Register Here
  Call For Papers
  Hotel Info
  Power Panels
Untitled Document
2018 Platinum Sponsor

2018 Gold Sponsor

2018 Keynote Sponsor

2018 Tech Sponsor

2018 Pavilion Sponsor

2018 Partners

2018 Exhibitors

Untitled Document
2018 Media Sponsors

Untitled Document
2017 West
Premium Sponsors



Untitled Document
2017 West
Keynote Sponsor

Untitled Document
2017 West Exhibitors


Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors

Untitled Document
2017 West Media Sponsors

Untitled Document
2017 East
Premium Sponsors





Untitled Document
2017 East Exhibitors

Untitled Document
2017 East Media Sponsors

Untitled Document
  Think Big – Now Think Even Bigger
  Join Us at Internet of Things at Cloud Expo, November 11-13,
at the Javits Center!

The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend Internet of Things at Cloud Expo in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!

Delegates to Internet of Things at Cloud Expo will be able to attend eight separate, information-packed tracks:

  • Enterprise Cloud
  • Digital Transformation
  • The API Enterprise | Mobility & Security
  • DevOps | Containers & Microservices
  • Cognitive Computing | AI, ML, DL
  • Big Data | Analytics
  • IoT | IIoT | Smart Cities
  • Hot Topics | FinTech | WebRTC

There are 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.

We'll see you in New York!

Day 3 Keynote at @ThingsExpo | Chris Matthieu, CTO of Octoblu
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu's platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
  Themes & Topics to Be Discussed

Consumer IoT
• Wearables
• Smart Appliances
• Smart Cars
• Smartphones 2.0
• Automation
• Smart Travel
• Personal Fitness
• Health Care
• Personalized Marketing
• Customized Shopping
• Personal Finance
• The Digital Divide
• Mobile Cash & Markets
• Games & The IoT
• The Future of Education
• Virtual Reality

Enterprise IoT
• The Business Case for
x IoT
• Smart Grids
• Smart Cities
• Smart Transportation
• The Smart Home
• M2M
• Authentication/Security
• Wiring the IoT
• The Internet of
x Everything
• Digital Transformation
x of Enterprise IT
• Agriculture
• Transportation
• Manufacturing
• Local & State
x Government
• Federal Government

IoT Developers | WebRTC Summit
• Eclipse Foundation
• Cloud Foundry
• Linux Containers
• Node-Red
• Open Source Hardware
• Ajax and the IoT
• Leveraging SOA
• Multi-Cloud IoT
• Evolving Standards
• WebSockets
• Security & Privacy
x Protocols
• GPS & Proximity
x Services
• Bluetooth/RFID/etc
• Nest Labs

The Top Keynotes, the Best Sessions, a Rock Star Faculty and the Most Qualified Delegates of ANY Internet of Things Event!

The future of computing lies in these things. As computing takes a much more active role in our lives it will at the same time become much more invisible. Internet of Things Expo will address the challenges in getting from where we are today to this future.
The high-energy event is a must-attend for senior technologists from CEOs on down – including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.

@ThingsExpo Power Panel | The World's Many IoTs: Which Are the Most Important?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Benefits of Attending the Three-Day Technical Program
  LEARNexactly why Internet of Things is relevant today from an economic, business and technology standpoint.
  HEAR first-hand from industry experts the common issues and requirements for creating a platform for the Internet of Things.
  SEE what new tools and approaches the Internet of Things requires.
  DISCOVER how to drive a distributed approach to the Internet of Things, where applications move to the data.
  FIND OUThow the vast volumes of new data produced by the Internet of Things provides a valuable new source of business insight through advanced analytical techniques.
  MASTER how the ongoing development of smart cities, cars, and houses will enhance connectivity infrastructure.
Lunch Power Panel | Microservices & IoT- Moderated by Jason Bloomberg
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetic, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem filling in your buzzword bingo cards.

Brad Templeton on "The Gmail Saga" - Google vs Privacy?
Brad Templeton on "The Gmail Saga" - Google vs Privacy?

Much has been written about the new Google GMail trial, which is an e-mail service that offers a gigabyte of archiving, Google search of your mail archives and a nice interface. It's free, because while you read your mail, Google ads will be displayed based on keywords found in the mail you are reading (just as the Google Adsense program shows ads like the ones you see on the right based on words found in this document.)

