Top Stories

Botnets and Porn: It's What Tor's All About

Botnets and Porn: It's What Tor's All About

What with its high level of anonymity, the secure Tor network has a well earned reputation for being the web's favorite hangout for drug dealers, porn kings, botnets and other ne'er-do-wells. "But, but, but... it's still the best way to mask your browsing activity!" you scream, given what we know about the NSA. That may be so, but first impressions often count, and that's certainly true with Tor. Apparently, all the bad stuff you've heard about Tor is true – the network is overrun with pornography, botnets and illegal narcotics, and most especially the latter. At least, it is according to... more »
Nate Silver Skeptical of Big Data Trends, Keys in on Culture

Nate Silver Skeptical of Big Data Trends, Keys in on Culture

There were two big takeaways I had from Nate Silver's time on #theCUBE during this week's Tableau Customer Conference: 1) the editor of ESPN's FiveThirtyEight is more of a skeptic, taking a wait-and-see approach to Big Data, and 2) culture is more important when analyzing data than most realize. I was fascinated to hear Silver talk about culture being key for good data analysis, and was equally intrigued to learn that he isn't as bullish on Big Data trends as most in his field tend to be. In Silver's keynote, he spoke on how the volume of data does not trump the modeling of... more »
No thumbnail available

The True Cost of iPhone 5c Nearly $600 : Apple May Never Sell Low-End

Before Apple revealed its two new iPhones, there were rumors that one of the devices would be the cheaper or more affordable version.  When Apple finally revealed the iPhone 5c, it was indeed priced cheaply - on contract.  In reality, it still costs $549 for the 16GB version without a contract. Looking at the iPhone 5c -- it’s just the old iPhone 5 placed in a plastic case.  So is paying $549 reasonable?  I think not.  Yes it is cheaper with contract, but if you’re already an iPhone 5 owner, would you really exchange that for a newer iPhone 5c just... more »
Why The New iPhone 5S Fingerprint Sensor Will Never Replace Passwords

Why The New iPhone 5S Fingerprint Sensor Will Never Replace Passwords

There’s a ton of buzz around the new iPhone’s Touch ID Fingerprint Sensor feature and there’s been a whole lot of speculation that passwords are dead. I even saw the headline on Drudge that said just that. This all seems quite dandy, passwords are a problem right? They’re hard to remember, there’s all these requirements around keeping them complex, people have to reset them all the time and what about those password reminder things – What was my high school’s mascot again? Which email did I use when I registered? With all these real inconveniences it’s little wonder that many... more »
Virtualization Breeds More Agile Businesses | #VMworld

Virtualization Breeds More Agile Businesses | #VMworld

Phillip Reynolds, Data Center Director, Williams & Fudge, discussed their virtualized environment and specific financial sector IT requirements with theCUBE co-hosts Dave Vellante and Stu Miniman live at VMworld 2013. Williams & Fudge is an accounts receivable management firm, working for about 13,000 colleges, universities, and other private financial institutions. It has 400 employees, most of them working in the call center. "As the environment is changing in our industry, we have to work the business harder, work our staff harder and work our IT harder to be able to make the same return we were making a few years ago," Reynolds... more »
Congress + Economists Must Learn to Communicate Data More Effectively | #tcc13

Congress + Economists Must Learn to Communicate Data More Effectively | #tcc13

From the 2013 Tableau Customer Conference in Washington DC, theCUBE co-hosts Jeff Kelly, Principal Research Contributor with Wikibon, and Dave Vellante, Wikibon Senior Analyst, sat down with Jon Schwabish, Principal Analyst with the Congressional Budget Office, talking about projections and trends in the field of economics. For those unfamiliar with the institution, Jon Schwabish was happy to clarify: "The CBO is a relatively small agency in the Federal Government, about 230 people. We provide objective, non-partisan analysis to Congress. Those issues can range from immigration to social security, Budget issues, long term budget issues, anything that the Congress would be interested... more »
Why The iPhone 5S's Touch ID Could Spell The End Of Passwords

