Public policy and privacy

Public policy issues such as privacy, technology industry economic development, education to support technology workers, and so on. Privacy in particular, whether or not strictly tied to public policy.

November 16, 2008

I’ll be on DC-area radio Monday 11/17. An MP3 will be available.

I am to be interviewed at 7:28 am Monday 11/17 on Federal News Radio, AM 1500 in the DC area. That’s also an internet radio station. The producer writes:

We’ll zap this interview to the entire Maryland/VA/DC tri-state area. We’ll also stream it live at federalnewsradio.com. And afterwards, we’ll archive it online in its entirety (MP3 format).

Hopefully I’ll get a more precise link to the archive once it’s up, in which case I plan to edit it into this post.

The subject is what Obama should look for in a CTO, and what the Obama Administration’s technology priorities should be. This interview was surely triggered by my post arguing the new United States CTO needs to be more of a CIO, and the Slashdotting of same.

Related links

November 10, 2008

Who should Obama appoint as United States CTO/CIO?

During the campaign, Barack Obama promised to appoint a national Chief Technology Officer. Naturally, vigorous discussion has ensued as to who that should be. I’ve been right in the thick of it:

Much of the blogosphere and trade press discussion started out silly, speculating on Eric Schmidt for the job and so on. Richard Koman was one of the first to analyze the subject more sensibly. But now Dan Farber has weighed in with a great post, looking at the practicalities of the position in detail, which was quickly echoed by his old partner Larry Dignan.

Getting Federal IT straight is a VERY difficult job. It’s also utterly crucial. I hope the Obama Administration gets it right.

November 7, 2008

Technology highlights of the 2008 US Presidential campaign

I’ve been writing quite a bit over on A World of Bytes about the technology used in the 2008 Presidential campaign. Subjects included:

I’m also writing over there about what I think the Obama Administration should do with respect to technology policy. First up is a ringing recommendation of Charles Rossotti for CIO/CTO. More to follow.

September 22, 2008

Good riddance to Secure Computing

McAfee has announced a takeover of Secure Computing, ending that company’s independent existence. To this I can only say: It’s about time! Early this century, I was asked to revive my old investment research career and find stocks to short. A promising candidate turned out to be Secure Computing, whose main product lines included:

The short idea was in large part that the firewall-on-a-board idea had caused great overoptimism, stoked by the company. On further digging, I found that CEO John McNulty’s resume, as stated for example in Secure Computing’s SEC filings, seemed inconsistent with his resume as stated in SEC filings of his prior employer. Nobody seemed to care much about correcting that, however. Read more

January 10, 2008

Richi Jennings changed physics, and I didn’t even notice

While ego-surfing, I found something I let slip by last April. Responding to my views on network neutrality, Richi Jennings pooh-poohed my claim that low latency is important. Specifically, he said:

Here’s the thing… Those of us that live the other side of the Atlantic live with 250ms latency every day, when we connect to services hosted in North America. I dare say the same is true for those on the other side of the Pacific. There’s not much getting around the speed of light.

Now, I’ll confess to not being the greatest of networking mavens, my networking startup and my various relationships with Network World notwithstanding. Truth be told, I dropped out of a physics major when the only uncompleted course was electronics lab. But before I dropped out, I did get the speed of light drilled into me. It’s 186,000 miles/second, aka 3 x 10^10 cm/sec. (“Not just a good idea; it’s the law!”). 186,000 miles, I’m quite convinced, is a lot more than 4 times the difference across the Atlantic Ocean. And the same remains true even when you knock off 50% or so because that light is traveling through glass rather than in a vacuum.

April 27, 2007

My Network World column and outside links on network neutrality

Oops! It turns out Network World ran my column on network neutrality and Tariff Rebate Passthrough on April 23, not April 30 as I previously believed. So I should have gotten my list of outside links together sooner. Sorry. Confusing matters further, my post on Jeffersonet vs. Edisonet got Slashdotted, without me having provided a link to the column itself. Well, here goes.

April 17, 2007

Link list for network neutrality

My April 30 Network World column is scheduled to be on network neutrality, with this post linked out as a guide to further research.

