Top Stories

No thumbnail available

Springpad Declutters Bookmarks + Boards with New Update

Springpad recently revamped its look, improving already great aesthetics for Apple’s iOS 7.  With the new look came the ability to format Springs on any device, syncing, and save and share. But Springpad is far from being done with the transition, with a few new updates released today. Springpad promises a distraction-free experience by eliminating clutter and streamlining features. “All that noise and distraction in your life, we put a silencer on it when you’re in Springpad notebooks. Like our new Notes, we gave you a simpler workspace that hides all the distractions, so you can stay focused and get things done,” Springpad... more »
PHP.net Compromised, Caught Potentially Spreading Malware

PHP.net Compromised, Caught Potentially Spreading Malware

For a short time today, it appears that something managed to compromise the PHP.net web pages and alter some of the JavaScript present to spread malware. Earlier today, Barracuda Labs quickly published a blog post researching the hits and speculating about what happened. Earlier today Google’s stop-badware system caught this as well and flagged php.net as distributing malware, warning users who’s browsers support it not to visit the site, etc. Interestingly enough, the Google diagnostic page now seems to say otherwise and there seems to be some controversy and disbelief that a site like php.net could be doing this, and as... more »
6 Pinterest Apps + Alternatives for iPhones and More

6 Pinterest Apps + Alternatives for iPhones and More

Pinterest is going global, with a heavy concentration on the international mobile scene.  Having just raised $225 million in a Series E funding round, the massive cash infusion will be used for its global expansion and investment in infrastructure to improve the service. As Pinterest aims for global domination, having revealed plans earlier this year to expand in Europe and Asia, mobile is an important focus for the social network.  More and more people now consume web content from their mobile devices, and mobile has been a late focus for Pinterest.  While the photo-centric sharing platform does have apps on all... more »
JNBridge Lab Creates Real-Time Visual Monitoring for Hadoop Clusters with .NET-based Visio

JNBridge Lab Creates Real-Time Visual Monitoring for Hadoop Clusters with .NET-based Visio

JNBridge, the leading provider of interoperability tools connecting Java and .NET, recently announced its most recent Lab. JNBridge Labs is a series of interoperability kits designed to help developers connect Java and .NET technologies in new and innovative ways. These labs are free to download and include all code and documentation. This allows developers to customize the kit to better suit their needs. JNBridge has enabled developers leverage the superior graphical capabilities available in .NET-based programs like Microsoft Visio, to monitor an entire Apache Hadoop cluster in real time. This Lab transforms Hadoop beyond a simple HTML, into a dynamic framework... more »
Software-Led Infrastructure Will Need Dev/Ops

Software-Led Infrastructure Will Need Dev/Ops

Software-led architecture will increase the need for dev/ops to support more "aware" applications and react faster to the rapid changes and new possibilities of the new unified infrastructure, writes Wikibon analyst and consultant Scott Lowe. Tomorrow's infrastructure will be software-aware, disaster-resistant, and business-friendly. Dev/Ops will bring a programatic attitude to IT operations and streamline the process of developing, testing, and implementing new software and major updates to existing programs, helping IT to react faster and more efficiently to the changes that are happening in the computing and business environments. CIOS, he writes, should consider workload automation technologies and encourage collaboration among IT... more »
Splunk Poised to Become Big Data App King

Splunk Poised to Become Big Data App King

When Big Data started to really take flight a couple of years ago, many inside the industry anticipated that major application development would follow. After all, what use is it to have access to so much unstructured data if you have no means to analyze and utilize it? While some Big Data companies have started creating applications for Hadoop and other Big Data platforms, none have taken a dominant role in this market space. Splunk aims to change that, and so far the company is off to a very good start. According to Wikibon lead Big Data analyst Jeff Kelly, Big... more »
64-bit ARM Signals Mobile Dominance of Client Computing

64-bit ARM Signals Mobile Dominance of Client Computing

The successful start of volume production of the 64-bit ARM processor this month signals the start of the mobile/cloud era and end of the WinTel duopoly in end-user computing, writes Wikibon CTO David Floyer. Apple is already introducing 64-bit with its A7 processor in the high volume iPhone S5, iPad Air, and iPad mini. Google, Lenovo, Microsoft, and Samsung are all promising 64-bit ARM-based products. The new processor eliminates the 4GB memory addressing limitations, allowing these new mobile devices to use real and virtual memory much more efficiently. It will allow faster application loading and execution, smoother rendering, and lower development... more »
Is TrueCrypt is Safe to Use? Time to Check It Out

Is TrueCrypt is Safe to Use? Time to Check It Out

Researchers are calling for a full audit of extremely popular opensource encrpytion solution TrueCrypt. This effort begins at IsTrueCryptAuditedYet.com--that includes seeking funds for the project--but the history of TrueCrypt and its capabilities begin in February of 2002. Surprisingly, as a security tool, TrueCrypt has never been audited, its authors are anonymous, and it has an extreme depth in the market of free tools. TrueCrypt is one of those tools that gained considerable popularity and has existed since the dawn of time. The software allows you to encrypt files “on the fly,” create virtual encrypted disks in the file, encrypt entire partitions, and... more »
No thumbnail available

4 Lessons in Big Data Security from Sqrrl CTO Adam Fuchs

Boston-based software company, Sqrrl Data Inc., has been busy lately, building a small empire around the very needed market of security in Big Data solutions.  With a fresh round of funding and a history of experience building solutions for government agencies, there's a great deal to be learned from Sqrrl. The $5.2 million raised in Sqrrl's recent funding round will be used to accelerate its growth plans and to promote its market opportunity in Big Data security, which Sqrrl believes is a booming sector of which CIOs and cybercriminals alike will soon take notice. We've been following the startup's progress over the... more »
CEO Series Special Edition : Powerful Women in Tech

CEO Series Special Edition : Powerful Women in Tech

Women today can be anything they wish.  From a loving mother to a hardworking employee, a nurse, doctor, teacher, lawyer, judge, or even a CEO of a company they built and nurtured like it’s their own baby.  The tech sector has been especially benefitted by the growing number of women leaders, overcoming the challenges that the female gender faces in a traditionally male-dominated sector. To celebrate the empowerment of women, we here at SiliconANGLE drummed up a number of astonishing women in tech to impart their knowledge and wisdom of how they are changing the world. The following is a collection of... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.