Top Stories

No thumbnail available

Bottlenose Nets $3.6 Million in First Round of Funding

Bottlenose announced this week that it has closed a $3.6 million Series A financing round led by ff Venture Capital. Existing backers Lerer Ventures, Transmedia, Advancit, Stage One Capital and Social Starts also contributed to the funding. Bottlenose operates a social media search engine that aggregates posts from Facebook and Twitter and optimizes results based on users’ points of interest. The cloud-based solution utilizes 16 patent pending natural language and statistical techniques to connect the dots between people, location data and a wide range of other social metrics. Users can visualize their search results using Sonar, Reader and Newspaper, a set of... more »
Just Sim Case & Google: Terrorist Training Camp - SiliconANGLE News Roundup

Just Sim Case & Google: Terrorist Training Camp - SiliconANGLE News Roundup

SIMpatico!   In an update to our previous coverage of the story, a massive SIM card security hole has been fixed by all of the major wireless carriers, following reports that the bug could have allowed criminals to hack into hundreds of millions of cellphones. While no phone is completely secure from attack, the old dependable SIM card was considered safe from most attacks.This particular hack took advantage of a previously undiscovered hole in SIM technology. The individual who discovered the flaw was scheduled to publicly demonstrate the hack on Wednesday at the Black Hat security conference in Las Vegas. He instead announced that... more »
LIVE: Hacking - Only Good When the FBI Does It

LIVE: Hacking - Only Good When the FBI Does It

Updated with full video - see below. Welcome to NewsDesk on SiliconANGLE TV for Friday August 2, 2013. Law-enforcement officials in the U.S. are turning to the use of tools commonly deployed by computer hackers in order to gather intelligence on suspects. Joining us now to share more on these information gathering techniques is SiliconANGLE Contributing Editor John Casaretto. The FBI develops some hacking tools internally and purchases others from the private sector. With such technology, the bureau can remotely activate the microphones in phones running Google's Android software to record conversations, one former U.S. official said. It can do the same to microphones... more »
Converged Efforts in Hadoop, BYOD and Flashy Smartphones

Converged Efforts in Hadoop, BYOD and Flashy Smartphones

The world is becoming more data-intensive every day, and what's managing it all?  A whole new world of software and hardware upgrades have emerged in recent years to address the "data problem," even fostering partnerships in the process.  Long time allies Cisco and NetApp make up the most recent partnership in data management, expanding their jointly developed FlexPod lineup with two cutting edge Hadoop appliances.  Their efforts bring together the best of Cisco and NetApp's switches and storage solutions, making strides in the growing realm of converged infrastructure. Mobile is also benefitting from converged solutions, with the crowdfunding community rising to the... more »
Syncsort Officially on the Prowl for Big Data Partners

Syncsort Officially on the Prowl for Big Data Partners

Syncsort is pushing into the channel with a new partner program for regional systems integrators (RSIs). The Woodcliff Lake, NJ.-based data integration specialist is looking to team up with RSIs that specialize in analytics. “As companies tackle Big Data challenges, the common denominator is finding innovative solutions that drive better business outcomes in less time, with fewer resources and at a lower TCO," stated Josh Rogers the president of Syncsort’s data integration business. "With our Data Integration solutions, RSI partners can add value by helping customers achieve this goal." Syncsort says that RSIs that join its partner program stand to benefit from... more »
All is Not Quiet on Microsoft’s Battle Fronts

All is Not Quiet on Microsoft’s Battle Fronts

Microsoft is facing a number of challenges on a number of fronts.  This post describes some of the challenges and provides some of my thoughts on how Microsoft might address them. The Surface and Windows 8 This week, I was on SiliconAngle’s morning News Desk discussing Microsoft’s truly awful Surface sales figures. The short version is this: Surface has been a colossal failure as evidenced by sales figures of $853 million against write offs of $900 million in excess inventory and almost that much in combined Windows 8 and Surface marketing costs.  In other words, Microsoft spend more trying to sell the... more »
10 Ways to Safeguard your Network During Hurricane Season

10 Ways to Safeguard your Network During Hurricane Season

Axcient, a provider of cloud-based backup solutions, closed out the second month of this year’s relatively quiet hurricane season with a 10-step guide for enterprise disaster preparedness. “When Hurricane Sandy hit the East Coast last Fall, it resulted in $62 billion in damages and economic losses from businesses that were not able to operate because of flooded buildings, power blackouts and damaged communications infrastructure,” said Justin Moore the CEO at Axcient. “However, there were several success stories, where firms had disaster plans in place and were able to leverage cloud-based disaster recovery and business continuity solutions to weather the storm. Dozens... more »
Cornucopia: Coming Soon Hot Food Served to You From A 3D Printer

Cornucopia: Coming Soon Hot Food Served to You From A 3D Printer

Food is one of the fundamental ingredients of life. We cannot go a day without it before experiencing discomfort and the kinds of food we eat and how we eat them are closely intertwined with our cultural practices, physical environments, and personal health. So when we at SiliconAngle heard about 3D printable food, we had to check it out. So, when was the last time you had to prepare a dish you made before, without a precise recipe you perhaps produced something that didn't taste exactly like you expected? Scolars of innovation labs at MIT have developed a new three dimensional printer... more »
AOptix Announces Stratus Client SDK for iOS: Making the Smartphone a Smater Biometric Reader

AOptix Announces Stratus Client SDK for iOS: Making the Smartphone a Smater Biometric Reader

AOptix, Campbell-based provider of intuitive biometric identity verification solutions and wireless communications technology, recently announced the general availability of its SDK for Stratus. AOptix Stratus Client Software Development Kit (SDK) is the hardware and app that transforms the iPhone into a biometrics scanning tool, making identity faster, cheaper and more accurate for teams in defense, finance, health and national, civil ID programs and more. "Biometrics is an important part of security systems," says Kyt Dotson, assistant editor at SiliconAngle. "Bringing it to smartphones is an interesting move for AOptix, but it also means the mobile ability to provide proof-of-id for individuals... more »
No thumbnail available

Assange’s Law – NSA Powers Double Every 4 Years

Well, here comes Julian.  Never one to stand on the sidelines of any global surveillance debate, Julian Assange has emerged yet again to state his opinion.  This time he has emerged with what can only be described as some kind of WikiLeak version of Moore’s law or something, except that instead of CPU speed, he’s talking about the NSA and the power they are increasingly gaining.  The remarks came out of a speech he broadcast at the OHM2013 Observe, Hack, Make conference.  Assange also added that some experts might not have enough perspective about what is going on. "The world is witnessing... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.