LIVE: Violin’s Symphony, Meistro of Managing Systems

Updated with full video – see below. Welcome to NewsDesk on SiliconANGLE TV for Tuesday August 13, 2013. Yesterday Violin unveiled their next generation of memory array, joining us now to provide his breaking analysis on this new offering is Wikibon Co-Founder...

LIVE: POTUS Calls For Transparency Post-PRISM Scandal

Welcome to NewsDesk on SiliconANGLE TV for Monday August 12, 2013. President Barack Obama held a press conference Friday to discuss reforms to be made following the ouster of the NSA’s PRISM surveillance program. Joining us now to share details regarding the new...

LIVE: Lavabit Closing – The Beginning of an NSA Coverup?

Welcome to NewsDesk on SiliconANGLE TV for August 9, 2013. In July Edward Snowden emailed journalists and activists through the email account edsnowden@lavabit.com to invite them to a briefing at the Moscow airport. Since then, Texas-based email provider Lavabit has...

LIVE: Presidential Incentives Key in Cybersecurity Reform

Welcome to NewsDesk on SiliconANGLE TV for Wednesday August 7, 2013. Yesterday The White House released a preliminary set of incentives it may offer companies who are willing to join a cybersecurity program chaired by the Department of Homeland Security, and the...

LIVE: FireEye IPO Cashes-In on NSA Hysterics

Updated with full video – see below. Welcome to NewsDesk on SiliconANGLE TV for Tuesday August 6, 2013. FireEye, an IT security vendor, has submitted an S-1 filing to the U.S. Securities and Exchange Commission, kicking off the process to raise as much as $175...

LIVE: Nosey Neighbors & NSA Notions

Updated with full video – see below. Welcome to NewsDesk on SiliconANGLE TV for Monday August 5, 2013. Security Researcher Brendan O’Connor recently conducted an experiment to determine how easy it would be for the average citizen to create an adequate spying...

LIVE: Hacking – Only Good When the FBI Does It

Updated with full video – see below. Welcome to NewsDesk on SiliconANGLE TV for Friday August 2, 2013. Law-enforcement officials in the U.S. are turning to the use of tools commonly deployed by computer hackers in order to gather intelligence on suspects....