GMail created a surprising storm for a product that hasn't yet been released. A coalition of privacy groups asked Google to hold back on releasing it. A California state senator proposed a law to ban the advertising function. Editorials and blog entries left and right have condemned it and praised it.

I come to this problem from two sides. One, I'm a fan of Google, and have been friends with Google's management since they started the company. I've also consulted for Google on other matters and make surprising revenue from their Adsense program on my web site.

I'm also a privacy advocate and Chairman of the Electronic Frontier Foundation, well regarded as one of the top civil rights advocates in cyberspace. The EFF has issued some statements of privacy concern over GMail, though we declined joining the coalition against it. (I'm writing this as my own essay, though with some advice from the EFF team.) I've also had a chance to talk at length with Google President Larry Page about some of the issues.

Here's a summary of some of my conclusions

  1. While there has been over-reaction to GMail, there are some real issues here to be worried about.
  2. Other webmail providers are doing, or will be doing the same things, meaning these issues apply to all of them, including MSN, Yahoo and others.
  3. One key risk is that because GMail gets your consent to be more than an e-mail delivery service -- offering searching, storage and shopping -- your mail there may not get the legal protection the ECPA gives you on E-mail.
  4. The storage of e-mail on 3rd party servers for more than 180 days almost certainly causes the loss of those privileges.
  5. This in turn creates a danger that we may redefine whether e-mail has the "reasonable expectation of privacy" needed for 4th amendment protection.
  6. Correlation of search and mail has real risks.
  7. Google and others should architect to encrypt your mail.
  8. Even the irrational fears over the spooky aspect of advertising being associated with e-mail creates problems that must be addressed.

Page and the others in Google were taken aback by the negative reaction to their pre-launch. GMail is a very nice product, with great promise. They've done a lot of work on building a superior web e-mail interface. Their surprise at the tempest is not inappropriate. Many of the issues raised here are subtle and known only to full-time privacy lawyers. In addition, many of the debated features in GMail are already present to some degree in competing products like MSN Hotmail, Yahoo Mail and AOL. And indeed, some of the reaction has been silly and a bit paranoid, and some of that has gotten a lot of the attention.

But there are also some deep issues here, worth discussing with not just Google but all the other webmail providers.

The thing many people reacted to the most was the idea of displaying ads keyed to words in your mail. We think of our mail as fairly private, and we do a lot of private stuff in e-mail. Google's ad-linking is all done by computer, they promise not to have human beings look at the mail (almost all the time). If only a computer "knows" your deepest secrets, is there a concern? I certainly let my own personal computer contain all sorts of private information, ranging from my finances to private e-mails with my family.

Even so, people have a reaction to a 3rd party computer doing scans like this. If you were offered a service that saved you money by having your paper mail opened by robots for scanning, which then inserted new junk mail in your box based on what it found, you might get a bit creeped out. Go further and consider a service that gave you free phone calls if it could have speech-recognizing computers listen in and barge in with product offers related to your conversation? It's easy to imagine an unpleasant situation where you get invited to a gay wedding in Vancouver, and find with it in your mailbox brochures for gifts, Vancouver hotels and a free copy of Out magazine. People have extended that fear into the e-mail realm.

Of course, webmail is an optional service. Those afraid of these sceneria can simply not use it, and that's an entirely reasonable answer. But it ignores an aspect of the privacy fears we have. In the modern era where computers threaten privacy, we are as afraid of outside computers knowing all about our lives as much as we are outside people. Even though we might trust the people running the computers today, or the human health insurance clerk who learns we have cancer, we are uncomfortable with both of those things. We are not quite as uncomfortable about the computer knowing, but it's hard to ignore the fear that, in spite of the best of intentions, information on external computers (and even our own computers) sometimes makes it out into the world.

People's fears here are sometimes irrational, but still real. And irrational fears often affect privacy and freedom, even when they are irrational. Consider the amusing Wall Street Journal story some time ago headlined, "Help, my Tivo thinks I'm gay!" (The Tivo suggests shows to you based on what you have watched before. Tivo says that this does not leave the box associated with your identity, though they do collect data on all Tivo use, stripping off the identity along the way.) People became annoyed at or scared by their video recorders.

Google is not ignorant of this issue, of course. They plan to work hard to not do something so bold as sexual ads on your salacious e-mails with your husband. They know that even irrational freaking-out generates a real consumer issue.

