Top Stories

Mirage - The Global Cyber Espionage Campaign Tied to China

Mirage - The Global Cyber Espionage Campaign Tied to China

Dell’s SecureWorks Counter Threat Unit™ (CTU) research team is reporting that they have been tracking a cyber espionage campaign dating back to April 2012. The sophisticated ongoing campaign has ties to Chinese origin and has been found to be attacking a high-profile oil company in the Phillipines, a military organization in Taiwan, an energy company in Canada, and several as yet unidentified entities in Brazil, Israel, Egypt and Nigeria. The attack unfolds through a remote access trojan known as Mirage (Mirage RAT). The attack starts with spear-phishing emails that are directed at mid-level to senior-level executives and is disguised as... more »
4 Ways Developers Can Thrive in the World of Business Apps

4 Ways Developers Can Thrive in the World of Business Apps

It's no secret that mobile apps are all the rage. Last year, tap-happy consumers downloaded more than 30 billion of them—that's almost 1,000 per second—and show no signs of slowing down. In fact, some experts are predicting that app downloads will reach nearly 100 billion by 2015. The insatiable demand for apps is now moving beyond consumer mobile devices to the business cloud. More companies of all sizes are adopting cloud-based applications—from accounting and data storage, to time tracking and email—a trend that's helping to fuel a multi-billion dollar cloud boom. Opportunity clearly abounds, but developers still face an uphill battle when... more »
Another Failure for Google in China, Music Service Shut Down

Another Failure for Google in China, Music Service Shut Down

Google is notorious for shuttering services and products.  Last year, they killed off more than 30 products and services and just this July, they put to rest five more.  Don’t think Google is that cruel, they’re just shutting down products and services that aren’t so popular, or have been merged with other Google products. The latest casualty is Google’s music service in China, because it can’t handle the fierce competition in that market.  Google announced that the Google Music Search in China will be shut down on October 19, and that users will be able to download their content before the... more »
Cracked. Busted. Broken.: The Cost of Damaged iPhones [Infographic]

Cracked. Busted. Broken.: The Cost of Damaged iPhones [Infographic]

Many of the people awaiting their iPhone 5 may very well be those who cracked their iPhone 4 or 4s. Americans have spent nearly $6 billion on damaged iPhones according to a recent Squaretrade infographic. Stephanie Mlot of PC Mag notes that the consumer electronics protection plan provider surveyed over 2,000 iPhone users and aggregated the cost of repairs, replacements, and insurance deductibles for cracked, dropped, pummeled, kicked, or water-damaged devices to arrive at the multi-billion dollar tab. So, how commonplace is it for these phones to end up cracked, busted and broken like mine? Squaretrade found that 30% of... more »
iPhone 5 Ready Apps

iPhone 5 Ready Apps

The iPhone 5 goes on sale in retails shops today in many countries all over the world.  Some may have gotten new accessories to go with their shiny new iDevice, but some are actually more interested in seeing what the new iOS has to offer.  And what better way to break in a new iPhone than to download iOS 6-made apps. You see, while many older apps may still work great with the iOS 6, the iPhone 5's larger screen can throw things off.  Those apps optimized for iOS 6 are ready for the bigger handset, but still work with older... more »
No thumbnail available

Virident Hires New CEO After Series D Funding

Flash storage startup Virident just appointed Mike Gustafsonas as its new chief executive, right on the heels of a massive Series D funding round. Gustafsonas was the head of BlueArc until it was acquired by Hitachi, where he served as senior vice president of its file and content business before joining Virident. He has just over two decades of experience running companies, and is replacing co-founder Kumar Ganapathy, who will now serve as his company’s CTO. “The storage industry is experiencing a large disruptive market shift. Flash storage is in the infancy of its growth, and it’s only a matter of time... more »
No thumbnail available

VerifyCloud Protects Mobile Data for the Enterprise at the Storage Level

The trend towards a greater mobility technology infrastructure, higher levels of digitization for content, faster implementation of technology services and the continuous availability expectations of service-level apps are coming together, driving increased interest in mobile data management storage solutions. Given the increasing use of mobile devices for personal and professional matters, it's more difficult for businesses and end users to obtain a comfortable level of control. Companies need more than ever to secure and manage these devices, and the information they contain. Protecting the cloud EvidencePix Systems Inc., the provider of secure mobile media service for enterprises, launched a backend data management storage... more »
No thumbnail available

Japanese Thieves Nab First iPhone 5

Today’s mobile news roundup features: Japanese thieves being the first to get an iPhone 5; Apple’s Maps kerfuffle; BlackBerry outage in Europe, Middle East and Africa; and another patent win for Microsoft in Germany. Japan thieves nab first iPhone 5 A lot of people lined up for the iPhone 5 even before Friday, the next gen device's official launch day.  Fans camped out and braved the weather just to be the first to get their hands on the iPhone 5.  The thing is, these patient customers weren’t the first to get their hands on the iPhone 5, thieves in Japan beat them... more »
A New Pandemic: ZeroAccess Botnet Takes Over The World

A New Pandemic: ZeroAccess Botnet Takes Over The World

We all know that computer viruses can spread like wildfire, but what with cybersecurity scares hitting the headlines seemingly every other day, people easily become complacent about such things. At least, they do until they see them from space. And then we get a sharp reminder of just how deadly contagious these things can be. Security experts at Sophos and F-Secure teamed up to create this intimidating look at how the notorious ZeroAccess botnet has spread its ugly tentacles over the world, and we can see that it’s virtually consumed the entire United States and Western Europe, with more than 9 million... more »
Something’s Fishy Here... Robo-Tuna Sinks War On Drugs To New Depths

