The Google File System makes NSA’s hack blatantly illegal and they know it

nsa_google_snoopThe latest Edward Snowden bombshell that the National Security Agency has been hacking foreign Google and Yahoo data centers is particularly disturbing. Plenty has been written about it so I normally wouldn’t comment except that the general press has, I think, too shallow an understanding of the technology involved. The hack is even more insidious than they know.

The superficial story is in the NSA slide (above) that you’ve probably seen already. The major point being that somehow the NSA — probably through the GCHQ in Britain — is grabbing virtually all Google non-spider web traffic from the Google Front End Servers, because that’s where the SSL encryption is decoded.

Yahoo has no such encryption.

The major point […]

How Big Data is destroying the U.S. healthcare system

denied-stampOne thing I find ironic in the current controversy over problems with the healthcare.gov insurance sign-up web site is that the people complaining don’t really mean what they are saying. Not only do they have have little to no context for their arguments, they don’t even want the improvements they are demanding. This is not to say nothing is wrong with the site, but few big web projects have perfectly smooth launches. From all the bitching and moaning in the press you’d think this experience is a rarity. But as those who regularly read this column know, more than half of big IT projects don’t work at all. So I’m not surprised that […]

Privacy is dead and here’s how

privacy-do-not-disturb

My friend Dave Taht, who battles bufferbloat for us all, pointed me today to a document from the Wireless Internet Service Provider Association. It’s the WISPA CALEA Compliance Guide, which details most of the rules that wireless ISPs are required to follow by CALEA — the Communications Assistance for Law Enforcement Act of 1994. These rules, variants of which apply to all telcos and to ISPs of all kinds (not just wireless), say what those companies are required to do to comply with the law. More directly, it specifies how they can be required to intercept customer communications and relay that content to law enforcement agencies.

Read it if you have a moment. The document, which is […]

Mainframe2 runs super-powerful Windows apps in the cloud

Screen Shot 2013-10-15 at 10.50.39 PMMy friend Nikola Bozinovic (say that three times fast) is a very sharp software developer originally from Serbia who has, over the years, worked for most of the usual suspect American software companies. He is also the guy who restored from a grotty old VHS tape my film Steve Jobs — The Lost Interview. And as of this week he’s the CEO of Mainframe2 (now called Frame — Bob) , an exciting startup strutting its stuff at the DEMO conference in Santa Clara. Mainframe2 claims it can put almost any Windows application into the cloud, making apps usable from any device that can run a web browser supporting html5. […]

Breaking Moore’s Law

642px-Moores_law_(1970-2011)No law is more powerful or important in Silicon Valley than Moore’s Law — the simple idea that transistor density is continually increasing which means computing power goes up just as costs and energy consumption go down. It’s a clever idea we rightly attribute to Gordon Moore. The power lies in the Law’s predictability. There’s no other trillion dollar business where you can look down the road and have a pretty clear idea what you’ll get. Moore’s Law lets us take chances on the future and generally get away with them. But what happens when you break Moore’s Law? That’s what I have been thinking about lately. That’s when destinies change.

There may have been many […]