And it's not to be ignored that well-targetted advertising is itself a useful thing. If you take as a given that you're going to accept ads to subsidize an activity, few wish to have their time wasted by ads that are irrelevant. In addition, well-aimed advertising costs advertisers more because it is more effective -- which means you can get the ad subsidy you are seeking with fewer ads. Clearly many users find themselves buying products from these ads, products they might not have known about without them, so good ads can be a service unto themselves.

I'll talk about the result of some of the irrational fears in a moment, but first let's look at some of the real fears.

Our lives move online and outside

GMail is a big step in a concerning direction. If it's a success, millions of people will move a great deal of the record of their lives not just online, but online and stored with a 3rd party. This isn't the first time this will happen, but for millions it will be the biggest such jump. Particularly if one's searches and social network can be correlated with this information. My e-mail contains the story of my life, and what's not in there is often recorded in my searches.

As we move these things online and outside, we build some of the apparatus for a surveillance society. As usual, we don't plan to do so, and the people building it would oppose it being used that way. But they build it nonetheless. We make it so that having that surveillance becomes a "logical" step -- changing a law or a policy, or in some cases just pushing a button, rather than a physical step -- going into somebody's house to grab their papers.

When our papers are at home, mass surveillance of them simply doesn't scale. It's too expensive. Online, it scales well. Our networked computers at home are not very secure, of course -- probably less secure than Google's against unauthorized intruders. But they must be broken into a million times -- though possibly by one giant virus -- and those outside machines must be compromised (by the law or by system crackers) only once.

Webmail is, as noted, only a part of this trend. No surprise, since there are many technical advantages to centralization, especially when it comes to software maintenance. Installing, running and upgrading software on your home computer is hard. A remote computer is professional maintained, and almost surely a lot faster too. It can be reached from anywhere. In many cases, where you want to roam all around and access your data, or have servers receive data for you while your home computer is off, it's the only way to do things well. I won't pretend that such centralization is not quite useful, or imagine it is something we can stop from happening.

Many have written, correctly, that we have already seen this trend in Hotmail, AOL, Yahoo, Turbotax Online, Instant Messengers, and all other "Application Service Providers" (ASPs.) That the trend has already started doesn't make it less disturbing.

GMail however, with the offer of a free gigabyte, makes a big jump in this trend. Free Hotmail users tended to keep only a bit of their mail online, deleting the rest. Hotmail forced them to. GMail (and soon other webmail offerings) will openly encourage the opposite.

Google is a good company with honest people, headquartered in a fairly free country with protection of rights that is among the best in the world. But that's not always so. I wonder, for example, about what it means to the people of China that we have built our instant messaging infrastructure and some of our E-mail infrastructure entirely with centralized servers and no encryption? Their government can and does routinely listen to internet traffic. When we build our systems, how often do we think of what it will mean when they become popular in China, or Saudi Arabia? Or what it means when they are sold to other companies whose policies are not so benevolent.

There are ways to buck this trend. Below, I'll be recommending that Google and its competitors work to encrypt your data when they store it for you.


The Electronic Communications Privacy Act started out in the 80s as a blessing. It declared that e-mail was a private means of communication, and that we might hope for the same level of privacy in it as we have in phone calls and letters. Among other things, it means that police need a wiretap warrant to read your e-mails, and that your e-mail company's employees can't disclose your e-mails to others.

But the world has changed and the ECPA has not changed with it. E-mail in transit is protected, but those in law enforcement advocate that once mail is processed and stored, it is no longer the same private letter, but simply a database service.

GMail's big selling point is that they don't simply deliver your mail. They store it for you, and they index it so you can search it. (Of particular importance, you authorize them to scan your mail for these purposes, and that authorization is the act that risks stripping you of your rights.) All the other webmail companies who don't already do this will, I'm sure, quickly have offerings to compete with GMail. As noted, not only do they search it, but they scan on viewing to provide ads that match the content, making it not just a database but a shopping service. Should you click on those ads, the merchants will know you were reading a page, search or e-mail related to their ads.

Unfortunately, a database and shopping service doesn't look as much like an e-mail delivery service as it should according to the legal definitions in the ECPA. Thus, while Google promises not to peek into your e-mails or hand them to others, the danger is that this is now solely their contractual promise. With an e-mail delivery service covered by the ECPA, the law, not just Google's terms of service governs when your mail can be handed over.

