Top Stories

Edible batteries to power pacemakers + more

Edible batteries to power pacemakers + more

This week’s Wearable Tech roundup features edible batteries, 3D-printed eye cells, and a pacemaker the size of a pill. Edible batteries   Advancements in medicine have given birth to ingestible diagnostics, tools like tiny cameras that can uncover cancer in your digestive track, or a pill that can monitor if you are adhering to your medication plan. There are also implants to help your body functioning normally, but require a battery change every few years or so, which means the device will be surgically taken out then put back in.  These minute devices also requires a source of power to function, but their own... more »
New York Times calls for Ed Snowden to be pardoned

New York Times calls for Ed Snowden to be pardoned

Edward Snowden - a name the world was not familiar with until mid-last year, when the former NSA contractor released a ton of top secret files detailing how the National Security Agency has been secretly spying on and gathering huge amounts of data from US and foreign citizens without their knowledge. At first many were skeptical of his claims, but as the evidence piled up, both the government and the NSA admitted to most of Snowden’s accusations, causing people to take notice. People are now starting to care more about their privacy and security online, and are calling for reform of... more »
3PAR sees tremendous growth at HP : Focuses on polymorphic architecure | #HPDiscover

3PAR sees tremendous growth at HP : Focuses on polymorphic architecure | #HPDiscover

David Scott, SVP & GM, HP Storage, discussed the integration of 3PAR into the HP product and service range after the company's acquisition, along with the company's storage strategy, in a live interview from HP Discover Barcelona, with theCUBE co-hosts John Furrier and Dave Vellante. "Overall, we're managing to now handle the transition as some of our older architecture fails, we've seen a one percent year to year growth," Scott explained. With 3PAR, "HP did a fantastic job with the integration," he added. "It really made sure that it protected the value that it acquired. It made sure it took the best... more »
Windows 8 isn't doing too bad at all, now running on 10% of all desktops

Windows 8 isn't doing too bad at all, now running on 10% of all desktops

Microsoft has every reason to think this year's set to be a good one, following the news that its divisive Windows 8 and 8.1 operating systems have finally landed on 10 percent of all desktops running to date. The stats come from Net Applications, which is one of the leading monitors of such things, and show that while the original Windows 8 lost 0.001 percent of its market share, it's follow up Windows 8.1 grew by 0.86 percent, taking the two OS's combined share to 10.15 percent of all desktops. A great job by Windows 8 to be sure, but it... more »
Syrian Electronic Army hacks into Skype on New Year's Day 2014

Syrian Electronic Army hacks into Skype on New Year's Day 2014

Skype didn’t exactly get off to a great start in 2014, as the Syrian Electronic Army decided it would be rather amusing to hack service on the first day of the year. The SEA hacked Skype’s Facebook, Twitter and official blog, posting the same message on all three: end spying on the public.  The same sentiment was tweeted by the SEA itself: Don't use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.http://t.co/1I1nZx30SV — SyrianElectronicArmy (@Official_SEA16) January 1, 2014 When news of breach got out, Skype was quick to take back control of its Facebook and Twitter accounts, but until... more »
SnapchatDB team explains its motivation for exploit

SnapchatDB team explains its motivation for exploit

Snapchat was one of the most popular apps of 2013.  If you’re not familiar with the app, it allows users to send photos and messages that are quickly erased after a few seconds.  This gave them the courage to send goofy, embarrassing, and often times explicit photos because they believe that the service is secure since everything gets deleted permanently. But on Christmas Eve, Gibson Security revealed a flaw in Snapchat’s API that would allow the matching of usernames to phone numbers.  Snapchat brushed off the warning, stating that “Theoretically, if someone were able to upload a huge set of phone... more »
Bitcoin Weekly 2014 January 1: Indian government raids BTC exchanges, Overstock.com joins the community, Stross and Krugman hate Bitcoin

Bitcoin Weekly 2014 January 1: Indian government raids BTC exchanges, Overstock.com joins the community, Stross and Krugman hate Bitcoin

Happy New Year everyone in the Bitcoin community! This little cryptocurrency that could has racked up yet-another-year of the interesting and the strange and has 2014 ahead of it. These past few weeks have seen something strange from the market in India where the Reserve Bank of India put out an advisory warning about Bitcoin, raided two exchanges, and then near the end of the year the RBI came out and said it doesn't intend to regulate BTC. In the rest of the world, Overstock.com has mentioned that it will begin taking bitcoins for inexpensive stuff in a few months. And... more »
CIOs racing business transformation to stay relevant

CIOs racing business transformation to stay relevant

CIOs are always under fire, that is just a fact of life, writes Consultant, former CIO, and Wikibon Analyst Scott Lowe in “Four Sobering Facts that CIOs Must Face in 2014”. The latest evidence of that is the new position of chief digital officer (CDO) that some companies are creating, even as they continue to cut IT budgets as the economy finally recovers. To keep ahead of the game and keep their jobs, CIOs must focus on transformational business activities, maintain a laser focus on strategic business outcomes, and ensure that the IT department is a business enabler, not a... more »
How Datalink helps customers converge public and private clouds

