Top Stories

Fight Against Anonymization Services, MasterCard and Visa Block Payment to VPN Providers

Fight Against Anonymization Services, MasterCard and Visa Block Payment to VPN Providers

Credit card companies have been seen lately taking up the vanguard of the fight against piracy. MasterCard and Visa are said to have begun to refuse payment to any provider of VPN connections--in the wake of their refusal to work with file sharing sites. Following the introduction of restrictions on the file-sharing services and strongly encouraged by the U.S. government, MasterCard and Visa have begun to take action against the VPN-providers. The TorrentFreak blog reported that a Swedish provider of payments, Payson, was instructed to not process payments, after having received appropriate instructions from the operators of credit systems. A VPN (virtual... more »
Ask DevOps: Why are software development task estimations regularly off by a factor of 2-3?

Ask DevOps: Why are software development task estimations regularly off by a factor of 2-3?

I came across an interesting question on Quora which asked about why software development task estimations are regularly off by a factor of 2-3.  The question goes on to ask if it’s the developer’s fault, a management issue, bad methodology or lack of methodology or if it’s ingrained in the nature of the process. There are some very interesting answers on Quora but the best answer may have been described by Michael Wolfe, a startup founder.  He explained that software development is like hiking from San Francisco to Los Angeles and estimate that you’ll reach your destination in 10 days.  It... more »
No thumbnail available

Apple Offers Expensive iOS Apps and Games for Free

Apple begins the week in a generous spirit, offering free apps and games at the App Store. Just two of several freebies include Traktor DJ (regularly $20) and Infinity Blade II (regularly $7). Apple has not formally launched a promotion campaign with these giveaways, but several reporters like Sam Byford of TheVerge believe these offerings may be in conjunction with the upcoming App Store Anniversary on July 10th. Since its launch in 2008, the App Store has received over 50 billion downloads. In an earlier commemorative promotion, Apple awarded the user that made the 50 billionth download a $10,000 gift card.... more »
How To Ditch Google: Alternatives For Every Google Product Known To Man

How To Ditch Google: Alternatives For Every Google Product Known To Man

Of all the companies implicated in the NSA – PRISM scandal, Google's involvement has to be the most worrisome. Reason being, practically 99% of the world's internet users (if we exclude China) must be using at least one Google service or product, and in most cases they'll be using dozens. Be it search, email, news, instant messaging, social networking or even books, Google's services are used by millions of people the world over. I'll give Google some credit here – the reason so many millions upon billions of people use their services is because they're so damn good at what they... more »
How DevOps Works at Rafter

How DevOps Works at Rafter

Rafter Inc, formerly known as Bookrenter.com is the first online textbook rental service. The company started with a group of college graduates and has transformed to a large company in the last six years. Here we have insights from Chris Williams, Co-founder of Rafter Inc on how his company is putting DevOps at work. Williams manages the DevOps department and oversees infrastructure automation, deployment and release processes, and platform availability. As Rafter Inc. started flourishing with growing engineering and product teams, more number of applications hosted on hardware, and developers wanting to use new types of application frameworks, programming languages, databases,... more »
Android’s Achilles’ Heel Poses a Major Threat to Users

Android’s Achilles’ Heel Poses a Major Threat to Users

Researchers from Bluebox Security have discovered a vulnerability that leaves 99 percent of all Android devices exposed to malware. SiliconANGLE Contributing Editor John Casaretto discussed the findings in a recent interview with NewsDesk host Kristin Feledy. Android uses cryptographic signatures to verify that application updates originate from developers. John says that the exploit Bluebox uncovered allows attackers to bypass this verification mechanism and modify an application without breaking its unique signature. The severity of the compromise depends on the application. While an arbitrary app may or may not give attackers access to personal data, a pre-installed application with a platform key can... more »
No thumbnail available

Are Mobile Users to Blame for "Spying" Motorola ToS?

Before the nation celebrated Independence Day last week, Motorola revealed a new ad for the Moto X, its upcoming flagship smartphone in collaboration with Google.  The ad boasts of a smartphone that users can design themselves.  Not really sure if Motorola meant a smartphone that is unique to each users since they would be designing it, or its just a clever marketing tactic referring only to the customization of the handset's UI or wallpaper. However, one thing remains clear, Motorola wants consumers to be “free.” Free from what?  There's no telling, but it’s certainly not freedom from the government’s spying eyes... more »
Club Nintendo Suffers Hacking Attempt that Compromises 24,000 Accounts

Club Nintendo Suffers Hacking Attempt that Compromises 24,000 Accounts

Last week 24,000 user accounts associated with the Japanese Club Nintendo website have been compromised after a month-long campaign by hackers to break in. According to the Japan Times, Nintendo gave warning via a press release last Friday that the accessed data included names, home addresses, phone numbers and email addresses of Club Nintendo members. However, it has also been concluded by the major console maker that only Japanese users had their information accessed. Nintendo confirmed there had been around 15.4 million fraudulent login attempts starting June 9th through Thursday, of which 23,926 were successful. Demarking a month-long campaign by hackers... more »
Deutsche Börse Envisions Cloud as a Commodity

Deutsche Börse Envisions Cloud as a Commodity

Deutsche Borse, Europe’s largest exchange operator, plans to launch a marketplace for cloud services in the beginning of 2014. The upcoming Deutsche Borse Cloud Exchange (DBCE) will enable outsourced computing capacity and storage to be traded just like grains, precious metals and other traditional commodities. SiliconANGLE Founding Editor Mark "Rizzn" Hopkins shared his insights into the initiative in a recent Q&A on NewsDesk with host Kristin Feledy. Mark highlights that trading cloud services the same way as vendor-neutral commodities is made possible by OpenStack and other open-source standards. These technologies simplify data migration between different cloud platforms and greatly reduce downtime... more »
Companies Who Don't Use Data Are at a Disadvantage : Exclusive Hadoop Summit Coverage

Companies Who Don't Use Data Are at a Disadvantage : Exclusive Hadoop Summit Coverage

Sanjay Mathur, Founder and CEO of Silicon Valley Data Science, discussed data driven businesses and recently launched Silicon Valley Data Science plans live with theCUBE co-hosts John Furrier and Dave Vellante, live at the recently concluded 2013 Hadoop Summit. Silicon Valley Data Science is striving to bring together a team of engineers, data scientists and platform experts in order to "solve problems for data oriented companies," Mathur explained. The company's current team has deep background in both data science and engineering, having brought together people from companies as Accenture and Walmart. The main purpose is to create a team of experts that can... more »

Premium Research

RSS Error: This XML document is invalid, likely due to invalid characters. XML error: Reserved XML Name at line 2, column 38