Blog of Random Thoughts and Pictures

I Wandered Lonely as a Cloud

May 24th, 2009

I have found two recent manifestos for clouds
a) “WE BELIEVE that clouds are unjustly maligned and that life would be immeasurably poorer without them”.
b) “it does not have to maintain multiple sets of artificially high levels of resources to handle peak demands”.
One statement is from the appreciation society of clouds and the other is an open manifesto statement for cloud computing?

pollcode.com free polls
Which statement is for an open manifesto statement for cloud computing?
We believe that clouds are unjustly maligned and that life would be immeasurably poorer without them It does not have to maintain multiple sets of artificially high levels of resources to handle peak d   

Photo Credit: Me for once, miguelpdl on Flickr http://www.flickr.com/photos/miguelpdl/open cloud manifesto security, data interoperability, data portability, and management are the main issues, although it looks like Microsoft are calling it for undue bias towards its authors.
From a security perspective Scott Bradner has an interesting twist on the “security nightmare” that comes with cloud computing.
As for rolling your own cloud …. have a look at Hadoop.

Protecting privacy in this social networking age

April 28th, 2009

I must admit I’m an avid reader of Bernie Goldbach’s blog and his most recent acertion in regards to protecting personal privacy online rings true.

This goes hand in hand with some recent material coming from the EC in regards to privacy in the digital age [pdf]. The theme coming through here is clear “European privacy rules are crystal clear: a person’s information can only be used with their prior consent”.
Its the rule ….. but then I wondered how would this be enforced? Which lead me to find this site on what the EU is doing in regards to Social Networking sites.
There’s a document that makes for interesting reading off the site on “Safer Social Networking Principles for the EU [pdf]“. Here are the 7 principles SN’s should consider:

  • Principle 1: Raise awareness of safety education messages and acceptable use policies to users, parents, teachers and carers in a prominent, clear and age-appropriate manner
  • Principle 2: Work towards ensuring that services are age-appropriate for the intended audience
  • Principle 3: Empower users through tools and technology
  • Principle 4: Provide easy-to-use mechanisms to report conduct or content that
    violates the terms of service
  • Principle 5: Respond to notifications of Illegal content or conduct
  • Principle 6: Enable and encourage users to employ a safe approach to personal
    information and privacy
  • Principle 7: Assess the means for reviewing illegal or prohibited content/conduct

  • There are some pretty compelling signatories to these principles.
    SaferSocialNetworkingPrinciples.jpg

    Scientific bibliography reference management software

    April 19th, 2009

    A great question appeared on the TSSG mailing list the other day, a recommendation for reference management software.
    Photo Credit: freelina2 on flickr http://www.flickr.com/photos/freelina
    I’ve started to use Connotea and with the handy bookmarklet option for my browser I have found it really easy to add papers and there are tons of export options to re-store the reference material.

    A draft FI architecture framework

    April 17th, 2009

    The 4WARD deliverable D2.2 Draft Architectural Framework [pdf] is available for public review and comment.
    A short summary of the content of this document and the 4WARD macroscopic architectural view (Stratum) and microscopic architectural view of network infrastructure and its resources can be seen off this link to the TSSG 4WARD blog.
    With the Future Internet being envisioned as different network architectures coexisting and sharing a common infrastructure, we have been wondering here at the TSSG, well Patsy and Zohra specifically have been asking the questions of how these network architectures could/would/can be specifically tailored to a particular user or application requirement and can take into account the characteristics of the available networking resources and infrastructure.
    Photo Credit: fratella on Flickr http://www.flickr.com/photos/fratella/
    We’ve looked and thought about a possible FI design processes, representing the workflow ranging from a business idea as a starting point to the design of network architecture models (NAM) and software architecture models (SAM). We’ve followed this with looking at the instantiation and operation of a network architecture fulfilling the detailed technical requirements derived from the business idea.
    Given that we believe complex software design will have a big part to play in the realisation of this FI vision, Component Based Architecture (CBA) is an approach we have used to
    To provide support for the development of systems as assemblies of components.
    To support the development of components as reusable entities.
    To facilitate the maintenance and upgrading of systems by customising or replacing
    their components.
    We have attempted to marry a design process with CBA in mind to define FI architectural components, their relationships and their functionalities, and to place these artifacts within a FI Design Repository.
    In this way the component specifications (listing of contracts) of available components are stored within the design repository.
    Why is this important? Patsy believes that the component contract forms the basis for interoperability and composition. The contract provides the formal mechanism by which interoperability between components can be measured. This interoperability then becomes the basis for composition as you can only compose components that are interoperable. The contract meta-data may also be used to construct anthologies of contracts and associated components, these anthologies when linked to functionalities such as QoS, mobility can be used to guide a designer from a functional requirement to possible contracts that fulfil the requirement and ultimately associated components.
    At the higher abstraction level of Strata, CBA is providing the functional blocks (components) and units of interoperability (contracts) that can be used during the composition process. While at the CBA level is providing a link to development and deployment.
    Okay this is the overview, some finer detail can be found in the deliverable D2.2

