Top Stories

Apple Admits Breached Dev Center, Key Developer Information May Be At Risk

Apple Admits Breached Dev Center, Key Developer Information May Be At Risk

After Apple’s Developer Center was taken offline on Thursday, the company called it extended site maintenance; but recently, Apple admitted that the Developer Center was hacked, and hackers might have accessed the key developer information. The acclaimed iPhone manufacturer said that its website for third-party developers was hacked by “an intruder”, but customer information was not compromised. The site is currently being examined by Apple. Here’s what Apple said on its website: “Apple Developer Website Update Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website. Sensitive personal information was encrypted and cannot be accessed,... more »
No thumbnail available

Black Clouds On The Computing Horizon

Starting this Saturday, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. In this series, intended to preview many of the talks and presentations scheduled for the event, SiliconANGLE will focus on the exploitative vulnerabilities associated with big data and how those vulnerabilities can be limited. Today we are looking at the presentation entitled, ‘Post Exploitation Operations with Cloud Synchronization Services being given by Jacob Williams of CSR Group Computer Security Consultants. Williams, principal consultant at CSR, has more than a decade’s experience in malware reverse engineering, penetration testing, incident response, forensics and secure network design. Williams’ submitted... more »
Apple Testing Bigger Screens for iPhone and iPad

Apple Testing Bigger Screens for iPhone and iPad

As September draws near, rumors regarding Apple’s new iDevices are coming in thick and fast. According to a report from The Wall Street Journal, Apple has asked its display suppliers for prototypes of screens larger than four inches and another smaller than 13 inches when measured diagonally. Currently, the iPhone 5 has a 4-inch screen and the iPad has a 9.7-inch screen.  What the WSJ report suggests is that Apple may be looking to produce a phablet, just like other Android OEMs such as Samsung, HTC and Sony have done, not to mention a larger iPad. It’s not hard to imagine that Apple... more »
UK's David Cameron Launches "War on Porn", But Can He Win?

UK's David Cameron Launches "War on Porn", But Can He Win?

UK Prime Minister David Cameron is waging war against online pornography by demanding Internet Service Providers block such content automatically. In a letter leaked to the BBC last week, the PM is asking the ISPs to, instead of providing subscribers with “active choice +” - the ability to opt in filters - to turn those filters on by default, which would mean that if you really want to view adult content, you’d have to manually turn off the filters, or tell your ISP that you want access to it. These rumors were put to rest when the Prime Minister officially announced his... more »
Nexus 7 Takes A Leak & Facial Recognition Gives A Peek - SiliconANGLE News Roundup

Nexus 7 Takes A Leak & Facial Recognition Gives A Peek - SiliconANGLE News Roundup

The NEXTus 7   Images of the soon-to-launched Nexus 7 have leaked onto the web, only a few days before what is likely to be the device’s official launch. The photos reveal that Google’s latest tablet will come with both front and rear facing cameras, as well as a new and improved display. We expect to see other features, which might include a SlimPort, wireless charging, and an LTE radio. The device is thought to run on the highly anticipated Android 4.3 OS. It's been reported that the Nexus 7 will come in two different models: a 16GB version priced at $229, and the 32GB model dropping... more »
Is Google Glass Sticking It to Us on Price? Here's 3 Cheaper Options

Is Google Glass Sticking It to Us on Price? Here's 3 Cheaper Options

Google must have some aggressive production plans for Google Glass, as it acquired a 6.3 percent stake in Himax Display (HDI). HDI is a subsidiary of the Himax technologies that focuses on liquid crystal on silicon (LCOS) chips and modules, which Google Glass needs. Google’s stake is a sign that Glass production is ramping up: the company says that the investment is being made to “fund production upgrades, expand capacity and further enhance production capabilities." Google Glass is such a polarizing topic right now, with people take entrenched positions on both sides of the coin. But while Google might be ramping... more »
Hackers Causing Havoc Again: Apple, Ubuntu and NASDAQ All Breached

Hackers Causing Havoc Again: Apple, Ubuntu and NASDAQ All Breached

It's been a while since we had a good ol' high profile hack. The last major incident that really hit the headlines was probably Anonymous' hit on a bunch of official North Korean websites, defacing images of its 'dear leader' Kim Jong Un and generally making the commies look stupid. But just when we were starting to get complacent – badaa! - along come five major hacks in the space of less than a week. In the last five days dozens of sites, including Ubuntu's community forum, Apple's Developer site, Truecaller and the Nasdaq community forum have been breached, leaving millions... more »
iPads are Only as Good as the Wireless Network

iPads are Only as Good as the Wireless Network

My generation learned much of what it knows from the blackboard. Many kids nowadays have never even seen a blackboard – and not even its successor, the whiteboard – in a classroom. For them it seems archaic. Teaching in the modern classroom is built around the projector and computers, with teachers using electronic media and software to enhance lessons. Educational systems across America are adopting technologies faster than ever. On the horizon is one of today’s most disruptive pairings: mobile devices and WLAN. Get ConnectED   It seems fitting to quote Apple directly: “This changes everything.” Steve Jobs uttered those prophetic words about... more »
LIVE: 70's Cryptography Causing Security Catastrophy

LIVE: 70's Cryptography Causing Security Catastrophy

Updated with full video - see below. Welcome to NewsDesk on SiliconANGLE TV for Monday July 22, 2013. If your identity has been stolen, your phone may have been an accomplice to the crime. Joining us now to explain more is SiliconANGLE Contributing Editor John Casaretto. A German mobile security expert says he has found a flaw in the encryption technology used in some SIM cards, the chips in handsets, that could enable cyber criminals to take control of a person’s phone. Karsten Nohl, founder of Security Research Labs in Berlin, said the encryption hole allowed outsiders to obtain a SIM card’s digital key, a... more »
No thumbnail available

IBM's Ambuj Goyal Declares War in Storage #Edge

Six months after taking leadership of IBM Storage, Ambuj Goyal has declared war on his competitors. "The IT industry is at two major inflection points," he told SiliconAngle in an exclusive interview at IBM Edge 2013. "I have nothing to lose." The inflection points are flash and software-defined storage (SDS) based on open systems, and IBM is going to make a major push in the storage marked based on them. In his presentation at the opening General Session at Edge he said, "Just a few years back storage was an afterthought for IBM. After we sold everything else, we sold storage. No... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.