Some of my own writings on the subject include:

I’ll supply some outside links on the subject later on.

April 17, 2007

The two Internets, Jeffersonet and Edisonet, and why they need to be regulated differently

Edit: This post was Slashdotted, along with Richi Jennings’ reply.

In a way, proponents and opponents of network neutrality are both correct! That is, they are each correct about different aspects of the Internet.

Net neutrality is both necessary and workable for what I call Jeffersonet, which comprises the “classical”, bandwidth-light parts of the Internet. Thus, it includes e-mail, instant messaging, much e-commerce, and just about every website created in the first 13 or so years of the Web. Jeffersonet is the greatest tool in human history to communicate research, teaching, news, and political ideas, or to let tiny businesses compete worldwide. Any censorship of Jeffersonet – even if just of the self-interested large-enterprise commercial kind – would be a terrible loss. Net neutrality is workable for Jeffersonet because – well, because it’s already working just fine. Jeffersonet doesn’t need anything beyond current levels of bandwidth and reliability. So there’s no reason to mess with what’s working, other than simple profit-hungry greed.
Read more

January 5, 2007

David and Richi on Cisco and Ironport

The Ferris Research lads offer a succinct analysis of the Cisco/Ironport deal. As an old software stock analyst, I was particularly struck by their estimates that A. Cisco paid over 10 times revenue for Ironport and B. Ironport’s revenues weren’t growing. Even more interesting in my opinion is what Richi said to me by e-mail in response to a query, namely (emphasis mine):

Yes, clearly IronPort’s reputation data is part of the prize for Cisco. …

An interesting question is what will happen (if anything) with SpamCop. IronPort deliberately ran SpamCop at arm’s length as a matter of policy. I wonder if Cisco will maintain that policy. SpamCop is of course part of the raw data feeding into SenderBase, along with the data phoned home by the IronPort boxes.

As we’ve seen with the BlackSpider acquisition by SurfControl, spam control companies that aggregate lots of data about spam sources are valuable, for reasons in addition to spam control. If a zombie is sending spam, it’s also probably a potential source of other bad stuff, such as worms and DDoS connections.

Quite possibly, one of Cisco’s goals (dreams?) for this acquisition is to put a whole lot of sender policing into the network infrastructure. Mainly, that’s a good thing — but like most kinds of internet policing, that technology also has the potential for abuse.

In that vein, I note that the Ferris guys say Ironport’s big competitor was Ciphertrust, acquired by Secure Computing. Well, in my opinion Secure Computing are bad guys, or at least were as of my research a few years ago. They have long helped enforce nationwide Web censorship in Saudi Arabia; they got dinged by the SEC for early for CEO stock hyping/selective disclosure; they in my opinion were guilty of a lot more hyping than that; and for the cherry on top of this ethical sundae, CEO John McNulty has a resume in Secure’s SEC filings that is inconsistent with the SEC filings of a previous employer.

November 30, 2006

Anonymizer – penetrating the Great Firewalls of China and Iran

Lance Cottrell of Anonymizer is one of those rare guys who make me believe he started a company in no small part to do good. And so his cloaking-technology company is providing free services to help Chinese citizens sneak through their national firewall, and is doing the same thing for Iran on a paid basis, under contract to the Voice of America. I think this is wonderful, and he reports that it’s working well now. Even so, I think there are scalability concerns. Right now only 10s of 1000s of users are covered. If there were a few more zeroes on that, standard spam-blocking techniques, currently ineffective, might work. What’s more, the Chinese bureaucracy, currently not highly motivated to shut the service down, might bestir itself to be much more effective.

Read more

← Previous PageNext Page →

Feed including blog about enterprise technology strategy and public policy Subscribe to the Monash Research feed via RSS or email:

Login

Search our blogs and white papers

Monash Research blogs

User consulting

Building a short list? Refining your strategic plan? We can help.

Vendor advisory

We tell vendors what's happening -- and, more important, what they should do about it.

Monash Research highlights

Learn about white papers, webcasts, and blog highlights, by RSS or email.