Google also has some work to do on their privacy policy, because it does allow them to look at or release your e-mail in circumstances where they would be forbidden to do so if it were ECPA protected, such as a law enforcement "request." But even if it bound them as tightly as the law does, it still contains the ubiquitous clause letting them change the policy at will, without your consent -- so it's really not a strong restriction at all. The policy should state at a minimum that changes to it which would reduce the privacy of your mail can only take place with your explicit and informed consent at the time of the change.

A lot of privacy policies should say that, of course. They don't, because doing this in general is a logistic nightmare. However, with work, one can fine-tune such policies to dictate what can be changed and what can't, to do at least as well as what the law requires of e-mail delivery companies, if not better. This is not easy, it's hard. But it's worth doing.

When you use network services, you need a contract, and that contract will be written primarily to protect the interests of the service provider. When you run software on your PC, you may agree to terms when you install software, but as far as your own data is concerned there is usually no question of contract at all. The data is on your PC, and there don't have to be rules governing what others can do with it.

Without the ECPA protection, your e-mail (now just a database) can be seized against Google's will with an ordinary subpoena (vastly less involved than a wiretap warrant) or in the discovery phase of a lawsuit. With warrants, and in some rare cases even without them, your mail can be grabbed without you being informed that this has been done. Worse, Google has retained the right to hand it over in the case of a "request" from law enforcement, rather than a court order.

Of course, these legal techniques can be applied to the data you store yourself. However, short of a secret warrant to break into your house and seize your computer, it can't be done without your knowledge and involvement. You have the chance to fight any attempt to grab your mail. You have the power to get a lawyer and appeal any order in front of a judge. You give up some of that power when you put your e-mail database in somebody else's hands. Google is a good company that wants to please its users, they don't want to be subject to all these subpoenae. But they won't fight as hard as you would.

It's also important to note that most of these webmail providers are global companies, with servers around the world. The ECPA is a U.S. law, only protecting mail in the USA. Some other nations have protections but they certainly all don't. Unless care is taken, your mail could end up stored in another country without legal protections you were hoping for.

Now, after scaring you like this, let me add that this is an entirely new situation, and the courts have not yet ruled whether the ECPA covers your mail in a searching/advertising database service. It's possible they might, but from the text of the law, quite possible they would not. Past history suggests it is highly likely the Department of Justice will take the position that the protection is lost.

The DoJ in fact believes that the moment after you open your mail is is just an archive and loses some protections, though at least the 9th circuit court has disagreed with that -- up to the 180 day rule at least.

To learn more about the ECPA and e-mail you will find a good analysis in this paper. It's way more complex than I describe here.

The 180 day rule

In the hoped-for event that your webmail archives are protected by the ECPA as what it calls an ECS, they lose some of that protection after 180 days. This is not news, but a product like GMail, which encourages long-term archving of e-mail with the web mail provider brings the question to the forefront. After 180 days your e-mail archives can now be fetched without a warrant, through a special ECPA court order or a subpoena. (In most cases, but not all, you will get notice of such seizures.)

Expectation of Privacy

In the USA, privacy from government intrusion is defended by the Fourth amendment, which requires a warrant be issued by a judge for many kinds of searches and seizures. Over the years, court precedents have required that warrant when you have a "reasonable expectation of privacy" over what's being searched. The definition of when and where you have this expectation of privacy has been in flux. Court decisions have sometimes sustained the expectation of privacy, but often eroded it.

The higest standard of privacy has been "the privacy of your own home." For example, the courts have ruled you to not have as much expectation of privacy in a car as you do in a home. Not as much on your open land as inside your house. Not as much in an RV as in a house. Your day-guests don't have the same privacy in your house as you do.

When technology changes privacy, there is always a battle over this expectation. The police want to reduce it so they can do more without warrants. The public wants to keep their privacy. Recently police made a number of arrests over the years by using infrared scanners to look for signals coming from inside a home. The court eventually told them no: That even though the IR was emitted from the house for view by "anybody" with the right equipment, what went on inside was still private. Often we lose privacy, as a man who lived in his motorhome discovered when the police were able to search it like a car because he was parked in a parking lot rather than an RV park.

Others have learned that what they say in front of baby monitors is not private, even though it is said inside their homes, because it is transmitted "in the clear" outside your home. (Cell phone calls, also often sent that way, have statutory protection of your privacy.)

E-mail privacy is in crisis because most e-mail is sent without encryption. That means that almost all e-mails are like postcards. Anybody with access to the wires (or airwaves) they travel over can read them. Because of this, arguments are being made that you should have no more expectation of privacy in an e-mail than you have in a postcard, or worse, a postcard you hand to a 3rd party to carry. This question will remain in the balance for some time.

