Top Stories

64-bit ARM Signals Mobile Dominance of Client Computing

64-bit ARM Signals Mobile Dominance of Client Computing

The successful start of volume production of the 64-bit ARM processor this month signals the start of the mobile/cloud era and end of the WinTel duopoly in end-user computing, writes Wikibon CTO David Floyer. Apple is already introducing 64-bit with its A7 processor in the high volume iPhone S5, iPad Air, and iPad mini. Google, Lenovo, Microsoft, and Samsung are all promising 64-bit ARM-based products. The new processor eliminates the 4GB memory addressing limitations, allowing these new mobile devices to use real and virtual memory much more efficiently. It will allow faster application loading and execution, smoother rendering, and lower development... more »
Is TrueCrypt is Safe to Use? Time to Check It Out

Is TrueCrypt is Safe to Use? Time to Check It Out

Researchers are calling for a full audit of extremely popular opensource encrpytion solution TrueCrypt. This effort begins at IsTrueCryptAuditedYet.com--that includes seeking funds for the project--but the history of TrueCrypt and its capabilities begin in February of 2002. Surprisingly, as a security tool, TrueCrypt has never been audited, its authors are anonymous, and it has an extreme depth in the market of free tools. TrueCrypt is one of those tools that gained considerable popularity and has existed since the dawn of time. The software allows you to encrypt files “on the fly,” create virtual encrypted disks in the file, encrypt entire partitions, and... more »
No thumbnail available

4 Lessons in Big Data Security from Sqrrl CTO Adam Fuchs

Boston-based software company, Sqrrl Data Inc., has been busy lately, building a small empire around the very needed market of security in Big Data solutions.  With a fresh round of funding and a history of experience building solutions for government agencies, there's a great deal to be learned from Sqrrl. The $5.2 million raised in Sqrrl's recent funding round will be used to accelerate its growth plans and to promote its market opportunity in Big Data security, which Sqrrl believes is a booming sector of which CIOs and cybercriminals alike will soon take notice. We've been following the startup's progress over the... more »
CEO Series Special Edition : Powerful Women in Tech

CEO Series Special Edition : Powerful Women in Tech

Women today can be anything they wish.  From a loving mother to a hardworking employee, a nurse, doctor, teacher, lawyer, judge, or even a CEO of a company they built and nurtured like it’s their own baby.  The tech sector has been especially benefitted by the growing number of women leaders, overcoming the challenges that the female gender faces in a traditionally male-dominated sector. To celebrate the empowerment of women, we here at SiliconANGLE drummed up a number of astonishing women in tech to impart their knowledge and wisdom of how they are changing the world. The following is a collection of... more »
No thumbnail available

A Win for Predictive Analytics : Infer Doubles Customer Bookings Since April

Delivering on its April promise to investors, predictive analytics startup Infer revealed this week that it has doubled its customer bookings since exiting stealth mode. As a result, the company is now processing 200 percent more predictions for customers than six months ago. Established in 2010 by data scientist Vik Singh and former Googlers Yang Zhang and Chung Wu, Infer offers a predictive analytics platform that correlates historical customer data with signals available on the web to help marketers better prioritize their flow of leads and drive increased sales. The software is used by several big name companies, including data visualization... more »
DARPA Offers Up $2M Cash Prize To Anyone Who Can Build Hacker-Proof Software

DARPA Offers Up $2M Cash Prize To Anyone Who Can Build Hacker-Proof Software

There are few problems that money cannot solve. And with the US government waging a never-ending war against cyberattacks on its systems, the Pentagon's Defense Advanced Research Projects Agency (DARPA) has just decided to get its check book out. The agency has just announced a new competition for budding developers to design a "fully automated cyber defense system" that'll be able to automatically analyze code, spot the weak spots, and repair them to ward off attacks. Whoever wins the so-called "Cyber Grand Challenge" will walk away with a handsome $2 million in cash, although that won't be for a while as... more »
No thumbnail available

For Domino’s Pizza, Splunk is the Secret Sauce to Efficiency

Domino’s Pizza, the second largest pizza chain in the United States, is using Splunk to gain operational visibility across 10,300 stores in over 70 international markets. The company detailed its case study in a release that crossed the wire on Tuesday. The takeout giant’s Splunk journey is a familiar one. Its IT organization originally deployed the platform in an effort to address infrastructure bottlenecks and cut overheads, a goal that was quickly reached with upfront savings of more than $300,000. After the initial success, the company decided to deploy the software on a larger scale to gain deeper insights into sales trends such... more »
Smart Sensors Take Over Bike Locks + 3D Scanners

Smart Sensors Take Over Bike Locks + 3D Scanners

This week’s SmartDevice roundup features the latest crowdfunding projects, starting with a smart lock for your bike, a mobile sensor to capture the 3D world, and a device that manages charging for various devices. BitLock   Tired of always fumbling for the keys of your bike lock?  With BitLock, you no longer need a key to lock or unlock your bike.  BitLock looks like any U-lock available in the market, the only difference is, it connects with your iOS or Android device via BLE, so it senses you as you approach, and you just need to push a button to lock or unlock... more »
No thumbnail available

SAS, Teradata Team on HDP to Deliver Integrated Analytics

In a move to help organizations consolidate their Big Data environments, analytics giant SAS and partner Teradata have updated their joint offering to support Hortonworks’ fast-growing Hadoop distribution. Dubbed Analytics Advantage Program with Hadoop, the platform marries Teradata’s SAS appliance and Unified Data Architecture, or UDA, with the latest release of the Hortonworks Data Distribution. Combined, these technologies deliver a tightly integrated set of capabilities for in-database processing, analytic model building and deployment across both structured and unstructured data. Shaun Connolly, the vice president of corporate strategy at Hortonworks, noted that “the combined best-of-breed technologies and resources of this partnership center around... more »
The iPad Air Journey: Rumors, the Big Debut, and Competition

The iPad Air Journey: Rumors, the Big Debut, and Competition

It’s been an interesting few weeks in the tablet arena, with the blogosphere noticeably more abuzz in the month leading up to the debut of the Retina-equipped iPad. It all started with a little spark: a hastily recorded video claiming to match up the iPad 4 against Apple's fifth generation tablet. Uploaded by Chinese parts supplier sw-box.com, the 6-minute clip features a thinner and more minimalistic iPad that measures 9.4 inches in height and 6.7 inches across. The device appeared to be more similar to the Mini than its full-sized predecessor, featuring two separate buttons for volume control and rounder edges. Three... more »

Premium Research

- Stuart Miniman

The hyperconverged infrastructure (HCI) wave is at a tipping point of adoption. Users should focus on the operational changes that will accompany the adoption of new Server SAN architectures.

- Peter Burris

While most agree that data is valuable, accepted conventions for valuing data are few. A simple framework for valuing data in use can help digital businesses make better investment decisions.

- Peter Burris

Digital business is a strategic requirement, but must be pursued programmatically. One concept -- digital = data -- and three core capabilities must be adopted.

- Brian Gracely

Wikibon looks at how businesses are shifting their application focus towards customer-facing applications, and how this shift will impact data management and storage for CIOs.

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.