Top Stories

Big Data And A Black Hat

Big Data And A Black Hat

In just over a week, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. In this series, intended to preview many of the talks and presentations scheduled for the event, SiliconANGLE will focus on the exploitative vulnerabilities associated with big data and how those vulnerabilities can be limited. The first in our series focuses on a presentation by Dmitry Chastuhin, a student in the computer science department at St. Petersburg State Polytechnic University and an SAP acknowledged security expert. His presentation, entitled ‘With Big Data Comes Big Responsibility: Practical Exploiting of MDX Injections’ will be held Wednesday,... more »
OS X Users Hit by Ransom Malware Posing as FBI

OS X Users Hit by Ransom Malware Posing as FBI

Hopefully by now the notion has been dispelled that Macs, iOS and OS X are inherently more secure because, well just because. All operating systems have security weaknesses and that is just a fact. If you’re not aware of this it’s easily explained in the fact that up until a handful of years ago, if you wanted the largest audience possible to exploit with malware, Windows was the biggest target by far. So the bad guys designed it that way. Things have changed though and alternative products like Apple's have gotten more attention from the parties that create and deliver... more »
Clustered Storage: Meeting Tomorrow’s Data Storage Needs | #NetAppChat Highlights

Clustered Storage: Meeting Tomorrow’s Data Storage Needs | #NetAppChat Highlights

Yesterday we teamed up one more time with storage service provider NetApp in our joint series with The Wikibon Project.  This week's #NetAppChat covered the topic: "Clustered Storage: Meeting Tomorrow’s Data Storage Needs.” As we did with the first #NetAppChat, "Where Does Software-Defined Storage Fit Into the IT Renaissance?", here is a recap of some of the best questions and answers from the virtual event. What types of storage challenges do application owners face to support their business critical applications? As the enterprise space evolves, its storage requirements evolve too.  Addressing the new needs of the enterprise, NetApp recently released Clustered Data ONTAP 8.2, introducing... more »
Mobile Ultrasound Scanner is Poised to Revolutionize Healthcare Industry

Mobile Ultrasound Scanner is Poised to Revolutionize Healthcare Industry

Ultrasound scanners are used to image the human body for diagnostic purposes. However, the scanners that are widely used in hospitals and clinics and are usually fairly large, expensive, and therefore unwieldy. Now with wireless networks, Internet, connectivity, bandwidth capacities, the huge popularity of smartphones, and cloud computing--capable of storing enormous volumes of data--we have a convergence of tools that can be applied to medicine. American scientists have invented world’s first ultrasound imaging system for smartphones that uses wireless technology to transmit diagnostic scans. Once plugged into a smartphone or tablet, the MobiUS scanner provides an instant scan image on the mobile... more »
Telerik Sitefinity 6.1 Brings Lightweight Digital Asset Management to Empower Desktop Publishing

Telerik Sitefinity 6.1 Brings Lightweight Digital Asset Management to Empower Desktop Publishing

Telerik, known for its rich portfolio of solutions for application lifecycle management, and web-sites, has released a new version of its content management system Sitefinity 6.1 with unique capabilities for content writers to quickly find and edit digital assets without the need to navigate to them in the WCM backend. The latest Web Content Management (WCM) platform includes a lightweight Digital Asset Management (DAM) that helps power users the capability to change, update, and manipulate rich digital media assets. Sitefinity 6.1 also brings responsive navigation widgets with touch-friendly navigation for mobile devices using predefined CSS. “The Sitefinity 6.1 release is all about... more »
Galaxy Note 3 vs. HTC One Max : Phablet Rumors + Smartphone Scares

Galaxy Note 3 vs. HTC One Max : Phablet Rumors + Smartphone Scares

These days, phone manufacturer releases seem to be all about three things: a big phone but not big enough to be considered as a phablet, a smaller version of that phone for those who aren’t fond of lugging around a huge phone, then a phablet for those who see bigger things as better things. Samsung and HTC are both guilty of this.  First they released their flagship smartphones, the Galaxy S4 and the HTC One, then Samsung released various variants of the S4 including the S4 mini, we’re still waiting on HTC to reveal the HTC One mini, but it seem... more »
Convercent is Changing the GRC and Compliance Game with Cloud, Analytics

Convercent is Changing the GRC and Compliance Game with Cloud, Analytics

Convercent hasn’t been on the scene long but that hasn’t stopped them from a path of innovating and disrupting the GRC software market.  The Denver-based software startup shot out the gates early this year with 10 million dollars in venture capital and over 300 customers in hand on a torrid mission of growth and change.  Today the company announced the latest version of its core product just six months after the launching that has turned the compliance industry on its head.  Convercent has added predictive analytics to the mix, designed to help compliance officers see risk issues before they become... more »
Vulnerability Rewards Programs Pay Greater Economic Rewards than Hiring Full-Time Researchers

Vulnerability Rewards Programs Pay Greater Economic Rewards than Hiring Full-Time Researchers

Vulnerability Rewards Programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers. Matthew Finifter, Devdatta Akhawe and David Wagner of the University of California, Berkeley, have published an interesting new research on vulnerability rewards programs (VRPs), particularly focusing on two most popular browser - Chrome and Firefox. The researchers have found that Google has paid around $580,000 in 501 bounties, whereas Mozilla has paid $570,000 in 109 bounties over the past three years, which is far less than it would’ve cost to hire employees to find the same number of vulnerabilities. Despite costing... more »
Nutanix Engineer Explains Why His Company’s Appliance Makes Sense for Analytics

Nutanix Engineer Explains Why His Company’s Appliance Makes Sense for Analytics

SiliconAngle Studio B host Winston Edmondson stopped by Nutanix’s booth at Hadoop Summit to bring you a fresh perspective on its flagship Virtual Computing Platform. Karthik Ranganathan, a member of the company’s technical crew and a former lead programmer at Facebook, walked him through the details. Ranganathan describes the solution as a converged infrastructure appliance geared towards virtual machines. The platform’s built-in distributed file system stores data locally to reduce virtualization tax, which means that it’s fast enough to run CPU-intensive workloads such as Hadoop. The system is also much easier to manage than traditional deployments. Ranganathan explains that most virtualized environments... more »
MicroStrategy’s Scott Cappiello on the Rise of Hadoop

MicroStrategy’s Scott Cappiello on the Rise of Hadoop

SiliconAngle Studio B host Winston Edmondson caught up with Scott Cappiello, the vice president of product management for business analytics specialist MicroStrategy, at the Hadoop Summit in San Jose. The two chatted about data visualization and MicroStrategy’s value proposition for enterprises that are implementing Hadoop in their environments. Cappiello observes that Hadoop Summit 2013 featured more customer presentations and use cases than previous years. He changes the topic to his company, and highlights that they leverage the Hive data warehousing system to integrate its BI software with Hadoop. He says that the system is a “natural fit” for the task, especially... more »

Premium Research

RSS Error: This XML document is invalid, likely due to invalid characters. XML error: Reserved XML Name at line 2, column 38