GMail and its competitors may tip this balance, particularly if the e-mail managed by the webmail companies loses its ECPA protection status, the risk of which is described above. I send my e-mails from my own private machine, and that part is private. But I send them anywhere, including to webmail users where they are stored in a 3rd party database for searching. Of course, that database has password-controlled access and I would like to hope it's private, but there are those who will argue it's a step below the privacy expectation one has for one's own home computer. With a home computer, somebody has to break into your home or the computer to read the mail. On a 3rd party server, they can do that, but they might also see it due to a change of policy.

Sadly, we can also expect arguments that e-mails read from a database over an open wireless network might be akin to the cordless phone or baby monitor situation.

One can hope such arguments will not win. But what is true that the more e-mail that is sent unencrypted, the more it is stored in private but external databases, the greater the arguments will be that you no longer really can expect that your mail is secure and private from being seen by parties other than yourself and the recipients. If the courts ever become convinced this is true, e-mail could lose the protections it currently has, designed to parallel the protections of paper mail and phone calls.

My hope would be that Google's design should not reduce that expectation of privacy. But all e-mail vendors should work hard to ensure they don't even raise the risk, let alone pitch us over the edge. What a terrible thing if we were to lose the cherished expecatation of privacy we want in our letters in the name of convenience. The ECPA is just an ordinary law protecting e-mail privacy, not as strong as a constitutional protection.

Search correlation

You've probably noticed that a lot of your web searches contain private information. I often type into Google things like the names of prescription drugs I have been given, to find out more about them. I use search engines to research the stocks I buy and look up my friends, or see what people are saying about my family. Very private stuff.

Largely we treat our searching as anonymous, though in fact it's not nearly so anonymous as we might like. All the major search engines use a cookie that allows the to correlate together all the searches we do. If like me, you have broadband, your computer's numeric internet address is also fixed -- either permanently like mine, or effectively permanently as it is for all those who don't turn their computer off or who have a network gateway box.

All of the companies providing e-mail and search together create a troubling risk that the private matters in our e-mail can be combined with the things we search for. It's no surprise that this potential is there. Search companies are all eager to find ways to improve the relevancy of their search results in order to please their users. It's what we want them to do. Learning things about you is one obvious technique to do that.

Again this is part of a trend toward creating a giant dossier of all your private information in a central place. Because users will demand more accurate search, this trend won't be stopped. However, companies can be encouraged to anonymize data they collect, making it hard or impossible to link back to the real person

Google has said they are not correlating search and e-mail (or their social network prototype called Orkut.) That's good, but for business and user interface reasons they are not likely to say this will always be true. The browser cookie system allows the e-mail and search systems to share information about your identity unless you go to extreme lengths to delete your cookies or use cookie-washing software. Even then, unless you are a dial-up user, your IP address is almost as good as the cookie, perhaps better. Of course, once you have a common login for e-mail and enhanced search services your activities will be fully linked, as they can be on Yahoo today. You can only wash this through the extreme step of using a web anonymizer which bounces your requests among cooperating servers that hide your address.

Global Search

The war on terrorism has rewritten the rules on what's possible in civil rights. Consider the idea that the government might come with a warrant or new law to an e-mail provider and say, "Search all your customer's e-mail to see if anybody was talking about planes and the World Trade Center before 8am on Sept 11."

Under traditional 4th amendment rules, such a broad fishing expedition would be unthinkable. But some people are finding it more thinkable. Some might even think it's a good idea, and proclaim they don't mind if this were done to their own mail.

Without large webmail archives, the idea wasn't even possible. Now it could be.

What can Google Do

Google is proud of its reputation as a good corporate citizen that tries to keep its users interests at heart. It has done this even against the wishes of its customers (the advertisers) by putting restrictions on ads that other sites wouldn't place. This has actually been a good business decision, but Google espouses a philosophy of not doing any "evil" while building their business. It's a good philosophy.


The most obvious step Google could take would be to encrypt a user's e-mail, searching index and other associated data, so it can only be accessed using the user's password, and of course that password should not be stored when an e-mail session is over.

If need be, the mail can be held temporarily unencrypted before delivery to the user (because then it has ECPA protection) and thus indexed and tied to ads. Then it can be encrypted. Both the index and the mail contents must be encrypted so that they can't be read without your password. Police could get a wiretap warrant to watch you type in your password, so this is not as private as doing fully encrypted mail to your home PC, but as noted the warrant process defends your rights much more than the subpoena or contractual system does.

