GDPR Compliance

System Vulnerabilities Are an Issue for Everyone in the Cloud Environment

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the system of a single provider
Atman Rathod

UX Design in the Age of DevOps: Transformation Through Collaboration

UX Design in the Age of DevOps DevOps is popular among modern IT strategists because it leaves no scope for lapses in the development process. It incorporates a holistic approach to software development by bringing together agile development and continuous iteration from the operations team.

Forget About the Coming AI Apocalypse. We have Bigger Fish to Fry. How Did Tax Day Work Out for You?

Our government computer systems are so old they crash when Americans try to file their taxes. Worried about North Korea? Worry more about the senile machines launching our missiles. Houston we have a problem.

AI will take our jobs. Google and Facebook will take our privacy. Ya-da, ya-da, ya-da! It’s time for a little perspective. While we are all waiting for the rise of the machines how about at least having them provide some of the basic functions of government. I don’t like paying taxes anymore than the next person, but when the IRS has to extend the filing deadline because its computers broke, I think it’s time to take notice. In fact, if the hairs on the back of your neck did not stand up when this was announced you’re missing a key and scary piece of our modern life – the systems all around us are old and fragile.

The pundits and the press love to alternately dazzle or terrify us with the wonders of today’s and tomorrow’s technology. No doubt about it. The devices and applications we use today would seem like sci-fi some years ago and more like magic a few years before that. But the computer age is 70 years old and with it comes a long tail of legacy systems upon which we still depend.

This stuff is so old that the people who created it are long gone and the few and fewer who understand it are disappearing, too. Sure the government is notorious for being behind when it comes to the everyday IT stuff. But they are just the most public. There is a good chance parts of your insurance, banking and investments sit on similar legacy systems. Do you think these commercial institutions would disclose that and risk losing customers?

Most of these are written in the ancient computer language of COBOL (circa 1957). According to Gartner, COBOL apps comprise 60% to 80% of all business applications worldwide (and 90% of financial transactions). The world is not what you think it is. Just look behind the curtain and you’ll see incredibly old code still running. A couple of years ago the Government Accounting Office (GAO) surveyed the oldest systems in the government. Here’s the list. Read it and weep. (Don’t worry despite the fact that the list is two years old, nothing has changed.)

I particularly “like” No. 3: “Strategic Automated Command and Control System”. Developed in 1953 it is just what you think a scary title like that would be. The system coordinates U.S. nuclear forces! It runs on 1970s-era IBM computer systems and uses 8-inch floppy disks. (The storage capacity of these is so small that this blog post alone would need ten of them.)

Think about it. We have a 65-year-old computer system coordinating the delivery of nuclear weapons by 63-year-old B-52’s and 48-year-old Minuteman III missiles. You just can’t make this kind of nightmare scenario up. Calling Doctor Strangelove! Calling Doctor Strangelove!

What can be done about this? Well, I’ve got bad news and good news. First, the bad: when it comes to the government and information technology we are truly screwed. It’s the demographics and the acquisition process that are killing us. OPM reports that for every Federal IT worker under 30 years old, there are 4.5 are over 60. These folks came up in the days of mainframes.

Remember the Cloud (our latest computing platform) is only ten years old. Sadly, today’s government IT folks struggle with this new paradigm and the Feds cannot recruit the new talent needed to take us into a new age. Couple that with a Federal acquisition process that virtually assures you’ll get yesterday’s technology, tomorrow (See:, VA’s VISTA modernization, IRS modernization, etc.) and we’re doomed.

OK, how about some good news. In the commercial world there is some hope. According to a 2016 Gartner report, “structured data archiving technologies help IT leaders retire legacy applications, reduce capital and operating expenses, and meet governance and compliance requirements.” In the report, Gartner estimates that “the size of the structured data archiving and application retirement market is $287 million and growing at a compound annual growth rate of 10%.”

Importantly, Gartner notes “the market, which started as a cost containment measure for data growth in active applications, has largely transitioned to a vehicle for application retirement as the primary use case”(emphasis mine). So, even in the commercial world with the heat of competition the pace is modest.

Just for grins here is a test. Take a look at all the systems you interact with at work, school, or where ever. How many are old? Don’t be fooled by a fancy/colorful user interface that may have been slapped on a few years ago. That is the proverbial lipstick on a pig. I’ll bet you’ll be shocked at what you find.

By John Pientka

John Pientka

John is currently the principal of Pientka and Associates which specializes in IT and Cloud Computing.

Over the years John has been vice president at CGI Federal, where he lead their cloud computing division. He founded and served as CEO of GigEpath, which provided communication solutions to major corporations. He has also served as president of British Telecom’s outsourcing arm Syncordia, vice president and general manager of a division at Motorola.

John has earned his M.B.A. from Harvard University as well as a bachelor’s degree from the State University in Buffalo, New York.

View Website
Steve Prentice CloudTweaks

How Printers Help Hackers Hide In Plain Sight

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the ...
Mark Casey Apcela

How to Optimize Your Office 365 Performance with Network Peering

Optimize Performance with Network Peering Microsoft Office 365 usage has grown significantly in recent years. More than 56 percent of organizations all around the world ...
Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges Every December, security experts begin to release their predictions on what future cybersecurity challenges will look like in the coming year. “The ...
cyber security concerns

IOT Infographic – What Is The Internet of Things?

WHAT IS THE INTERNET OF THINGS? The Internet of Things “We’re still in the first minutes of the first day of the Internet revolution.”  - Scott ...
Cisco News

New Crosswork APIs Help Service Providers Automate Network Operations

Due to changes in customer preferences, and technological evolutions such as 5G, Service Providers (SPs) are expected to face massive traffic growth and increased operational complexities. To make the most ...
USA today

Want to break up ‘Big Tech’? Don’t fall prey to these misconceptions

Advocates and opponents of breaking up Facebook, Google and other technology giants are falling prey to some serious misconceptions This article was written by Bhaskar Chakravorti, Dean of Global Business, The ...

New York Times – Google and Facebook Are Quietly Tracking You on Sex Websites

A new study scanned 22,484 pornography sites and found them riddled with trackers from major technology companies Silicon Valley’s biggest companies are always watching you — even when you’re browsing ...