Top Stories

BlackBerry sticks to its guns: Its QWERTY keyboards are going nowhere

BlackBerry sticks to its guns: Its QWERTY keyboards are going nowhere

BlackBerry had high hopes for 2013. The company started the year with the launch of the BlackBerry Z10, its first fully touchscreen smartphone, followed by the appointment of Alicia Keys as its global creative director, and officially changing its name from Research in Motion to BlackBerry. Everyone thought it was the year BlackBerry would finally make it back to the top of the mobile tree, but things started to fall apart.  Consumers were not interested in the Z10 as its features were no match for what others are offering in the smartphone market.  BlackBerry fans waited on the Q10, a smartphone... more »
Microsoft Threshold coming in April 2015, Windows 8.1 dubbed as the new Vista

Microsoft Threshold coming in April 2015, Windows 8.1 dubbed as the new Vista

Recent reports showed that the PC business has seen its worst quarter ever, with sales falling by 10 percent.  The main reason behind this is that consumers are now more interested in purchasing smartphones and tablets, rather than buying new PCs. As smartphones and tablets continue to encroach on the PC market, Microsoft finds itself in hot waters. Not only is the mobile market beating the PC to a pulp, Google is becoming a real threat for Microsoft. Google has managed to infiltrate the PC business, first with its Chromebooks’ increasing market share, and more recently at CES 2014, where Lenovo... more »
No thumbnail available

Shrinking infrastructure : Protect data across hacker borders | #MITECIR

Al Berkley, the chairman of Princeton Capital Management, dropped by theCUBE at last week’s MIT ECIR Workshop to discuss the changing dynamics of cybersecurity and policymaking with Wikibon’s Dave Vellante and guest host Charles Sennott. Berkley serves on the board of Business Executives for National Security (BENS), a member-funded nonprofit comprised of CEOs and other senior leaders with an interest in tackling emerging security issues. After being commissioned by the U.S. government to provide input on managing online threats, the organization became a sponsor of ECIR, and he was tasked with presenting on its behalf. Enterprises today have a distinct advantage over... more »
Facebook kills 'sponsored stories' but your face will still be used in its ads

Facebook kills 'sponsored stories' but your face will still be used in its ads

Facebook has made good on an earlier promise to kill off its so-called “sponsored stories”, those annoying ads that use your friend's identities and likes to promote various brands and pages. Last year, the social media giant updated its privacy policy, making clear that it would nix the sponsored stories language. But while its ads are no longer to be called “sponsored stories”, that doesn't mean they're going away – instead we can expect to see a revamped form of advertising using our profile information, to be know as “social context”. Facebook gave a brief description of its new ads in... more »
It's about time Microsoft got into bed with Android

It's about time Microsoft got into bed with Android

Last week's CES was notable for the conspicuous absence of one of the world's largest consumer electronics firms – Microsoft. Having pulled out of CES 2013, devices running Windows software were almost totally absent at this year's edition. Instead, CES 2014 saw Android-based desktops and laptops begin to gain momentum, and they're now shaping up to be the first real threat to Microsoft’s dominance in the PC market. But of course, Android will only be a threat so long as there's a PC market to speak of, and things don't look so good in that department. PC shipments have been steadily... more »
Three more major U.S. retailers hacked, link to Target holiday hackers?

Three more major U.S. retailers hacked, link to Target holiday hackers?

Hardly a day went by since we heard that the big Target hack of December 2013 actually affected as many as 110 million people and that upscale retailer Neiman Marcus was also hacked that the cybercrime news has gotten even more interesting. According to a report from Reuters, three additional major retailers have also been hacked during the holiday shopping season. The names of the merchants have not been disclosed thus far, but they are reported to be smaller breaches at well-known U.S. retailers. The techniques used in these latest attacks are reportedly similar to the Target attack. Early yesterday... more »
No thumbnail available

EMC’s Mat Allen on cyberthreats and the security leadership gap | #MITECIR

Data security has become a top priority for all sectors, but the majority of decision makers have not yet adjusted to this new reality, according to EMC security practice lead Mat Allen. He appeared on theCUBE at the recently concluded MIT ECIR Workshop to share his firsthand insights about the enterprise threat landscape with Wikibon’s Dave Vellante and Stu Miniman. Protecting data from loss and unauthorized access has always been central to IT, but only now are business and policy leaders coming to realize that an insecure network exposes their organizations to a tremendous amount of liability. Allen reports that the... more »
Uncertain road ahead for Internet governance | #MITECIR

Uncertain road ahead for Internet governance | #MITECIR

In the interconnected era, policy makers can’t afford to lag behind technological change. Cyber security has become a national security issue, and now governance - or lack thereof - is emerging as a challenge to sustaining the growth and innovation spurred by the web. These were the talking points at last week’s MIT Explorations in Cyber International Relations (ECIR) Workshop, which Wikibon’s Dave Vellante, Jeff Kelly and Stu Miniman wrapped up live on theCUBE with their observations on the future of the digital universe. Tomorrow’s Internet will be a multi-stakeholder environment, according to Vellante, but the road to globally coordinated governance... more »
Big and rich: Target retail breach now up to 110 million, Neiman Marcus also hacked

Big and rich: Target retail breach now up to 110 million, Neiman Marcus also hacked

The scope of Target’s retail breach has crept up. Actually it has nearly tripled in the number of people affected.  Initial reports stated that data for 40 million consumers was compromised - nothing to sneeze at.  The next big development revealed that PIN information was also lost, though Target assures that the information was encrypted.  Yesterday it was reported that data was taken for up to 110 million people.  That number approaches three times the number first reported and represents at least a third of the U.S. population.  This is a shining example of why it is important to allow... more »
No thumbnail available

EMC veteran David Goulden lands CEO role

David Goulden, who was widely considered a top candidate to succeed EMC boss Joe Tucci before he pushed back his retirement to 2015, has finally been named CEO of the storage giant’s core information infrastructure. He previously served as the company’s president and chief operating officer. Goulden has been with EMC for 11 years, directing marketing efforts in the early 2000’s and later leading business development. The executive oversaw the acquisition of Documentum, data protection vendor Legato Systems (now NetWorker) and most notably, VMware. The virtualization giant is currently headed by Pat Gelsinger, who took the helm after former CEO Paul... more »

Premium Research

- David Floyer

Industrial IoT, the largest segment of the Internet of things (IoT) with the highest potential value, will require a deep integration between modern IT (Information Technology) and OT (Operations Technology). Modern IT technologies, to be truly extensible to OT, will need a hybrid cloud approach, with by far the majority of data and processing residing at the so-called "Edge". Architectures and software written by industrialists for industrialists, such as GE Predix, are showing how that can work.

- George Gilbert

The big data arena is at a crossroads. Use cases and tools are proliferating faster than most big data teams are gaining experience. In establishing the big data business capabilities required to cut through the complexity, CIO’s must balance the accessibility of integration of traditional SQL DBMS’s versus speed of innovation in the mix and match open source big data ecosystem.

- Peter Burris

In the big data domain, businesses are trying to solve complex problems with complex and novel technology -- and often failing. Simplifying the packaging of big data technologies will streamline big data pilots and accelerate big data time-to-value. CIOs looking to establish differentiating big data capabilities need to consider Single Managed Entities to help solve the complexity problem.

- David Floyer

Oracle M7 technology is meeting or exceeding the announcement performance claims against previous generation. Even taking very conservative assumptions, the business case for migration from T5 to T7 servers is good. Wikibon concludes that for Oracle software and the servers they run on, the adoption of M7 technology (and T7 server technology) is best practice for these high value compute areas.

- David Floyer

The premise tested in this research is that high value applications and software should be run on more capable converged performance-optimized infrastructure, even when they constitute a small proportion of the total workload. In contrast, cost-optimized infrastructure will save on short-term hardware costs, but will incur much higher overall costs long-term. The conclusion strongly recommends IT executives adopt a default of performance-optimized converged infrastructure for all mixed workloads when even a small proportion includes high-cost software and/or high-value applications.

- George Gilbert

Big data pros need to identify which data feedback loops in their machine learning applications can deliver sustainable differentiation through network effects. Starting early is critical because getting to scale is likely to create the "winner takes most" competitive dynamics that have become so common in tech industries. The biggest sin is to wait for the tooling to become automated enough for all competitors to jump in.

- Ralph Finos

The public cloud competitive environment remains turbulent, but sectors show signs of crystallizing a longer-term market structure.. SaaS remains turbulent with SaaS vendors successfully gaining share vs. incumbent licensed software providers who must migrate their core products to cloud-friendly offerings and/or acquire native SaaS applications to shore up their applications leadership positions. Public cloud IaaS segment leadership is crystallizing to a handful of viable providers as a function of scale requirements. PaaS is just formulating and finding its way, but is likely to gravitate towards a wide variety of development models suited for different application types and public cloud platforms.

- David Floyer

For enterprise executives trying to achieve aggressive RPO and RTO SLAs , Wikibon believes that batch backup appliances (PBBAs) will give way to real-time, continuous data protection systems that aggressively support very large memory application memory. Practitioners requiring close to RPO zero and aggressive RTO SLAs should plan for an integrated data protection approach that effectively eliminates the concept of storage-led backup and shifts thinking to a application-led virtual point-in-time recovery model. The database and file system vendors will be the predominant suppliers of this technology, and understanding their roadmaps and commitment to support application-led recovery strategies is crucial to both database and data protection technology selection.

- George Gilbert

Mainstream enterprises are beginning to deploy machine learning applications that add differentiation to traditional products and services. But the complexity of their big data infrastructure is becoming a problem. Big data pros need to deploy a digital business platform (DBP) to support modern applications and then extend the DBP to machine learning applications.

- Peter Burris

IT shops that want to achieve modern IT status will have to address the "IT iron triangle" constraining transformation.