An overseas escrow system would allow recovery of your password if you lose it, and in the inevitable event of your death.

GMail could also encourage the use of encryption in sending mail, both by doing SMTP-over-TLS (a standard technique for encrypting mail as it moves from server to server) wherever possible for your incoming and outgoing mail, and also supporting standard e-mail encryption formats like S/MIME and PGP, as well as new opportunistic encryption systems. This would be a giant step forward.

Resist correlation with search

This should be resisted as long as possible. If business needs -- which means pleasing the customer -- demand it, ways should be developed so that it's hard to tie the correlated data back to a particular user. If need be, it might even be better to have an explicit login (with password) so that the correlation data is also encrypted and only available when the user is logged on. Though frankly, I use Google search hundreds of times a day -- I'm always logged on.

Think about whether you can make such correlation opt-in, requiring the user's agreement. You might be able to create more accurate search doing this, but if customers want that, is it too hard to add the step of getting them to knowingly agree to it?

Lobby to strengthen the ECPA

Google, Microsoft, AOL, Yahoo and others should join with us in pointing out that the ECPA is now outdated, and not providing enough legal protection for all the new technological innovations in e-mail delivery. Fight in court cases where the DoJ and others try to expand their powers to grab user e-mail.

All these companies could also push for similar and stronger protections in the other nations where they do business.

Continue to refine policies and educate the public

Much of what Google is doing with GMail is innovative and worthwhile. It would be ridiculous to see it banned, as Senator Figueroa would suggest. It's not a lot different in kind from all the other well established webmail services -- but this doesn't mean those services didn't also have issues. There is not at this time, for example, a reason to be afraid of GMail and not afraid of premium Yahoo mail. Within months, the competitors will also release products with large archives and other features to keep up with Google.

So Google needs to refine their policies and contracts. Any policy that can be changed to protect user privacy that does no business harm to the company's plans should be changed. Even ones which do impede possible business plans should be evaluated and some of them done.

What users can do

The hard truth is if you are concerned about your privacy, 3rd-party hosted web based e-mail may not be right for you. There are tools that will let you search the e-mail on your PC.

You can also be more careful about how cookies are used to track you on the web. Most browsers can help you control this. I recommend the absolutely free Mozilla browser which lets you easily turn on and off what cookies go to what sites. Google is a good site that lets you use it without cookies; not all sites are so kind.

The problem with privacy is that nobody cares about their privacy until after it's been violated. Only when Bill Gates discovered that his e-mail could be searched for a message about cutting off "Netscape's Air Supply" did he realize the danger in logging it. Many people only realize the danger in their records when they enter a lawsuit, or a custody battle. They all thought it would never happen to them.

If you are concerned there are a variety of resources, including tools for anonymous web surfing, fancy cookie-management and more.

Most importantly, tell companies that you care about your privacy. Because others, not yet finding it violated, are not giving this message even though they do care if they think about it.

On the appearance of surveillance

To close, let me add one other rule about privacy. It is not only important to have your privacy. It is important that you believe you have your privacy. If you even suspect that you are being watched, it changes your behaviour and you become less free as an individual.

Are you the same person at your mother's house for holiday dinner as you were your first year on your own at university? How much you think you are being watched affects your freedom. How much a society thinks it is being watched affects the freedom of the society.

The fear that computerized scanning of our e-mails (to display ads or filter out spam) will result in actual harm is largely baseless. But even irrational fears affect our freedom, and this should be considered in software design.


[Reprinted by kind permission of Brad Templeton from his home page.]


Published Apr. 23, 2004— Reads 72,606 — Feedback 13
Copyright © 2004 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
About Brad Templeton
Brad Templeton founded and ran ClariNet Communications Corp., the first Internet-based content company, then sold it to Newsedge Corporation in 1997. ClariNet publishes an online electronic newspaper delivered for live reading on subscribers' machines. He has been active in the computer network community since 1979, participated in the building and growth of USENET from its earliest days and in 1987 he founded and edited rec.humor.funny, the world's most widely read computerized conference on that network. He has been a software company founder, and is the author of a dozen packaged microcomputer software products. He is chairman of the board of the Electronic Frontier Foundation, the leading civil rights advocacy group for cyberspace. He also sits on the advisory boards for a few Internet startups. Currently he is building a new startup to reinvent the phone call.

