Top Stories

Mozilla Developer Network accidentally exposes thousands of e-mails, password hashes

Mozilla Developer Network accidentally exposes thousands of e-mails, password hashes

Last Friday, Mozilla reported the accidental release of the e-mails of 76,000 Mozilla Developer Network (MDN) users to the public alongside the encrypted passwords of 4,000 users. The disclosure happened due to the failure of a data sanitization process at the MDN site starting on June 23rd and lasting a period of 30 days. Mozilla is a free software community best known for developing and supporting the Firefox web browser. According to a blog post outlining the issue, Mozilla engineers removed the accidentally disclosed database dump file immediately upon discovering the issue. Also the failing data sanitization process has been disabled to... more »
No thumbnail available

What you missed in Cloud: piecemealing the hybrid computing revolution

The hybrid cloud offers tremendous opportunities for driving operational efficiencies in the enterprise, but poses an equally great set of challenges that the vendor community has yet to address in its entirety. Fast progress is being made on changing that, however. The number of individual barriers holding organizations back from adopting the new paradigm of service delivery is starting to decrease, especially now that DARPA is involved. The U.S. Defense Department's research arm has reached a major milestones in its CORONET initiative this week with a successful demonstration of a technology that reduces the time it takes to provision WAN links... more »
IBM and Oracle tackle organizational complexity with acquisitions

IBM and Oracle tackle organizational complexity with acquisitions

The spread of mobile devices and cloud services has made workers more productive, but also introduced new issues of accountability and control. IBM and Oracle Corp. both moved to address these complexities this week through acquisitions. IBM's acquisition of Italian startup CrossIdeas s.r.l. gives it a new set of tools to help organizations track which employee is accessing what information and to address issues that arise when users information they’re not supposed to. Bringing analytical depth to access control   The firm’s flagship IDEAS service leverages a set of bidirectional connectors to monitor application usage across both on- and off-premise deployments for events that may break corporate... more »
No thumbnail available

The flip side of the CDO story | #MITIQ

As as is happening with other regulated industries, the financial services sector is seeing a sharp increase in the number of chief data officers at the top of the business, but some companies are still going against the flow - and succeeding. One of the most notable examples is State Street Corporation, where the task of addressing the rapid growth in unstructured information has been relegated not to a CDO but rather chief scientist David Saul, who oversees all aspects of technological change throughout the organization. He dropped by SiliconANGLE’s theCUBE at MIT’s recently concluded CDOIQ Symposium to share how... more »
No thumbnail available

Microsoft's Surface tablets 'touch down' on the NFL sidelines

NFL players and coaches alike will no longer need to sit on the sidelines twiddling their thumbs if Microsoft has its way. The software giant has just agreed a deal to provide every NFL team with a bunch of modified Surface Pro 2 tablets. This is apparently not just a creative marketing tactic by Redmond though. The idea is to modernize one of the most old-fashioned yet critical elements of the game. Up until now, when a quarterback returned to the sidelines, he and the coaches would pore over paper printouts to plan strategy. This data will now be accessible on... more »
No thumbnail available

Symantec: Wearables can be hacked to track workouts and even sexual activity

Here's some jarring news for those who love to automatically tweet and track their exercise, sleep and sex routines. Adherents of “quantified self” might learn more about themselves, but they're also making it possible for hackers to do the same. At least that's what Symantec Corp. says. Using customized Raspberry Pi computers, Symantec's security experts were able to pick apart numerous glaring holes in fitness trackers and other common wearable gadgets. They found that some devices could easily be tracked geographically, many use applications that send data in easily-hackable plain text format, and others had poor server-side security. Symantec built its homemade tracker... more »
Researchers claim Google can predict the stock market

Researchers claim Google can predict the stock market

A group of British researchers believes they can harness the power of Wikipedia and Google searches to predict where the economy is going. The research comes just a few months after Google Search's Big Data was dismissed as a predictive tool, following reports that Google Flu Trends was way off the mark when it came to guessing cases of influenza. But that small hiccup hasn't stopped academics from the University of Warwick in the UK from attempting to do the same with stock markets. In a newly published paper, the researchers explain that by relying on the emergence of phrases on Wikipedia... more »
What you missed in Big Data:  orchestration and security

What you missed in Big Data:  orchestration and security

Seven years after its creation at Yahoo, Hadoop has proven itself amongst the most efficient solutions for storing vast amounts of unstructured information on the market, now finding its way into enterprise products. Hortonworks Inc., a distributor of the open-source data crunching engine that spun out of the Internet giant,  is turning to some of the industry’s biggest vendors for help with plugging that feature gap. Hot on the heels of receiving $50 million from Hewlett-Packard Co. as part of a milestone alliance to deliver a joint analytics solution, Hortonworks teamed with another spin-off Pivotal Software, Inc., hatched from EMC Corp. and VMware... more »
No thumbnail available

Future role of the CIO will focus on business optimization | #MITCDOIQ

The CIO of a major health care firm speculated last week that the CIO job itself could disappear over the next 10 years, with responsibility accruing to the emerging role of Chief Data Officer. James, Noga, VP and CIO of Partners HealthCare. , said CIOs will have less responsibility for managing infrastructure complexities as more of those functions move to the cloud. In an interview with Dave Vellante and Jeff Kelly of SiliconANGLE at the MIT Chief Data Officer and Information Quality Symposium, Noga said this kind of change isn't new. “In the 1800’s, every manufacturing plant had its own power plant.... more »
Software that keeps employees happy, automates deployments faster

Software that keeps employees happy, automates deployments faster

This week’s Smart IT roundup features a new program to keep employees in the loop, a virtual machine that reduces automated deployment time, and the state of software-defined data centers. Klick Health’s Genome   Klick Health (Klick Inc.), a Canadian company providing digital marketing services for the health care industry, is following in the footsteps of hyperscale leaders like Amazon.com Inc. and Google Inc., improving connection points amongst their workers. Genome is an enterprise operating system that is built on a ticketing software that allows for a smoother workflow and open communication between its employees.  Every project generates a ticket and every task an... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.