Top Stories

Big Data school : 5 training programs for R language

Big Data school : 5 training programs for R language

There's little surprise in seeing Java top the list of popular programming languages for 2014, but another language is gaining traction. R, the free software programming language and developer environment for statistical computing and graphics, cracked IEEE Spectrum's top 10 list this year. With today’s wealth of data, statistical computing plays a huge role in making sense of Big Data, and companies including IBM, Revolution Analytics, Teradata Aster and Pivotal have focused on making R enterprise ready. We can expect R to play a bigger role in the coming years as more devices connect to the Internet, creating more data, which means... more »
Password managers hacked: Researchers find 'critical' vulnerabilities

Password managers hacked: Researchers find 'critical' vulnerabilities

If you're using a popular password manager your credentials might not be entirely safe, following the discovery of several vulnerabilities that could allow attackers to gain access. University of California Berkeley researchers have discovered a number of quickly-patched vulnerabilities in LastPass, My1Login, NeedMyPassword, PasswordBox and RoboForm. They described their work as a “wake-up call” for password manager developers. "Our attacks are severe: in four out of the five password managers we studied, an attacker can learn a user’s credentials for arbitrary websites," wrote researchers Zhiwei Li, Warren He, Devdatta Akhawe, and Dawn Song wrote in their paper. "We find vulnerabilities in diverse... more »
No thumbnail available

DARPA shows off bullets that can be steered to a target

The Defense Advanced Research Projects Agency (DARPA) has made significant progress in building 'steerable' bullets that can be directed to a target, and now the agency has released video footage of the first prototype in action. DARPA's intelligent munition has been dubbed EXACTO (EXtreme ACcuracy Tasked Ordnance), and the footage shows two .50-cal rounds being maneuvered in flight towards a target. One of the bullets makes two adjustments to its course before crashing headlong into its target. "EXACTO’s specially designed ammunition and real-time optical guidance system help track and direct projectiles to their targets by compensating for weather, wind, target movement and other... more »
Is wearable tech wearing thin in the enterprise?

Is wearable tech wearing thin in the enterprise?

Wearable tech is all the rage. Almost every other day, new gadgets that can be strapped on, attached or worn seem to hit the headlines. Smartwatches, smartglasses, fitness trackers and augmented reality headsets are just a few of the most well known, but there are many more. All these devices have something in common – they seem to be aimed at consumers, either fitness freaks or gamers and geeks, or those with more money than sense. It seems that few, if any of these gadgets really have any practical use beyond gathering health data or making our lives slightly more convenient... more »
No thumbnail available

Weekly Cloud review: From OpenStack to AWS

The last few days saw a string of major industry updates spanning the open-source private cloud all the way up to the proprietary public cloud. It was Red Hat that fired the opening shot with the launch of the latest version of its OpenStack distribution, which introduces a host of new features and enhancements aimed at making the platform more practical to operate for risk-averse enterprise IT organizations operating on a tight budget. Red Hat OpenStack Platform (OSP) 5.0 brings with it the ability to create server groups that can be managed as a single logical movement and provide increased resilience... more »
No thumbnail available

What you missed in Big Data: the two-lane highway to the IoT

The task of taming the growing amounts of data pouring in from the connected universe starts with the devices themselves, or at least that’s the position of the Open Interconnect Consortium, a newly established industry group focused on harmonizing the way information is  exchanged throughout the Internet of Things. The group currently only consists of its six founding sponsors, all of which are big-name vendors with plenty of gain from accelerating the connected revolution: Amtel, Broadcom, Dell, Samsung, Intel and Wind River, the chip maker’s embedded software subsidiary. The OIC’s mission statement is to enable seamless data sharing among devices regardless... more »
Smart Office solutions get automated, tested in rotating boxes

Smart Office solutions get automated, tested in rotating boxes

This week’s Smart IT roundup features a $1.4M round of funding for a smart office software, a fresh take on product integration for sales automation, and a test lab for smart offices. Robin secures $1.4M seed funding   Soon, booking office space for meetings will be as simple as walking into a room or using your Google Calendar, thanks to Robin, a smart office software that automates the booking process. Supporting the vision, Robin secured $1.4 million in a seed funding from Atlas Venture, Deep Fork Capital, Boldstart Ventures, and Space Pirates.  With Robin, gone are the days of double-booked rooms, or forgetting... more »
Converging on the future of Big Data | #HPdiscover

Converging on the future of Big Data | #HPdiscover

When it comes to cloud computing, Hewlett-Packard has gotten on board with its ConvergedSystem platform, including the newly released ConvergedSystems 900 (CS900) server. Using a common converged infrastructure architecture across its entire server, storage, and networking products, HP Converged Systems pools its resources, allowing them to be shared across the variety of different applications while still being managed from a management platform using standard security software. Paul Miller, VP of Marketing for HP Converge Systems, sat down and talked with Dave Vellante and Jeff Frick of theCUBE at HP Discover in Las Vegas about the latest developments with the converged system. Revolutionary... more »
No thumbnail available

Microsoft's rekindled love-affair with hardware goes deeper with new arrays

Microsoft has stopped being just an operating system company a long time ago, adding a considerable number of notches to its belt of titles over the years: server virtualization vendor, cloud service provider, tablet maker and most recently enterprise storage supplier with the acquisition of StorSimple in November 2012. The deal, the terms of which were not disclosed, set the industry abuzz with speculations that the Redmond giant may look to leverage the startup’s technology as a means of linking the largely disparate on- and off-premise components of its portfolio. StorSimple was shaping up to be a perfect fit for the... more »
No thumbnail available

Getting serious about online security

Software developers and system administrators around the world are losing the equivalent of an arms race, trying to detect, fix, and shore up weaknesses exposed by numerous vulnerabilities such as the OpenSSL HeartBleed vulnerability. More than two months after HeartBleed was reported, it is estimated that more than 300,000 servers are still at risk. In theory, open-source software should be the most secure kind of software, since anyone can review it and provide security fixes. However, in practice, there is a shortage of highly skilled people who can properly write and audit cryptographic software. Expenditures for such people are currently most economically beneficial... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.