Why The iPhone 5S's Touch ID Could Spell The End Of Passwords

Apple's next-generation iPhone 5S looks snazzy as hell and comes with the latest iOS 7 operating system, but by far and away the most intriguing aspect of the phone was its new fingerprint scanner. The iPhone's Touch ID biometric security feature was one of the biggest talking points yesterday, with many arguing that this could bolster Apple's popularity with enterprise users, while others still were concerned that it could present new security risks for consumers, with all of that biometric data potentially falling into the hands of the NSA and/or cybercriminals. These things may or may not happen, but the big... more »
Microsoft Looking to Leverage Nokia Mapping Products to Compete Google

Microsoft Looking to Leverage Nokia Mapping Products to Compete Google

Taking benefit from its recent Nokia’s mobile business acquisition, Microsoft has decided to take advantage of Nokia’s Here mapping and location services  to better compete against Google Maps. In a presentation on the strategic rationale for the Nokia deal, Microsoft mentioned Nokia’s Here products as below: “Need an effective alternative to Google; more than one digital map of the world” “Microsoft gets flexibility to integrate HERE with other experiences” Recently Microsoft announced that it will get hold of several new mapping and location services as part of its acquisition of Nokia's Devices & Services business, out of which main products are Nokia's HERE Drive,... more »
PSN Breach Amid the Largest of Past Years [Infographic]

PSN Breach Amid the Largest of Past Years [Infographic]

Enterprises have made great progress in deploying technological solutions to protect themselves from direct and indirect external threats, however the rise and increased sophistication of attacks which target customers and internal attacks indicate that there is a new threat that has to be addressed. Phishing and pharming (luring people to disclose sensitive information by using bogus emails and websites) were two major additions to the top security threats. The trend is now shifting from internal to external attacks and tactics which exploit technological loopholes. According to a report from 7Safe, 86% percent of all implemented attacks were followed by theft of... more »
Bitcoin Weekly 2013 September 11: Avalon Refunds ASIC Customers, Bitcoin Could Replace Wall Street Says Investor, California Amends MTA

Bitcoin Weekly 2013 September 11: Avalon Refunds ASIC Customers, Bitcoin Could Replace Wall Street Says Investor, California Amends MTA

As the legitimacy of Bitcoin continues to spark debates—including the odd regulatory foray and questions as to Bitcoin as money—there have been other movements in the community catching our attention lately. Firstly, Avalon has set out to refund all customers of ASIC Miners who have been waiting on existing orders due to unexpected delays. Next, at TechCrunch Disrupt conference Bitcoin investors are evangelizing the mutative capability of BTC to work as better money than money itself and perhaps even replace institutions such as Wall Street. And, on the regulation front, California's changes to the Money Transmission Act might work to benefit... more »

Premium Research

- Brian Gracely

As the trend towards greater adoption and usage of open source expands, Wikibon looks at how open source software and public cloud are reshaping the business models of VCs, Startups, Enterprise IT vendors and Cloud Providers.

- Peter Burris

HPE visited theCUBE for a conversation about IoT edge processing. We excerpt that conversation, adding our insights into evolving IoT architectures.

- David Floyer

Next generation datacenters with all-flash for active data will require much higher performance system networks. These networks will need to be integrated into converged systems, and be completely separate from long-distance networks.

- George Gilbert

The software, hardware, and professional services markets for big data are still in formative stages, with packaged applications emerging only slowly. But the demand for solutions is sufficiently large and growing fast enough to support a number of large vendors with a variety of packaging and go-to-market approaches. Users should identify their big data starting point -- services, application platforms, or converged infrastructure -- and establish the strategic relationships they need to progress with big data investments.

- Brian Gracely

Wikibon looks at several examples of IT organizations that are actively engaged with open source software communities to help evolve how their business undergoes a digital transformation.

- Brian Gracely

Wikibon and theCUBE attended Red Hat Summit 2016 in San Francisco. Get analysis of the announcements, partnerships and community programs from Red Hat.

- Brian Gracely

Wikibon and theCUBE attended DockerCon 2016 in Seattle. Get analysis of the announcements, partnerships and community programs from Docker.

- Brian Gracely

Wikibon looks at the evolution of PaaS and Container platforms, and evaluates the critical architectural criteria that should be considered by CIOs, Enterprise Architects, Developers and Operational teams.

- Ralph Finos

Based on market conditions that we have observed over the past year and the recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM, we expect that public cloud spending will continue to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 (19% CAGR). Each public cloud segment will have rapid growth rates: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR) during this period. How big will public cloud be? By 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.