Tellme what you want

The future of social computing is in the integration of various services and technologies – but the fun is already available now. Here’s a nifty demo of the integration of cloud computing’s services with increasingly powerful mobile computers (smartphones or netbooks). Developers can take advantage of far more computational power both locally on the device – faster, cheaper processors thanks to Moore’s Law – and computational power residing on networked data centers.  Think of a business or social activity, and thanks to platforms like the iPhone, Android, and the new Windows Phones, “There’s an app for that.” Or there soon will be.

This quick little demo feels like nothing fancy today – but ten, even five years ago it would have seemed like sci-fi. In fact it’s available now, and uses a new Windows Phone, in this case a Samsung Intrepid, making use of Tellme software from Microsoft integrated with Bing Search web services. The demo intregrates some longtime technologies in their state-of-the-art condition today using cloud-services delivery:

  • Speech-to-text
  • GPS-enabled location-based services
  • Web search
  • Voice-enabled dialing
  • Social media (crowdsourced ratings integrated in search results)
  • Hardware UI (a dedicated TellMe button on the Samsung Intrepid phone)

Share this post on Twitter

Email this post to a friend

AddThis Social Bookmark Button

Social Media goes hyper local for emergencies

For the past year, whenever my group has had government visitors to Microsoft labs in Redmond to see advanced technologies, we’ve considered whether or not to show them a demo of a particular “secret project” being developed, now called Microsoft Vine.

vineIf the group was with local or state government, or related to homeland security, or emergency responders and the like, the answer was easier, because that’s the sweet spot it’s designed for.

But I was always tempted to show it even to my federal government friends – and anyone else – just because it’s so impressive!

Continue reading

Inventing the Software that Invents the Future

Worried about today’s stock market activity? Retreat with me into the security of the bright future that awaits.

Microsoft’s Craig Mundie (pater familias of the Institute for Advanced Technology in Governments), is on a college tour across the nation.  The trip is something of a reprise of jaunts Bill Gates famously made over the years, when he would string together visits to campuses partly to evangelize, partly to recruit, and mostly to get new ideas from bright young (and contrarian) minds.  The Seattle paper today labels these tours as filling the role of Microsoft’s “chief inspiration officer” (“Mundie gives campuses peek at tech’s future”).

Continue reading

CIA 2.0: The Agency’s CIO and Change

Fact: CIO magazine is running a big story on the CIA’s Chief Information Officer Al Tarasiuk and his IT operation, and their online site is breaking it up into a four-part series running this week.  Below I analyze the series.

Analysis: By the halfway mark in the series, the magazine’s reporter Thomas Wailgum had only accomplished a fairly rote recounting of what CIA is, what its CIO does, and how both those factors have changed since the good ol’ spy days amid the challenges of a post-9/11 world.

Part Onedescribed “a business-IT alignment project like few others,” although it mainly served to introduce CIO magazine’s broad readership to the unfamiliar world of a walled-off intelligence agency, waxing on about the hyper-security at Langley.  Part Two similarly was background on the bureaucratic culture of the agency and its relegation of IT to backwater status – until 9/11 came along.

Continue reading

Some Photos from Cairo

I’m in Cairo this week, my first-ever trip to Egypt, visiting the Cairo Microsoft Innovation Center (CMIC) – they’re doing some really interesting work particularly in Information Retrieval, Collaborative Content Services, and Digital Content Services – a very web-minded, web-services driven set of research and development activities with some real payoff in areas like machine translation and collaborative practices.   More information on their work at http://www.microsoft.com/middleeast/egypt/cmic/.

I love Cairo already, on just my second day here.  I’ve posted some photos at a Flickr collection, and  I’ll keep adding to those….

 

 
Email this post to a friend

AddThis Social Bookmark Button

Microsoft May Have a Killer Cloud App – Live Mesh

Microsoft Mesh LogoGot a technical briefing on Live Mesh today in Redmond, and I’m impressed – particularly by the demonstrated commitment to interoperability through adhering to web standards – and the very cool Live Desktop giving you remote access to all your files and folders from any device (work computer, home laptop, mobile phone) with  the new Microsoft Device Connectivity Service.

This is what will bring Cloud Computing down to earth.

Continue reading

Tempted to “Skimp” on IT Security?

FACT: According to a study presented at last week’s annual RSA Conference on cyber security, by Palo Alto Networks CTO Nir Zuk, “Users are routinely, and fairly easily, circumventing corporate security controls. And that is because traditional firewall technology was not meant to grapple with the diversity of Internet applications of recent years.”

ANALYSIS: Security has been an even hotter topic than usual for the past month, what with new national-level attention to cyber security and, for Microsoft, a culmination of sorts of various strands of effort into our new “End to End Trust” initiative.  My boss, Jim Simon, attended the RSA Conference in San Francisco, with his boss, Craig Mundie, Microsoft’s Chief Research and Strategy Officer.  Craig laid out Microsoft’s “End-to-End Trust” vision, designed to provide users more control over online and enterprise systems.  His keynote was widely covered (even by offbeat security blogs, like RiskBloggers.com) so I don’t need to rehash it.

Nir Zuk’s presentation was interesting – and not just because he’s one of the true pioneers of firewall technology.  He really understands secure enterprise environments, something I’m talking about increasingly with government organizations, who are learning the hard way the need to protect their data, apps, and computing platforms.  

Continue reading

Google App Engine and the Gathering of Clouds

How many Cloud Computing platforms would you say there are today? 

Some abhor the notion of there being multiple clouds – by this thinking there is only one “cloud” in an almost Zen manner, meaning “the grid” and the ability to reach in, somewhere somehow, and use someone else’s compute capacity, web apps, services, storage, etc.  Some others, however, as Amazon and others roll out their branded ability to do that reach, are beginning to call these “clouds” — I prefer to think about them as distinct platforms enabling cloud computing, but that’s starting to become a hazy definition. 

Next week the world will hear more about Microsoft’s Mesh strategy.

I feel like an observer out on a prairie on a hot summer afternoon, watching the sky as cumulo-nimbus shapes emerge and burgeon across the horizon.  The multiplicity is going to inevitably lead to feature differentiation, competitive marketing, a full hype cycle with naysayers and boosters (see Fortune magazine), down-market competition, shoddy wannabe clouds, boom and bust, market shake-out, etc. etc. – good times! 

How many such platforms (how many clouds) will there be in future?  How many should there be?  And if multiplication really occurs, is this any different from “utility computing” and aren’t we heading back to the days of the mainframe-model of time-sharing?

Continue reading

From Microsoft’s Cloud – PopFly

I mentioned PopFly in my last post – many Web users are now beginning to appreciate how it enables the fun and ease of innovation for non-technical people. Go to www.popfly.com/ and set up your own account (free of course), and you’ll be able to create usable, powerful “tools” out of the Cloud, or with your own data. 

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

%d bloggers like this: