Top Stories

Splunk + Pentaho for Non-Geeks : Unlocking the Value of Machine Data

Splunk + Pentaho for Non-Geeks : Unlocking the Value of Machine Data

Splunk has partnered with data integration specialist Pentaho to deliver a new solution for crunching data generated by applications, servers, sensors and other connected devices. Pentaho Business Analytics and Splunk Enterprise combines technology from both firms to integrate Splunk’s machine data analytics technology with relational databases, Hadoop, NoSQL deployments and enterprise application data. The platform also includes advanced visualization and ad hoc analysis functions that enable business users to gain insights into their information without consulting a data scientist. “Users can download Pentaho Business Analytics for Splunk Enterprise from Splunkbase, to be able to combine Splunk machine data with a variety of... more »
China's Leaders Warm Up to Big Data for Better Governance

China's Leaders Warm Up to Big Data for Better Governance

China's repressive internet regime is famous the world over, what with its "Great Firewall of China" put in place to block any sites that censors deem critical of the regime, not to mention the increasingly sophisticated systems it employs to suppress discussion of controversial subjects. China has long seen the internet as something dangerous, something that needs to be controlled and restricted, but could it be that this attitude is changing? Is it possible that China's overlords are beginning to see the web as something that it can use to its advantage? Recent developments suggest that this could be true – that... more »
LIVE: Presidential Incentives Key in Cybersecurity Reform

LIVE: Presidential Incentives Key in Cybersecurity Reform

Welcome to NewsDesk on SiliconANGLE TV for Wednesday August 7, 2013. Yesterday The White House released a preliminary set of incentives it may offer companies who are willing to join a cybersecurity program chaired by the Department of Homeland Security, and the notion has many security experts concerned. Joining us now to share details about the DHS’s cybersecurity program is SiliconANGLE Contributing Editor John Casaretto. After failing to reach an agreement on cybersecurity legislation twice last year, the president signed an executive order which this new program falls under. In it, businesses could receive insurance from agencies if they adopt certain standards within... more »
The Hardest Part of Data Visualization : Simplicity + Consumability | #HPBigData2013

The Hardest Part of Data Visualization : Simplicity + Consumability | #HPBigData2013

Paul Lilford, Channel Director, Technology Partners, Tableau Software, discussed current visualization trends with theCUBE co-hosts Dave Vellante and John Furrier, live at the HP Vertica Big Data Conference this week. With visualization, there is an "ongoing challenge with the size of data and disparity of it," according to Lilford. From a customer challenge perspective, "it's really about getting to the size of data, all the sources of data, all the scale of things." With Tableau being a data-driven company, the strategy is to combine all data sources quickly, helping customers make more data decisions at a detailed level. Social, web, third party, ERP... more »
VMware Nabs SAP’s Sanjay Poonen, Shares Thoughts on Cloud Ecosystem

VMware Nabs SAP’s Sanjay Poonen, Shares Thoughts on Cloud Ecosystem

VMware announced Tuesday morning that Sanjay Poonen is taking over as the head of its end-user computing group. Poonen holds two patents, as well as an MBA from Harvard Business School and a master’s degree from Stanford University. He began his career as an engineer for Microsoft, and advanced to executive positions at prominent tech firms such as Symantec, VERITAS and Informatica. He most recently served the president of global solutions and go-to-market for BI giant SAP. TheCube crew caught up with Poonen at SAP Sapphire 2011 to get his take on cloud computing and its impact on the ecosystem value change. “System... more »
Twitter Rolls Out Non-SMS, Two-Factor Authentication

Twitter Rolls Out Non-SMS, Two-Factor Authentication

There’s a lot of buzz about the social world today.  There’s the new two-factor Twitter authentication, WhatsApps’ new voice messaging, and even Facebook has rolled out a few new updates.  So let’s check ‘em out. Twitter does away with SMS   Most two-factor authentication relies on SMS messages.  If you want to always be secured when you log in your online account, if the service supports it, you can setup two-factor authentication which would require you to enter your mobile number so the service can send a code via SMS, which has to be inputted to login to the service.  This method is... more »
No thumbnail available

Smart TV + Cloud Win : 5 Places to Watch Breaking Bad Online

Looking to catch up on Breaking Bad before the season 6 premier on August 11?  Thanks to ongoing developments in the smart TV sector and the cloud, you have several options to watch previous seasons of Breaking Bad (at least 5, according to our list below). Cable cord cutters have been waiting for smart TVs to hit the mainstream for some time, and manufacturers are striving to meet growing consumer demand. According to a recent report from media research firm TDG, 14 percent of households with broadband internet owned an Apple TV, Roku box, or similar streaming platform in 2012. However,... more »
Google Chrome 'Hacked': How Your Passwords Can Be Exposed

Google Chrome 'Hacked': How Your Passwords Can Be Exposed

If you're one of the millions of people using Google Chrome as your preferred browser, and if you happen to have any important passwords saved within the browser itself, you might just want to reconsider how wise that is. Your data is, of course, at risk any time your computer is stolen, lost or borrowed by another person, but there are various measures we can put in place to protect against this. But whatever security precautions you take, this could all be undone in seconds if you happen to use Google's browser, as software designer Elliott Kember revealed in a blog... more »
IBM/Google Alliance Forebodes Major Industry Shift #OpenPower

IBM/Google Alliance Forebodes Major Industry Shift #OpenPower

IBM today announced its second major alliance in two weeks, this time with Google and three high-performance computing (HPC) vendors, to create the OpenPOWER Consortium, the first time IBM has offered to license its Power RISC processor hardware and firmware to third-party server manufacturers. The first announcement, on July 24th, was the alliance with Pivotal, which is 70% owned by EMC, to run WebSphere on top of the Cloud Foundry PaaS both as a product to offer to IBM customers and as a service on the IBM cloud. It is easy to see what the three niche HPC vendors -- Mellanox,... more »
No thumbnail available

TrainSignal Acquired By Pluralsight in $23.6 Million Deal

Disclaimer: I’ve worked with TrainSignal for years as a contract instructor and have created ten training courses in that time.  As such, I’m definitely biased.  Bear that in mind as you read on. Today, TrainSignal and Pluralsight both announced Pluralsight’s acquisition of TrainSignal for a cool $23.6 million.  For a company that founder Scott Skinger started using credit cards, that’s an incredible feat and one of which he and the entire team at TrainSignal should be immensely proud.  Early this year, TrainSignal made a strategic “bet the company” move when the company ended its physical media-based sales model and moved to... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.