Feeds

What Ray Ozzie didn't tell you about Microsoft Azure

Behind the whiteboard of confusion

Providing a secure and efficient Helpdesk

Fail and You Unveiled earlier this month at Microsoft's Professional Developer Conference by Chief Whiteboard Operator Ray Ozzie, the Azure Services Platform confused damn near everyone. But after days of collaboration with the top minds in both industry and academia, El Reg is proud to announce that we have finally figured out what Microsoft Azure is.

The Azure Services Platform is a clusterfuck of software that can be broken down into four basic parts: Windows Azure, .NET Services, SQL Services, and Live Services. To get a general idea of what each is, you should probably read the sixteen-page white paper. It is designed to compete with Amazon's Web Services and Google's App Engine - that is, once it gets over one slight hitch: tl;dr.

The Four Letters of the Apocalypse

tl;dr stands for “too long; didn't read,” and it is going to change communication as we know it. Product managers at both Amazon and Google have figured out what tl;dr means to their respective businesses, but the idea is clearly lost on Microsoft. When a developer is evaluating different hosted computing platforms for his next application, the merits of each one are decided by how well they are explained:

Amazon EC2: We have a lot of servers, and we run Xen on them. You get virtual machines.

Google App Engine: Run your Python code on our machines. You can use our scalable database, too, but you need to learn how it works.

Microsoft Azure: OK, so first there's this operating system called Windows Azure that your apps are going to run on and will also be your development environment. There's some data storage that goes along with that, but it's not very useful, so we have the SQL Service. That doesn't really give you SQL, but something sorta similar. Ignore it for now. Still with me? There's also .NET Services that lets you connect applications together somehow, and Live Services because we needed something to keep Ray Ozzie busy. Wrap that all up, tape it together with some C# programming, and that's the platform.

Fortunately for Microsoft, decision makers don't choose a hosted application platform based on specifications. They choose based on the number of stock photos of clouds and the amount of sans-serif blue typeface you have on your webpage. In that regard, Redmond is the clear winner.

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Red Hat, Apple scramble for patch batches
'Applying multiple security updates is extremely difficult'
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.