Top Stories

Apple’s Bruce Boston Discusses Visualization and Human Intuition | #tcc13

Apple’s Bruce Boston Discusses Visualization and Human Intuition | #tcc13

Bruce Boston of Apple views data science as the shortest and most efficient route to meeting business objectives. The veteran statistician detailed how visualization further empowers data geeks to drive value for their organizations in an interview on theCUBE at this week’s Tableau Customer Conference. “The problem that we have is that I can’t talk to a computer,” Boston tells theCUBE hosts Dave Vellante and Jeff Kelly. “There has to a language between myself and the computer, between the machine and my mind, between what I want and what I need. That communications goes two ways: me to the computer is... more »
Where to Get the Best Trade In Price for Your Old iPhone

Where to Get the Best Trade In Price for Your Old iPhone

If you’re already an iPhone owner and looking to upgrade to either an iPhone 5c or 5s, you’re probably wondering how you can get a hold of the device as cheaply as possible, right?  But unfortunately, Apple doesn't seem to be too keen on giving away any discounts just yet, which means that the best bet is to trade-in your old iPhone for a new one.  By trading your old device, this would mean you won’t have to lay out all of the asking price, as the trade-in price could possibly cover the 2-year contract plan of some carriers.  So... more »
More Questions Raised After Apple's Touch ID Security Brief

More Questions Raised After Apple's Touch ID Security Brief

Apple’s new fingerprint sensor, known as Touch ID, has been received with both skepticism and awe.  This is the first time biometrics has been used in a very popular device, but it still raises the question of how secure it will prove to be. Now, the Cupertino-based tech giant has released a statement that aims to clarify some of the security concerns around Touch ID. A spokesperson explained that the Touch ID doesn’t store any actual images of user's fingerprints - so in a nutshell, it can’t be used to tie a name to their fingerprint.  Apple also said that it won’t... more »
Botnets and Porn: It's What Tor's All About

Botnets and Porn: It's What Tor's All About

What with its high level of anonymity, the secure Tor network has a well earned reputation for being the web's favorite hangout for drug dealers, porn kings, botnets and other ne'er-do-wells. "But, but, but... it's still the best way to mask your browsing activity!" you scream, given what we know about the NSA. That may be so, but first impressions often count, and that's certainly true with Tor. Apparently, all the bad stuff you've heard about Tor is true – the network is overrun with pornography, botnets and illegal narcotics, and most especially the latter. At least, it is according to... more »
Nate Silver Skeptical of Big Data Trends, Keys in on Culture

Nate Silver Skeptical of Big Data Trends, Keys in on Culture

There were two big takeaways I had from Nate Silver's time on #theCUBE during this week's Tableau Customer Conference: 1) the editor of ESPN's FiveThirtyEight is more of a skeptic, taking a wait-and-see approach to Big Data, and 2) culture is more important when analyzing data than most realize. I was fascinated to hear Silver talk about culture being key for good data analysis, and was equally intrigued to learn that he isn't as bullish on Big Data trends as most in his field tend to be. In Silver's keynote, he spoke on how the volume of data does not trump the modeling of... more »
No thumbnail available

The True Cost of iPhone 5c Nearly $600 : Apple May Never Sell Low-End

Before Apple revealed its two new iPhones, there were rumors that one of the devices would be the cheaper or more affordable version.  When Apple finally revealed the iPhone 5c, it was indeed priced cheaply - on contract.  In reality, it still costs $549 for the 16GB version without a contract. Looking at the iPhone 5c -- it’s just the old iPhone 5 placed in a plastic case.  So is paying $549 reasonable?  I think not.  Yes it is cheaper with contract, but if you’re already an iPhone 5 owner, would you really exchange that for a newer iPhone 5c just... more »
Why The New iPhone 5S Fingerprint Sensor Will Never Replace Passwords

Why The New iPhone 5S Fingerprint Sensor Will Never Replace Passwords

There’s a ton of buzz around the new iPhone’s Touch ID Fingerprint Sensor feature and there’s been a whole lot of speculation that passwords are dead. I even saw the headline on Drudge that said just that. This all seems quite dandy, passwords are a problem right? They’re hard to remember, there’s all these requirements around keeping them complex, people have to reset them all the time and what about those password reminder things – What was my high school’s mascot again? Which email did I use when I registered? With all these real inconveniences it’s little wonder that many... more »
Virtualization Breeds More Agile Businesses | #VMworld

Virtualization Breeds More Agile Businesses | #VMworld

Phillip Reynolds, Data Center Director, Williams & Fudge, discussed their virtualized environment and specific financial sector IT requirements with theCUBE co-hosts Dave Vellante and Stu Miniman live at VMworld 2013. Williams & Fudge is an accounts receivable management firm, working for about 13,000 colleges, universities, and other private financial institutions. It has 400 employees, most of them working in the call center. "As the environment is changing in our industry, we have to work the business harder, work our staff harder and work our IT harder to be able to make the same return we were making a few years ago," Reynolds... more »
Congress + Economists Must Learn to Communicate Data More Effectively | #tcc13

Congress + Economists Must Learn to Communicate Data More Effectively | #tcc13

From the 2013 Tableau Customer Conference in Washington DC, theCUBE co-hosts Jeff Kelly, Principal Research Contributor with Wikibon, and Dave Vellante, Wikibon Senior Analyst, sat down with Jon Schwabish, Principal Analyst with the Congressional Budget Office, talking about projections and trends in the field of economics. For those unfamiliar with the institution, Jon Schwabish was happy to clarify: "The CBO is a relatively small agency in the Federal Government, about 230 people. We provide objective, non-partisan analysis to Congress. Those issues can range from immigration to social security, Budget issues, long term budget issues, anything that the Congress would be interested... more »
Why The iPhone 5S's Touch ID Could Spell The End Of Passwords

Why The iPhone 5S's Touch ID Could Spell The End Of Passwords

Apple's next-generation iPhone 5S looks snazzy as hell and comes with the latest iOS 7 operating system, but by far and away the most intriguing aspect of the phone was its new fingerprint scanner. The iPhone's Touch ID biometric security feature was one of the biggest talking points yesterday, with many arguing that this could bolster Apple's popularity with enterprise users, while others still were concerned that it could present new security risks for consumers, with all of that biometric data potentially falling into the hands of the NSA and/or cybercriminals. These things may or may not happen, but the big... more »

Premium Research

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.

- David Vellante

This document describes the methodology used to develop "The Digital CIO: Communicating to the Board on Cyber Security." It includes data sources and process used to gather data from senior business technology leaders.

- Peter Burris

Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.

- Ralph Finos

This document covers Wikibon’s definition of public cloud and is a companion piece to Wikibon’s 2016 Public Cloud update http://wikibon.com/wikibon-2016-public-cloud-forecast-update/. Our definitional framework aligns as much as possible with the NIST definition, but we acknowledge that "public cloud" means different things from vendor to vendor. However, in our view, this just indicates that public cloud is being leveraged from many different angles and is building significant momentum as it encompasses both product and service delivery mechanisms, pretty much penetrating into all aspects of information technology.

- George Gilbert

Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.

- George Gilbert

Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.