Top Stories

Twitter IPO: Ringing the bell and soaring stocks

Twitter IPO: Ringing the bell and soaring stocks

Microblogging site Twitter debuted on the New York Stock Exchange yesterday under the ticker TWTR. There were a few questions that came with its debut at NYSE, such as its initial public offering price, how many stocks are for sale, and who rang the bell? IPO   Before its debut, Twitter announced that it would be selling 70,000,000 of its shares at $26 per share.  That’s the minimum price, but still, if it sold all of the 70M shares at that price, net profit will amount to more than $2 billion.  The official stock price brings Twitter’s value at roughly $14 billion. Initially, Twitter priced... more »
No thumbnail available

How Huddle stayed ahead of the BYOD curve : Q&A with Andy McLoughlin

Some of the most fascinating stories in BYOD are from those companies that embarked on a cloud-ready journey before the mobile era truly took hold.  One of those early visionaries is Huddle, a company that's thrived in today's consumer-driven workplace. In today's CEO Series we hear from Andy McLoughlin, the co-founder and EVP of Strategy at Huddle.  He shares his company's mission that's enabled Huddle to stay focused in a rapidly changing world, as well as thoughts on how the cloud can empower organizations to work more efficiently. Finally, Andy shares some great tips on investing in the tech market, the personal... more »
China's military hacks ongoing, driven deeper underground

China's military hacks ongoing, driven deeper underground

And now, thanks to the NSA, we can't even take the moral high ground...   The public exposure of Chinese military hacking group PLA Unit 61398, also known as APT1 or Comment Crew, has done nothing to stop its activities, merely driving its members further underground, warns a new US congressional report. It was almost a year ago that China's military was first outed by the New York Times, working alongside cybersecurity firm Mandiant, for being behind a series of hacks against targets in the United States. In the wake of the revelations, articles were written, high-level talks between officials took place, and... more »
On the misconceptions of open source vs. proprietary debate in Big Data

On the misconceptions of open source vs. proprietary debate in Big Data

Editor’s Note: the following is an excerpt from an interview conducted with Jim Vogt, CEO of Zettaset. As part of our Big Data series, we've asked industry thought leaders about scaling Big Data applications, the open source vs. open core debate, and where the true spots of innovation are moving forward. The original interview was conducted by SiliconANGLE Senior Managing Editor, Kristen Nicole. Big Data applications at the enterprise level   If you are looking for the best method to scale then you must build a data store that fulfills all the prerequisites. Each element, from how you run applications to performance and scalability... more »
Parallels integrates Mac, PC and iPad into your IT infrastructure

Parallels integrates Mac, PC and iPad into your IT infrastructure

Apple products for work are used globally by business and, as per a Forrester report, about half of all companies have at least provided some of their staff with Macs or iPad. According to a Parallels study, it was still common in large companies that Macs are operated without much business tools (mostly related to Microsoft business suites) or security management and 42 percent of large companies would not have a solution for the Mac. Bridging the gap between PC, Mac and iPad, Parallels announced Parallels Business Solutions, a mixed Windows and Mac business tools. Parallels Business Solutions include updates to... more »
Bitcoin wallet Inputs.io goes frownyface and shuts down after serious breach

Bitcoin wallet Inputs.io goes frownyface and shuts down after serious breach

Visitors to the secure Bitcoin wallet site Inputs.io will be greeted with a frowning emoticon today and a PGP-signed message telling them the bad news: Inputs.io has been shut down in the wake of a massive hack. The site has lost 4100 bitcoins to hackers and is unable to continue operations. :( Two hacks totalling about 4100 BTC have left Inputs.io unable to pay all user balances. The attacker compromised the hosting account through compromising email accounts (some very old, and without phone numbers attached, so it was easy to reset). The attacker was able to bypass 2FA due to a flaw... more »
The biggest challenge of data science is framing the problem | #IBMIoD

The biggest challenge of data science is framing the problem | #IBMIoD

Live from the IBM Information on Demand Conference in Las Vegas, John Furrier and Dave Vellante, theCUBE co-hosts, interviewed Jake Porway , Founder & Executive Director at DataKind. Talking about this event and his presentation on stage, Porway described his keynote as "mostly talking about new ways that we can use big data for the greater good." Elaborating on that, he added: "There are a lot of great applications around, businesses are figuring out how to help you watch movies better, or to find a bar that you might want to go to, but the coolest thing to me about the... more »
Zadara brings NetApp FAS hardware to the Cloud

Zadara brings NetApp FAS hardware to the Cloud

Block storage vendor Zadara is taking aim at the hybrid cloud with a new pay-as-you-go solution for NetApp customers. The offering enables users to plug their fabric-attached storage (FAS) infrastructure into AWS using a private network and dedicated drives and vServers. Zadara is best known for its Virtual Private Storage Array, an OpenStack-based platform that provides SAN and NAS functionality on major public clouds. The so-called "storage array as a service” addresses the technical barriers to deploying databases and high-performance applications at a remote location. With this week’s product launch, NetApp customers can leverage VPSA to provision EC2 instances with elastic NetApp... more »
 HP takes on supply chain security

HP takes on supply chain security

Security risks today can come from any source.  Sometimes there are deliberate attacks, sometimes, there are inadvertent security issues and they can come from outside or within your own organization, but one of the most critical points of weakness in the modern enterprise can be outsiders, third-party groups and vendors.  The evidence is clear that the modern enterprise has changed, delivering global product and incorporating global sources through a vast network of global suppliers.  Inevitably, the information bridge between supplier and enterprise must be opened, but with this relationship comes an increased risk of not only a serious breach, but... more »
Apple announces repair program expansion

Apple announces repair program expansion

Earlier this year, Apple equipped its stores with a machine and tools so iPhone 5 units with damaged screens could be replaced while you wait.  The cost for having your screen replaced is $149, cheaper than the $225 fee you pay in its previous program wherein damaged devices are replaced with a new one. This not only helps consumers save on money but Apple as well, as the replacement program costs Apple about $1 billion a year. With the release of its newest batch of iPhones, the iPhone 5s and iPhone 5c, Apple is said to be expanding its repairs service. Aside... more »

Premium Research

- Brian Gracely

Wikibon looks at how businesses are shifting their application focus towards customer-facing applications, and how this shift will impact data management and storage for CIOs.

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.