Top Stories

LIVE: 70's Cryptography Causing Security Catastrophy

LIVE: 70's Cryptography Causing Security Catastrophy

Updated with full video - see below. Welcome to NewsDesk on SiliconANGLE TV for Monday July 22, 2013. If your identity has been stolen, your phone may have been an accomplice to the crime. Joining us now to explain more is SiliconANGLE Contributing Editor John Casaretto. A German mobile security expert says he has found a flaw in the encryption technology used in some SIM cards, the chips in handsets, that could enable cyber criminals to take control of a person’s phone. Karsten Nohl, founder of Security Research Labs in Berlin, said the encryption hole allowed outsiders to obtain a SIM card’s digital key, a... more »
No thumbnail available

IBM's Ambuj Goyal Declares War in Storage #Edge

Six months after taking leadership of IBM Storage, Ambuj Goyal has declared war on his competitors. "The IT industry is at two major inflection points," he told SiliconAngle in an exclusive interview at IBM Edge 2013. "I have nothing to lose." The inflection points are flash and software-defined storage (SDS) based on open systems, and IBM is going to make a major push in the storage marked based on them. In his presentation at the opening General Session at Edge he said, "Just a few years back storage was an afterthought for IBM. After we sold everything else, we sold storage. No... more »
Facebook Earnings Preview: Will Mobile Ads Finally Pay Off?

Facebook Earnings Preview: Will Mobile Ads Finally Pay Off?

Facebook is one of a number of tech companies set to announce its second-quarter financial results this week, and its earnings are expected to be among the most closely scrutinized as its mobile strategy takes shape. The company will host a conference calls at 2pm PT on Wednesday when it will announce its results, with the proceedings set to be broadcast live on the Facebook Investor Relations website. With regards to its mobile efforts, Facebook’s mobile ad revenues and its mobile-user numbers will both be under the spotlight, with several analysts predicting that this push will help drive double-digit revenues and... more »
SIM Card Vulnerability Puts One Quarter of all Phones At Risk

SIM Card Vulnerability Puts One Quarter of all Phones At Risk

As many as one quarter of all mobile phones in use in the world today could be vulnerable to an SMS attack that allows hackers to gain full control of the phone. The vulnerability was discovered in the outdated, 1970s-era cryptography technique called DES encryption that's still used by around half of all SIM cards. Karsten Nohl, founder of Germany's Security Research Labs, whose previous hacking achievements including cracking transport smartcard keys using a microscope and breaking through GPRS encryption, gave details of the attack to both the New York Times and Forbes. He plans to outline the vulnerability in more... more »
No thumbnail available

Weekly Security Review: Tumblr Exposes Users, Snooping Scandal Continues

This past week featured a number of newsworthy developments in the cybersecurity space. Most notably, a number of new and unsettling details emerged about the Moto X, Tumblr users were greeted by an unwelcome surprise, and the still ongoing NSA snooping scandal took on a new twist. On Monday, SiliconAngle’s Mike Wheatley reported that a new promotional video for Motorola’s upcoming Moto X handset was released by Canadian carrier Rogers. The demo showcases several previously unseen features, including a Siri-like voice command system that’s set to “always on” by default. The clip was released on the heels of an alarming report... more »
MITIQ 2013: Appointing a CDO Can Be a Double-Edged Sword

MITIQ 2013: Appointing a CDO Can Be a Double-Edged Sword

Wikibon co-founder Dave Vellante and Paul Gillin, the former editor-in-chief of Computerworld, kicked off the second day of this week’s MIT Information Quality conference with an in-depth discussion about the pros and cons of appointing a chief data officer. After recapping on their collaborations and the state of the publishing industry, Dave and Gillin address data quality. Dave highlights that information quality has received even less attention than data security up to this point, and notes that most organizations don’t have CDOs. “[Hiring a CDO is a] luxury of the largest companies. There are some very large companies at this conference, a... more »
No thumbnail available

SnapLogic Connects Tableau to the Big Data Universe

SnapLogic has announced the availability of a pre-packaged Snap for Tableau’s newly launched data visualization service. The San Mateo-based cloud integration specialist says that its latest connector supports over 160 data sources, including on-premise apps, popular cloud solutions such as Salesforce and ServiceNow, and major social networking sites. SnapLogic touts that the connector enables users to plug data sources into their Tableau deployments “without deep technical expertise and at a fraction of the cost” of manual integration. They can achieve this using a drag and drop interface and a set of pre-built functions. "Business users need to stay on top of the... more »
No thumbnail available

Security Vulnerabilities In e-Commerce

In just one week, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. In this series, intended to preview many of the talks and presentations scheduled for the event, SiliconANGLE will focus on the exploitative vulnerabilities associated with big data and how those vulnerabilities can be limited. Today, we will delve into a presentation being offered by two engineers with the e-commerce website, Etsy.com, Kyle Barry and Mike Arpaia. Barry joined Etsy in 2011 and is a senior software engineer on the security team. Specifically, he focuses on security engineering and fraud prevention. Arpaia, also a member... more »
Now Kids Learn Coding with Super Scratch Programming Adventure

Now Kids Learn Coding with Super Scratch Programming Adventure

Introducing kids to programming at an early stage is a great idea, provided the tool is also interesting and easy to use. In order to assist tech- savvy kids in their programming learning endeavors, No Starch Press has come up with a graphical drag-and-drop programming tool that takes out the risk of syntax errors. This tool named Super Scratch Programming Adventure (SSPA) not only encourages kids to do programming, but also helps them sneaks in real programming concepts and techniques in a fun, colorful manner. SSPA offers up 10 Stages (chapters) that use a comic book format to teach programming with... more »
No thumbnail available

Weekly Big Data Review: Aysadi Gets a Boost from GE, Cloudera Nabs Myrrix

This week Ayasdi received funding from GE and Cloudera snatched up a machine learning startup called Myrrix. In addition, Syncsort released the results of an extensive study on Hadoop adoption in Europe. Ayasdi is a Palo Alto-based firm that specializes in Big Data automation. Its Insight Discovery Platform is based on software that has been used by the Defense Advanced Research Projects Agency (DARPA) and the National Science Foundation (NSF) since 2008. The company announced on Wednesday that it has closed a 30.6 million funding round led by General Electric, with participation from bigwig VCs such as Institutional Venture Partners, Citi... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.