    FP7 ICT Call 4 is over … and out now for Call 5

    April 5th, 2009

    Photo Credit: jamesdale10 on flickr http://www.flickr.com/photos/31910792@N05/

    Trust within network enabled relationships and software security errors

    April 5th, 2009

    2 reports to mention in this quick post, firstly this ISOC report [pdf] which looks (briefly) at the trust and identity issues that are to tackled on/for/with the Internet. The key point I took from it is that we should “incorporate trust as a core element of the Internet design and deployment process” and in doing so we should look at
    What are the alternative futures for trust and the Internet?
    Where do you see the boundaries between technology and policy?
    Photo Credit Visentico / Sento on Flickr http://www.flickr.com/photos/visentico/
    Moving on I found the following classification of coding errors from Fortify Software intriguing. ColdFusion, C/C++, C#/VB.NET/ASP.NET, HTML, Java/JSP, JavaScript, PHP, PLSQL/TSQL,VisualBasic/VBScript/ASP, Webservices, XML are covered, although I think some effort should also be placed on Python, Perl, Delphi and Ruby.
    TIOBE Programming Community Index Chart for March 2009

    Reblog this post [with Zemanta]

    Can paying for research content multiple times be the right way to go about it?

    March 22nd, 2009

    Okay its a drum beat gathering some pace on this blog but as an update to my most recent thoughts on Open Access there has been some considered input captured by Bora Zivkovic on that same paper and on the fact that Open Access in the developing world – yes, it is a Good.Thing..
    Photo Credit Open Access (storefront) by by Gideon Burton (Flickr) http://www.flickr.com/photos/wakingtiger/.
    I’ve also noticed that this very issue of paid research journal content v’s open access is taking a very interesting twist in the US, and has some way to run its course, but if I was a betting man ………
    Finally this entry cannot pass without a glance at the Irish Innovation Monster
    Photo Credit Cookie Monster! by Hayley_Bouchard (Flickr) http://www.flickr.com/photos/questa/.

    Come test on IMS

    March 19th, 2009

    There is quite a recognisable shift in the way telcos are looking at their networks and the way services and applications are being tested & deployed on those networks.
    So I must say fair play to Shane D and the lads for getting this extensive mobile test infrastructure in place here in Ireland, which will be giant step towards supporting the transition to Telco 2.0.
    Photo Credit: phone art by Andrew Huff (Flickr) http://www.flickr.com/photos/deadhorse/
    If you are interested in playing, testing and validating internet services on the next generation communications network well have a look to see what’s on offer at the TSSG.

    Future Internet Meme

    March 8th, 2009

    So the internet crowd was asked Do We Need a New Internet? and John Markoff’s article in the New York Times has induced an interesting response from the Slashdot and Digg crowd.
    7 maart - NU FUTURE: Het Grote Recessiefeest by De Balie
    Its mostly negative such as this punchline from Milton Mueller at CiricleID

    people who say that we can fix the problems of the Internet by developing a “new” Internet are saying, in effect, that we can undo history and start over again.

    .
    Ed Felten plainly says No Thanks and argues that

    The Net, like any large human-built institution, is far from perfect — but that doesn’t mean that we would be better off tearing it down and starting over.

    David Akin reckons the Internet may just Need new Users. The short answers in all these items seems to be an Almost Certainly, No and for the long answer … well I’ll leave that to one Gene Spafford, one of the quoted interviewees for the NY Times piece, Gene thinks the

    Internet itself is not the biggest problem. Rather, it is the endpoints, the policies, the economics, and the legal environment that make things so difficult.

    .

    What a week of news for the TSSG

    March 1st, 2009

    It all started with an overview of what we are doing today laid out as a blueprint for the next economy, to what we plan to do in the future in the SFI Strategic Research Cluster.
    NYC - MoMA: Design and the Elastic Mind - NSSs: Non-Stop Shoes by wallyg (flickr)
    Here’s the press release and some follow up on RTE, and the Times.