer, it was Wozniak who actually brought this vision to life through the Apple I, and later, the Apple II. While he did move away from full-time employment at Apple in 1987, he continues to be an employee there besides involving himself in several other ventures. Therefore, anything he says about technology is worth paying attention to.

Proponents of cloud computing won’t be too happy to hear what Woz had to say earlier this month about this emerging technology. “I really worry about everything going to the cloud. I think it’s going to be horrendous. I think there are going to be a lot of horrible problems in the next five years,” he is quoted as saying. He was attending a performance of “The Agony and the Ecstasy of Steve Jobs”, a controversial presentation on Apple contractor Foxconn’s labor conditions in China.

According to Wozniak, “With the cloud, you don’t own anything. You already signed it away.” He was of course referring to how the cloud consumer hands over control of information assets to the cloud provider, very much in contrast to how such assets were stored in locations under the direct supervision of the consumer.

This was not an isolated outburst from Wozniak. Following the above observations on a Saturday, he published a post in tech blog Gizmodo, aggressively titles “Why the Cloud Sucks”  explaining the reason behind his frustration with cloud computing – the loss of one of his Google calendars due to a third-party app he’d authorized to handle an upgrade.

Now, in the second and concluding part of this article, I will try to look at Wozniak’s opinion from multiple points of view.

By Sourya Biswas

Sorry, comments are closed for this post.

Comics
5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…