Does That Cloud Smell Like Burning Rope?

Does That Cloud Smell Like Burning Rope?

Does That Cloud Smell Like Burning Rope?

When we report on the rise in Cloud Computing it is easy to focus on the bold moves that entrepreneurs are making, and the innovation and technical wonder that goes into producing unbelievably gargantuan server centers. It is not uncommon to forget the experience of the tech workers down in the trenches, the ones who spend their working lives focused on their screens, furiously tapping away at their keyboards, keeping the Cloud doing what the peace-cafeCloud does.

What does it take to deal with such intense, day in day out time working immersed in the virtual world? According to recent reports, more and more Silicon Valley employees are turning to “herbal help”. It should come as little surprise that marijuana is popular in the San Jose area, given Silicon Valley’s relative proximity to San Francisco and Haight-Ashbury. There may be a generational difference between denizens of Silicon Valley and the Hippies of the Haight, but the cultural ties are there.

What is different is the growing acceptance of marijuana as medication. It is a difficult to say whether the appeal is therapeutic or recreational. However, there are more than 100 medical marijuana dispensaries in San Jose, many within blocks of Cisco Systems, Google, Adobe Systems, Apple, and eBay. The pot stores report that as much as 40% of their customer base is in the tech industry.

The tech giants are not pleased with the thought of their workers being stoned, of course. Both Cisco and Adobe have strong company policies against workers using drugs, but neither company screens applicants for drug use. Reportedly, companies are finding it more difficult to find candidates who can pass a pre employment drug test.

As interesting as the alleged high incidence of marijuana use among tech workers is, the medical marijuana industry in San Jose and elsewhere is far from a sure thing. The “industry” received a serious shot in the arm in 2009 when the Obama administration announced that it would not prosecute medical marijuana related cases. However, the “industry” is still run by, well, potheads.

Silicon Valley investors are beginning to see potential in the industry, however. The founders of Privateer Holdings have experience appraising ventures like the Tesla and Fisker electric cars and Groupon. The group is now raising funds, including some crowd-sourcing, to help finance legitimate marijuana enterprises.

By Peter Knight

Image Source: http://en.wikipedia.org/wiki/Haight-Ashbury

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…