Add Your Feedback

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Someone have an invitation of Gmail? please :)
Thanks for all.


Thank you, Google! I'm a proud user of GMail. Like Jliendo said, why would I pay 3o dollar to upgrade my account when I can have 1GB for free? Keep the internet free!

Browser-side Javascript public key encyption
( expanded from an earlier post of mine on 13th April
It is possible to use browser side javascript to encrypt and decrypt content, including the use of RSA public key encyption. See RSA Algorithm Javascript Page.
( For efficiency, public key encyption methords generally decodes a randomly generated key for the single key encyption which encypts the plaintext )

It should be possible to use public key encryption with inspected outgoing and incoming email gateways to ensure email content privacy.

Client side Javascript is used to generate the public and private keys. Single key encryption using a "privacy password" is used to encrypt the private key to store it server side.

-Incoming SMTP Email
| Incoming Gateway encrypts plaintext email with user's public key
- Encrypted Email
| Gmail Web based email server
- Encrypted Email
| User's Web Brower fetches the private key from the server
| User enters "privacy password"
| browser javascript decypts the private key.
| browser javascript uses private key to decode and display encrypted Email
- Decrypted Email only at user browser side
| User Reads and enters reply into text window
| More Javascript encrypts outgoing content using outgoing gateway's public key
- Encrypted Email
| Outgoing Email gateway decrypts outgoing Email
- Decrypted Email

As long as the Incoming and Outgoing email servers remain seperate,subject to inspection and undergo regular auditing, then the email stored on Gmail will remain unreadable to Google.

Users should be able choose a default encyption policy and mark individual messages as private or public.

Mail between Gmail individual users could actually be more secure than outside email, as the sender could encypt the message directly using the recipients public key.
From the same thread ...
If it is successful. could you avoid replying to Gmail users?
o At work around 20% of legitmate non-spam emails , mostly inquiries, are from Hotmail or other webmail services. If Gmail is going to as successful as Hotmail, it's going to become more difficult to avoid replying to legitmate emails from it's users.

Google could also use a number of mechanisims to get email recipiants to connect to the Gmail service though the browser, including keeping email attachments server side inserting an URI in the email. Hotmail, or any other web email provides could do the same, even using the spammer trick of webbug images emmbedded in the HTML'ed email. Significant profilable information can be gathered from the email headers alone.

There is a potential network effect on the erosion of privacy, made more prominent with users moving to a few very large service providers.

Privacy advocates have a legitmate concern over the issues surrounding the profiling and privacy of email. While Google remains under its current management, I am personally less concerned. However just as in January 1998 Hotmail was purchased by another company, Microsoft, Google could be sold to another company with even less moral scruples.

I don't know and could be completely wrong about it, but this campaign of privacy concerns about the way Gmail is going to scan our mails and how evil its is, seems to me more like a kind of Yahoo! and MSN and who knows who other else fighting for their survival...why would I pay 20 o 30 something dollar a year to upgrade my Inbox to 25/30MB when I can have 1GB for free?

And by the way, isn't Yahoo! or MSN already scanning every single of our mails in search of antivirus and antispam? No privacy concerns here? Am I missing something here?

IO take my hat off to Mr Templeton for his resounding climax: this is the nub of the issue after all...

To close, let me add one other rule about privacy. It is not only important to have your privacy. It is important that you believe you have your privacy. If you even suspect that you are being watched, it changes your behaviour and you become less free as an individual.

I have an early gmail account, and have used it a little.

The most serious concern is the privacy policy itself.


As a standard email protocol, when you send an email from your Gmail account, Gmail includes your email address and user name in the header of the email. Beyond this, we do not disclose your personally identifying information to third parties unless we believe we are required to do so by law or have a good faith belief that such access, preservation or disclosure is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or governmental request, (b) enforce the Gmail Terms of Use, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues (including, without limitation, the filtering of spam), (d) respond to user support requests, or (e) protect the rights, property or safety of Google, its users and the public.

"governmental request" means pretty much they'll turn over any information withouut a subpoena. I suppose for a free service, you get what you pay for.

How about this as a workaround for Gmail and privacy?

1. use a browser/email plugin that can automatically encrypt your email before sending it.

2. use a browser/email decrypter plugin to unencrypt your mail when you read it.

PGP as a form of encryption is commonly available.

Theoretically possible but I am not sure how practical it is.

