Top Stories

Android is #1 – in Malware so Who Else is On The List?

Android is #1 – in Malware so Who Else is On The List?

This shouldn’t surprise anyone, Android is the top mobile malware target in the market and it wasn’t close.  79 percent of all mobile threats in 2012 had Android dead in its sights.  That finding published by Public Intelligence and the Department of Homeland Security’s Cyber Intelligence Analysis Division also indicates that mobile malware poses a threat to security personnel and emergency responders that are increasingly dependent on mobile devices in the conduct of their duties.  The report also points out how much diversity there is in base Android versions out there, a problem known as fragmentation.  That fragmentation is an... more »
Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Broadcom Accelerates Internet of Things with Wearable WiFi Tech

Semiconductor maker Broadcom has introduced a new specification that enables connected devices to communicate over Wi-Fi without an access point or computer. The technology promises to open the doors for low-cost wearable gadgets that can exchange data via smartphones and tablets. Wireless Internet Connectivity for Embedded Devices (WICED) Direct, as the solution is known, has already been made available for select OEMs. Broadcom revealed that “emerging segment leaders” are in the process of developing blood pressure monitors, glucometers, smart watches and other devices that leverage WICED Direct to collect user data. "The value of a wearable device lies in its ability to connect... more »
IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

IT Transformation Targets Increased Revenue, Risk and Cost Reduction #VMworld

Ted Newman, Senior Director of Cloud and IT Transformation for EMC Global Services, discussed the company's take on hybrid cloud and IT transformation in the enterprise with theCUBE co-hosts Dave Vellante and John Furrier, live at VMworld 2013. Exploring cloud trends, Newman said the solution EMC presented in their Monday session at VMworld was designed to bring apps from the public cloud back into the private cloud. As a use case example, EMC IT saved a couple million dollars by bringing apps in-house and running on VMware services. The company had developed apps for public cloud in the past, and, along with... more »
No thumbnail available

VMware Faces Uphill Fight in VDI Marketplace

VMware is an incredible company that has grown from nothing in the last decade to be a driving force in the revolution that is sweeping through IT. And Pat Gelsinger, who took over as CEO last year, is a true visionary who has made dramatic changes that have on the whole made VMware stronger. The company's growth record over the last year, this week's hugely successful VMworld 2013, and most important, its vision of the Software-Defined Data Center, are all evidence of that. A major part of that vision is VDI. When Gelsinger streamlined the company, shuttering some operations and spinning... more »
How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

How Often Governments Knock at Facebook, Altogether 38,000 Requests in 2013

The discovery of NSA snooping has at least one positive effect: several tech companies are trying to point to sudden transparency. Almost every day there is news now about which networks with which governments work together and where they get their data. Facebook yesterday released its first “Global Government Requests Report”, which contains the government requests to Facebook in the first half of 2013. According to Facebook’s statement, the report contains all information requests by government authorities between 1 January 2013 and 30 June 2013. It is interesting and not surprising to note that the US by far the largest data hungry country on... more »
Quantum Cryptology: The Holy Grail of Data Encryption?

Quantum Cryptology: The Holy Grail of Data Encryption?

With stories of new cyberattacks hitting the headlines every other day, not too mention the fact that the NSA seems to have the ability to help itself to whatever data it wants, more advanced encryption techniques can't come soon enough. Which is why a team of British physicists' research into an encryption method called quantum cryptology is generating so much excitement. It might sound like something out of Star Trek, but quantum cryptology is very real. It's a complex technique, but it also has the potential to be a gamechanger as far as encryption goes. The physicists working on it claim... more »
VDI Now!

VDI Now!

One of the most important messages of VWworld 2013 to CIOs is you need VDI, not in 18 months, but now. And if you are not implementing VDI right now, be assured that at least some of your business units will be signing contracts with VDI-as-a-Service vendors before the end of the year. How important is this? VMware CEO Pat Gelsinger has made VDI one of the three main focus points of the streamlined, tightly focused VMware he created when he took the company over a year ago. He has named Sanjay Poonen, GM VMware End User Computing to head of... more »
Software-defined Infrastructure as a Self-driving Car | #VMworld

Software-defined Infrastructure as a Self-driving Car | #VMworld

From San Francisco, VMworld 2013, John Furrier and Dave Vellante speak with Iddo Kadim, Marketing Director, Data Center Group with Intel Corporation. Kadim's team develops solutions with the ecosystem in order to expose Intel's technologies in ways that deliver value for IT, particularly in the areas of virtualization and security. With all the hype around virtualization, people tend to forget that all these platforms run on physical infrastructure. Intel has an initiative called "Trusted Compute Pools," based on Intel Trusted Execution Technology. The lack of visibility of infrastructure in the cloud is the problem this initiative aims to address. "With Intel TXT,... more »
You Have to Have the Ambition to Be Number One, Without Obsessing Over the Competition | #VMworld

You Have to Have the Ambition to Be Number One, Without Obsessing Over the Competition | #VMworld

Dave Vellante and John Furrier sat down at VMworld 2013 in San Francisco with Sanjay Poonen, GM of End-User Computing Business, VMware, to discuss some of the hot topics at the moment as well as his recent departure from SAP to join VMware. With a long and illustrious career in the business, Poonen must be trusted when he speculates that "the desktop, not only as a laptop but as the future of all mobile devices, is clearly going to move into the cloud." "In terms of technology, the infrastructure players need to comply with three core disciplines: Management Technology, Security and Virtualization.... more »
Twitter Preps for IPO with Acquisition and New Conversation UI

Twitter Preps for IPO with Acquisition and New Conversation UI

Twitter is believed to have been thinking about going public for several months now, but before it can do that, it needs to expand and increase its revenues fast. To do so, it's acquired the social tracking TV service Trendrr for an undisclosed amount of cash. Trendrr competes with Twitter's own analytics products, and since its contract will soon conclude, the acquisition is a wise move.  Plus, it keeps Trendrr from being acquired by Facebook. Another reason the Trendrr acquisition that makes sense is that its Twitter-certified product, Curatorr, surfaces and discovers particularly relevant tweets around certain events, putting Twitter on top of... more »

Premium Research

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.

- Brian Gracely

Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.

- David Floyer

There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.

- Stuart Miniman

Oracle is using it's licensing might to enter the converged infrastructure (CI) market by making database pricing extremely attractive for its own Private Cloud Appliance (PCA), relative to alternative solutions (including non-Oracle public cloud options). To gain this pricing advantage, Oracle is applying certain restrictions to non-Oracle solutions and allowing more licensing flexibility for virtualized environments on PCA. Discussions with PCA customers indicate three main benefits, including: 1) reduced Oracle database license costs (of 50% or more); 2) greater flexibility to allocate processor cores to optimize workloads and 3) very high bandwidth and performance (via an Infiniband point-to-point architecture).

- Ralph Finos

Big data and public cloud share a natural affinity, but are not a perfect match. Wikibon estimates that worldwide big data revenue in the public cloud was $1.1B in 2015 and will grow to $21.8B by 2026 - or from 5% of all big data revenue in 2015 to 24% of all big data spending by 2026. Doers should explore public cloud options for their big data workloads because public cloud offers a simple way to scale up and down workloads running mostly using open source software.

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.