Top Stories

No thumbnail available

CumuLogic Adds Supports for HP Cloud Services

CumuLogic is a relatively new player in the PaaS space. The company announced its enterprise Java platform just a few months ago, with support for vSphere and Citrix CloudStack on launch. A few months later CumuLogic rolled out the finalized 1.0 release of Application Platform and as of this week customers can deploy it on HP Cloud Services. The cloud service provider is getting more aggressive with its efforts to draw enterprise users. HP Cloud Services customers are getting a 30-day trial of the company’s platform-as-a-service before they commit to the monthly subscription fee, a fixed rate of $200 per developer. “Organizations... more »
Meet Amazon's New Kindle Tablets [REVIEW]

Meet Amazon's New Kindle Tablets [REVIEW]

Amazon introduced a new line of Kindles yesterday, all likely to rock the tablet market, as they're priced unbelievably lower than competitors’ prices.  The online retailer unveiled two new e-readers and three new tablets. E-readers . Kindle Paperwhite and Kindle Paperwhite 3G are the same, except the 3G version allows you to access the internet without a WiFi network available as it connects to Amazon via 3G at no extra charge. Both devices feature a 6" Paperwhite display with patented built-in light, 212 ppi, optimized font technology, 16-level grayscale.  The screen of the devices are matte so you won’t have to worry about glare... more »
Building Big Data: Farming Big Data Goes To The Cows

Building Big Data: Farming Big Data Goes To The Cows

When we think about the people who actually use big data, we usually imagine someone sitting in a warm, cozy office, suited and booted, making calls or getting busy on their computer. Few of us imagine that someone sat in an old cow shed, wearing ragged overalls and muddy boots, would be doing exactly the same thing. But this is precisely what’s happening at a number of farms across the country today, as farmers, cloud servers and insurers team up to apply big data to agriculture in an attempt to improve yields and stave off the effects of extreme weather. Taking the... more »
Cloud Cold War - No Nukes Please - Weapons of Mass Abstraction

Cloud Cold War - No Nukes Please - Weapons of Mass Abstraction

Chris Hoff the most excellent theCUBE guest was inspired to write a post titled "The Cuban Cloud Missile Crisis…Weapons Of Mass Abstraction".  This was a topic that we discussed at length on SiliconANGLE.com's theCUBE at VMWorld2012 - www.youtube.com/siliconangle   As John Furrier, Dave Vellante and I were discussing on theCUBE recently at VMworld 2012, there exists an uneasy standoff — a cold war — between the so-called “super powers” staking a claim in Cloud. The posturing and threats currently in process don’t quite have the world-ending outcomes that nuclear war would bring, but it could have devastating technology outcomes nonetheless. In this case, the... more »
Walmart Launches New Search Engine to Increase Customer Base

Walmart Launches New Search Engine to Increase Customer Base

Wal-Mart Stores, Inc has just launched a new search engine for its company website. Dubbed as Polaris, the new Walmart search engine is targeted at increasing customer acquisition and shopper conversion rate, as it will help users quickly browse and discover items. Walmart has done this to compete with its tech-savvy competitors--Amazon and eBay. Polaris is created by retail giant’s in-house tech team from @Walmart Labs, and utilizes semantic search technology to anticipate a shopper's intended search and deliver more relevant results. "Search is a crown jewel for any e-commerce company to own," Neil Ashe, president and CEO Walmart Global eCommerce, said... more »
Half of the Enterprises that Report Security Breach are BYOD Users Says Report

Half of the Enterprises that Report Security Breach are BYOD Users Says Report

As the popularity of high-tech mobile devices, more employees prefer to work on their own laptops, tablets and smartphones. This trend is now adopted globally and irreversible, but faces new risks. A recent report commissioned by Trend Micro found that nearly half of enterprises that allow BYOD to connect to a company’s network have experienced a data breach. Security Still a Concern The report surveyed in the U.S., U.K., and Germany among IT executives and CEOs of larger companies focused mobile security and issues related to BYOD programs. Most of the companies suggested embracing data access rights (45 percent) or installing security software... more »
Hortonworks' YARN Aims to Revolutionize Hadoop Data Processing

Hortonworks' YARN Aims to Revolutionize Hadoop Data Processing

Hortonworks is publishing a series of blog posts on its website that explain the basics and finer details of Apache Hadoop YARN. Those who are curious about YARN or want to understand its significance to Hadoop will find the blog posts beneficial. Furthermore, it should be of benefit to those who might not have even heard of YARN but who are looking for alternatives to the classic Apache Hadoop MapReduce framework. The first post gives a background and overview of MapReduce: what it is supposed to accomplish, how people have used it, and ultimately how YARN aims to improve upon it.... more »
Sweden Tops The List For Internet Know-How

Sweden Tops The List For Internet Know-How

One thing we can’t get enough of is all of these “Best of” or “Top Ten” lists. As a culture, we just love to rank things, but unfortunately not everything is that easily quantified. Take the internet, for example – a commercial platform, an open forum, an educational tool and so much more – to even think about trying to rank who does it best seems audacious to say the least. But then again, if anyone does possess the audacity to attempt do so, it has to be Tim Berners-Lee, the man who first introduced conceived World Wide Web back in... more »
Protecting Your Digital World - Everyday Advice

Protecting Your Digital World - Everyday Advice

Compromised accounts, phone info tracking, reports of major breaches – the news of risks in digital security and privacy emerge all the time.  The goal may be identity theft, financial gain, account hacking, or any unknown intents for ill-gained information.  The average computer user has some idea of how to protect their computers by now, but that doesn’t apply everywhere. The fact is with more and more information going to web-based environments and new means of access that includes smartphones and tablets, users have to learn and often re-learn some basic protection skills.  It is arguable that due to convenience,... more »
No thumbnail available