This way all the webmail programs do not know what is being transmitted/stored.

How about other applications that can use the 1GB of storage from gmail?

e.g. online filesystem - files stored as attachments to emails to yourself.

What else?

Other people's comments on Gmail:

Anyone seen
">here? Lots of good material:

Perhaps the most prominent feature of Gmail is the fact that conversations are grouped into, well, conversations, as opposed the familiar lengthy list of free floating messages from different people, concerning different things, it's a concise list of conversations.

Reading an e-mail conversation like you would normally read a flat forum actually makes a lot of sense, especially since Gmail let's you expand and collapse individual messages without even reloading the page. Some forums I've seen, like the one over at Kuro5hin, also allow you to dynamically expand and collapse individual messages, but it's not as friction free as the experience with Gmail, with which there are no bugs, no hickups, it's very fast and it's completely transparent.

It also makes it very easy to check up on what has been said earlier in the conversation; instead of having to find and open a different e-mail, in a new window at that, you just scroll up and track through the messages in chronological order. It's far, far, easier to find a given message you're looking for, buried somewhere in a conversation, since you don't have to open each message individually, but instead scan over each of them effortlessly.

When a conversation becomes lengthy, like over six or so messages in total, the list is collapsed even further, but is of course readily available at the click of a button, without the page reloading.

Grouping individual messages into conversations like this, while only a superficial change at first glance, will probably change the way people use e-mail. That does sound like a bit of a cliché, doesn't it? Perhaps it's just me, it could very well be, but I've already noticed that I perceive and think of e-mail conversations differently using Gmail, than otherwise. When using other e-mail clients, both web based and native ones, conversations aren't grouped with each other, but rather scattered and interspersed with other conversations, they're not really like conversations at all, but more like separate, detached messages.

I'm not sure if this change of perspective has only had this drastic effect on me, but having e-mails grouped into conversations has kind of had an encouraging effect on me. Since e-mail conversations don't get interspersed with others in Gmail, since they don't get scattered all over the place, they don't seem to want to die. Not in and of themselves, at least. I would say, I think, this will make people more likely to keep an e-mail conversation alive, as time goes by and other unrelated e-mails comes in, because the conversation is still there, it doesn't get dissipated. I'm pretty sure that it will have that effect on me, it has had a little bit of that effect on me already, but perhaps it's just me.

for me there are two classes of people those who have a gmail account and those who dont... sadly i dont. any body want to share their username password. ???? ;)

I've had a number of jobs in which I was partly responsible for keeping the email running. On a number of occasions, I had the fun of helping a user with a failed message that was obviously very personal and not job related. I always took the approach of making it clear that I wasn't concerned with the contents of their message, I was just fixing a failure in the email system. I tried to get across the idea that, yes, I can read any message that goes through the system, and so can anyone else with a position of responsibility. I tried to get them to understand that the software at every stage does have to read and understand at least a part of any email message (the headers), and there's no technical reason that the software can't be made to examine anythingg in a message. Also, email is stored temporarily on any number of machines while in transit, and isn't always deleted. The user's message was one that wasn't deleted, because there was a problem with it, and other messages could be saved, too.

One of the other ideas I've tried to get across is that, although users might find me trustworthy, they (and I) have no idea who else may be looking at their email or saving copies. This could happen anywhere along the network path. Not that this should be a problem. They shouldn't get all paranoid over it. But it's something that they should understand.

If folks don't understand all this, they have a fundamental misunderstanding of how email has always worked. Gmail is no different, reallly. Privacy in email is an illusion, unless you've encrypted the contents.

Even if Google keeps e-mail forever (1 year)... if all they are going to use it for are targetted text ads, who the hell cares?

Tim's piece on 'The Fuss About GMail' which is also good on this issue. Great contribution, Brad!!

Presentation Slides
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile ...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to...
IoT & Smart Cities Stories
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...

2016 | 2015 | 2014 | 2013 | 2012
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Join Us as a Media Partner - Together We Can Enable the Digital Transformation!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email

@ThingsExpo Blogs
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a multi-faceted approach of strategy and enterprise business development. Andrew graduated from Loyola Un...
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as th...
Digital Transformation Blogs
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, integrations and real-time analytics, you can easily control your travel policy, reduce spendings and i...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable nature – can also provide new possibilities for addressing cloud security problems. By leveraging t...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a multi-faceted approach of strategy and enterprise business development. Andrew graduated from Loyola Un...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been des...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the...