How Datalink helps customers converge public and private clouds

As more organizations seek to adopt cloud computing in any of its forms, many will find that it may not always be as simple to implement as one might think. Cloud providers often offer very generic services to companies that vary widely in business practices and in on-premise technology. Cloud service providers must offer more options to their customers, just as they would with on-premise solutions. Moreover, some may desire for a unified IT system, one that converges both public and private cloud systems into a single cohesive infrastructure (compute, storage and networking). Companies like Datalink are stepping up to... more »
Smart car solutions gets aggressive : New partnerships + funding

Smart car solutions gets aggressive : New partnerships + funding

This week’s SmartCar roundup features Google’s entry into the connected car arena and Zubie’s $10 million funding round. Google partners with Audi for connected cars   Sources claimed that come CES 2014, Google and Audi will be revealing a collaboration to develop an infotainment system based on Android.  Though this is an area Apple's had a head start, what Google aims is to produce an infotainment system that works with Android apps already being used by fAndroids. The Android infotainment system will allow consumers to access music, navigation, apps and services, that are similar to the Android smartphone experience, making it more familiar for... more »

Premium Research

- David Floyer

Industrial IoT, the largest segment of the Internet of things (IoT) with the highest potential value, will require a deep integration between modern IT (Information Technology) and OT (Operations Technology). Modern IT technologies, to be truly extensible to OT, will need a hybrid cloud approach, with by far the majority of data and processing residing at the so-called "Edge". Architectures and software written by industrialists for industrialists, such as GE Predix, are showing how that can work.

- George Gilbert

The big data arena is at a crossroads. Use cases and tools are proliferating faster than most big data teams are gaining experience. In establishing the big data business capabilities required to cut through the complexity, CIO’s must balance the accessibility of integration of traditional SQL DBMS’s versus speed of innovation in the mix and match open source big data ecosystem.

- Peter Burris

In the big data domain, businesses are trying to solve complex problems with complex and novel technology -- and often failing. Simplifying the packaging of big data technologies will streamline big data pilots and accelerate big data time-to-value. CIOs looking to establish differentiating big data capabilities need to consider Single Managed Entities to help solve the complexity problem.

- David Floyer

Oracle M7 technology is meeting or exceeding the announcement performance claims against previous generation. Even taking very conservative assumptions, the business case for migration from T5 to T7 servers is good. Wikibon concludes that for Oracle software and the servers they run on, the adoption of M7 technology (and T7 server technology) is best practice for these high value compute areas.

- David Floyer

The premise tested in this research is that high value applications and software should be run on more capable converged performance-optimized infrastructure, even when they constitute a small proportion of the total workload. In contrast, cost-optimized infrastructure will save on short-term hardware costs, but will incur much higher overall costs long-term. The conclusion strongly recommends IT executives adopt a default of performance-optimized converged infrastructure for all mixed workloads when even a small proportion includes high-cost software and/or high-value applications.

- George Gilbert

Big data pros need to identify which data feedback loops in their machine learning applications can deliver sustainable differentiation through network effects. Starting early is critical because getting to scale is likely to create the "winner takes most" competitive dynamics that have become so common in tech industries. The biggest sin is to wait for the tooling to become automated enough for all competitors to jump in.

- Ralph Finos

The public cloud competitive environment remains turbulent, but sectors show signs of crystallizing a longer-term market structure.. SaaS remains turbulent with SaaS vendors successfully gaining share vs. incumbent licensed software providers who must migrate their core products to cloud-friendly offerings and/or acquire native SaaS applications to shore up their applications leadership positions. Public cloud IaaS segment leadership is crystallizing to a handful of viable providers as a function of scale requirements. PaaS is just formulating and finding its way, but is likely to gravitate towards a wide variety of development models suited for different application types and public cloud platforms.

- David Floyer

For enterprise executives trying to achieve aggressive RPO and RTO SLAs , Wikibon believes that batch backup appliances (PBBAs) will give way to real-time, continuous data protection systems that aggressively support very large memory application memory. Practitioners requiring close to RPO zero and aggressive RTO SLAs should plan for an integrated data protection approach that effectively eliminates the concept of storage-led backup and shifts thinking to a application-led virtual point-in-time recovery model. The database and file system vendors will be the predominant suppliers of this technology, and understanding their roadmaps and commitment to support application-led recovery strategies is crucial to both database and data protection technology selection.

- George Gilbert

Mainstream enterprises are beginning to deploy machine learning applications that add differentiation to traditional products and services. But the complexity of their big data infrastructure is becoming a problem. Big data pros need to deploy a digital business platform (DBP) to support modern applications and then extend the DBP to machine learning applications.

- Peter Burris

IT shops that want to achieve modern IT status will have to address the "IT iron triangle" constraining transformation.