How Google (Sometimes Surprisingly) Spends Its Billions [Infographic]

Targeted advertising and providing search engine capabilities to other companies pays well when you do it as big as Google. So, given its roughly 95.4 percent share of Mobile Ad Revenues, what does Google do with its billions? BestComputerScienceSchools.net’s recent Infographic, “Google Casts a Wide Net,” reports that with over $44 billion, Google leaders spend aggressively and in diverse arenas including YouTube, wind power and fiber optics experimentation. With a $20 million investment in technologies like the self-driving car, (presently only legal in Nevada) Google clearly likes to be known as an innovation leader. Supporting pioneering technology, Google has pledged $30... more »

Premium Research

- David Floyer

CIO and senior IT executives should minimize investments in HDDs for latency storage investments going forward. Storage practitioners should focus on moving latency storage to flash, implementing a sound catalog strategy for the management of snapshots, and a strategy for linking to on-premise or cloud-based capacity resources. Any storage that involves assisting end-users and customers should be regarded as latency storage.

- Ralph Finos

A companion piece to Wikibon's Public Cloud Market Forecast 2015-2026, this research examines the revenue from SaaS, IaaS and PaaS vendors. The competitive environment surrounding the Public Cloud is in flux. SaaS remains turbulent with new entrants successfully gaining share and incumbent licensed software providers trying to develop SaaS offerings and reclaim leadership positions they have maintained for a decade or more. The IaaS segment leadership is beginning to crystalize as a function of scale, but PaaS is just formulating and finding its way. As such, enterprises need to be wary of which providers are winning and losing (and where), but more importantly what they themselves intend to accomplish with Public Cloud.

- David Floyer

Cataloging and automated policy management are the key enablers of a virtual flash world, where storage snapshots are both King and Knave. Combining cataloging and automated policy management is the only solution to enabling storage copy reduction in harmony is risk management and compliance. This enables and justifies an all-flash data center, enables data to be available quicker to the business and other IT functions, and drives greater business and IT productivity and responsiveness. CIOs and senior management should create a small team of the best and brightest, create an optimized all-flash virtual environment with a programmatically integrated catalog in a subset of the datacenter, and demonstrate the practicality and benefits of this environment to the business and IT.

- Stuart Miniman

VMworld has grown to be one of the largest and most important technology industry events. Wikibon has attended this event for many years and will have its largest presence this year as part of a double-set of theCUBE. Coverage will examine the broad and diverse ecosystem including storage, cloud, networking and much more.

- David Floyer

Wikibon believes latency storage vs. capacity storage is a key storage dimension, with different functional requirements and different cost profiles. Latency storage is found within the datacenter supporting more active applications, and in general has a high read bias. Latencies can vary from 1 millisecond down to a few microseconds; the lower (better) the latency the closer to the processor resources it is likely to be. It is also found for the metadata layer for capacity data. The boundary for latency storage will reduce down to 500 microseconds over the next three years. Capacity storage is found in archive, log, time-series databases for the Internet of things and many other similar applications. In general it is write-heavy. Latencies are generally above 1 millisecond, do not have to so close to the processor, and are suitable for remote private, public and hybrid cloud storage. Some parts of the capacity market place will have latencies as low as 500 microseconds over the next three years. Wikibon has added this dimension to the other storage dimensions projected, which include HDD vs. Flash, Hyperscale Server SAN vs. Enterprise Server SAN vs. Traditional SAN/NAS storage, Physical Capacity vs. Logical Capacity and SaaS Cloud vs. IaaS Cloud vs. PaaS Cloud. All these dimensions are projected for both Revenue and Terabytes. There is a strong correlation and interaction between the latency/capacity dimension and HDD/Flash dimension. Wikibon provides detailed breakdown of the storage projections for Premium clients.

- Brian Gracely

With the EMC Federation in transition, VMware needs to take a greater leadership role in delivering cloud services. VMware's ability to lead their customers transitions to Hybrid Cloud requires them to deliver a more robust, more agile vCloud Air platform.

- Brian Gracely

While the majority of Enterprise CIOs continue to have Hybrid Cloud near the top of their priorities, the solutions in the marketplace often fall short of expectations. Wikibon analysts look at the state of Hybrid Cloud from a C-Suite perspective.

- Ralph Finos

Maturity by industry is a function of customer and prospect skills, competitive drivers within the industry, the nature of the data in question as well as the complexity of the analytics required, and most importantly the problem that the prospect or customer is trying to solve. Identifying where customers are in their journey and helping them to reach the next level is key to vendor success.

- Ralph Finos

Both customers and vendors need to prioritize how they address adoption barriers. As with all emerging technologies, a full solution will often require extensive 3rd party participation, such as “data wrangling” and SQL data access tools. SQL data analysis offerings are maturing rapidly in the areas of application performance under greater user and data volume loads both from the Hadoop distribution vendors as well as 3rd parties. Other barriers, such as a skills gap across many roles, are more intractable. Smaller customers with fewer specialized practitioners in each role should include in their evaluations cloud-based solutions that are fully managed services.

- George Gilbert

Across all the primary roles involved in adopting Big Data applications, there are basic gaps in product maturity. However, IT leaders and practitioners should keep in mind that Big Data databases are part of a relatively immature ecosystems that requires advanced skills and integration technology in order to operate successfully. The ecosystem is evolving and maturing rapidly and there is a tremendous proliferation of technologies to augment early products.