Something’s Fishy Here... Robo-Tuna Sinks War On Drugs To New Depths

Would be smugglers and terrorists hoping to sneak drugs and weapons into the country hidden aboard vessels had better think again, for their plans will soon be rumbled by US government’s latest secret weapon - robotic fish. Modeled on the vastly under-rated tuna fish - one of the fastest and most maneuverable of all the creatures of the deep - the newly developed BIOswimmer robofish will be able to search and inspect the hulls of ships, and even the ocean floor should the bad guys attempt to ditch their contraband overboard. The BIOSwimmer is designed to operate in the harshest of environments,... more »

Premium Research

- George Gilbert

Hadoop is one of the most innovative ecosystems the industry has ever seen. But fragmentation and complexity are the trade-offs of all this rapid evolution while the platform is still maturing. Choice has a cost. This research report has only examined the compute engines that process data. But the fragmentation in management, governance, and security tools is just as great. There is a continually expanding array of tools such as Oozie, Falcon, Atlas, Knox, Ranger, HDFS DARE, Ambari, Hue, Sentry, Sahara, Cloudera Manager and Navigator, and Zookeeper. At some point it makes sense for customers to consider investing in a tool that can hide much of that complexity. To be clear, there is no magic product that can hide all these technologies. But when customers take the perspective of simplifying an end-to-end process, solutions are available to address the problem.

- David Floyer

CIO and senior IT executives should minimize investments in HDDs for latency storage investments going forward. Storage practitioners should focus on moving latency storage to flash, implementing a sound catalog strategy for the management of snapshots, and a strategy for linking to on-premise or cloud-based capacity resources. Any storage that involves assisting end-users and customers should be regarded as latency storage.

- Ralph Finos

A companion piece to Wikibon's Public Cloud Market Forecast 2015-2026, this research examines the revenue from SaaS, IaaS and PaaS vendors. The competitive environment surrounding the Public Cloud is in flux. SaaS remains turbulent with new entrants successfully gaining share and incumbent licensed software providers trying to develop SaaS offerings and reclaim leadership positions they have maintained for a decade or more. The IaaS segment leadership is beginning to crystalize as a function of scale, but PaaS is just formulating and finding its way. As such, enterprises need to be wary of which providers are winning and losing (and where), but more importantly what they themselves intend to accomplish with Public Cloud.

- David Floyer

Cataloging and automated policy management are the key enablers of a virtual flash world, where storage snapshots are both King and Knave. Combining cataloging and automated policy management is the only solution to enabling storage copy reduction in harmony is risk management and compliance. This enables and justifies an all-flash data center, enables data to be available quicker to the business and other IT functions, and drives greater business and IT productivity and responsiveness. CIOs and senior management should create a small team of the best and brightest, create an optimized all-flash virtual environment with a programmatically integrated catalog in a subset of the datacenter, and demonstrate the practicality and benefits of this environment to the business and IT.

- Stuart Miniman

VMworld has grown to be one of the largest and most important technology industry events. Wikibon has attended this event for many years and will have its largest presence this year as part of a double-set of theCUBE. Coverage will examine the broad and diverse ecosystem including storage, cloud, networking and much more.

- David Floyer

Wikibon believes latency storage vs. capacity storage is a key storage dimension, with different functional requirements and different cost profiles. Latency storage is found within the datacenter supporting more active applications, and in general has a high read bias. Latencies can vary from 1 millisecond down to a few microseconds; the lower (better) the latency the closer to the processor resources it is likely to be. It is also found for the metadata layer for capacity data. The boundary for latency storage will reduce down to 500 microseconds over the next three years. Capacity storage is found in archive, log, time-series databases for the Internet of things and many other similar applications. In general it is write-heavy. Latencies are generally above 1 millisecond, do not have to so close to the processor, and are suitable for remote private, public and hybrid cloud storage. Some parts of the capacity market place will have latencies as low as 500 microseconds over the next three years. Wikibon has added this dimension to the other storage dimensions projected, which include HDD vs. Flash, Hyperscale Server SAN vs. Enterprise Server SAN vs. Traditional SAN/NAS storage, Physical Capacity vs. Logical Capacity and SaaS Cloud vs. IaaS Cloud vs. PaaS Cloud. All these dimensions are projected for both Revenue and Terabytes. There is a strong correlation and interaction between the latency/capacity dimension and HDD/Flash dimension. Wikibon provides detailed breakdown of the storage projections for Premium clients.

- Brian Gracely

With the EMC Federation in transition, VMware needs to take a greater leadership role in delivering cloud services. VMware's ability to lead their customers transitions to Hybrid Cloud requires them to deliver a more robust, more agile vCloud Air platform.

- Brian Gracely

While the majority of Enterprise CIOs continue to have Hybrid Cloud near the top of their priorities, the solutions in the marketplace often fall short of expectations. Wikibon analysts look at the state of Hybrid Cloud from a C-Suite perspective.

- Ralph Finos

Maturity by industry is a function of customer and prospect skills, competitive drivers within the industry, the nature of the data in question as well as the complexity of the analytics required, and most importantly the problem that the prospect or customer is trying to solve. Identifying where customers are in their journey and helping them to reach the next level is key to vendor success.

- Ralph Finos

Both customers and vendors need to prioritize how they address adoption barriers. As with all emerging technologies, a full solution will often require extensive 3rd party participation, such as “data wrangling” and SQL data access tools. SQL data analysis offerings are maturing rapidly in the areas of application performance under greater user and data volume loads both from the Hadoop distribution vendors as well as 3rd parties. Other barriers, such as a skills gap across many roles, are more intractable. Smaller customers with fewer specialized practitioners in each role should include in their evaluations cloud-based solutions that are fully managed services.