Top Stories

What Chance a Nikon Smartphone?

What Chance a Nikon Smartphone?

More than a few consumers these days are content to give up on the idea of buying a camera, instead settling for whatever happens to be built into their smartphones, especially now that the quality of these optics has improved immeasurably in recent years. From the consumer's perspective, it's cost-efficient and convenient, as it only means carrying one device arounnd with them. But for the companies that build the cameras, it's becoming a problem. To that end, Nikon is said to be creating a new division that'll be charged with creating a new kind of camera that's “competitive” with smartphone optics.... more »
Will Apple Follow in the Footsteps of BlackBerry?

Will Apple Follow in the Footsteps of BlackBerry?

BlackBerry earned approximately $40 per subscriber as of June 1, down from $886 three years ago. SiliconANGLE Senior Managing Editor Kristen Nicole commented on this sharp decline and addressed the possibility that Apple might meet a similar fate in a recent Q&A with NewsDesk host Kristin Feledy. In Kristen’s view, the drop in value that BlackBerry recorded last quarter is merely the latest reminder of its rapid decline. She found it more notable that the phonemaker reached its peak in the US two years before it achieved it internationally, an indicator that she believes reflects the overall strength of the domestic... more »
Facebook Graph Search Rolling Out to US English Users Today

Facebook Graph Search Rolling Out to US English Users Today

If you didn’t volunteer to be one of the first to try out Facebook Graph Search when it was introduced last January, you no longer have to sign up for anything as Facebook is finally rolling out the feature to everyone starting today.  All users who have their Facebook profile set to US English will start receiving the update today.  If not, you might wait a little bit longer, or else you can still join the waiting list (and see a preview) here. When Graph Search was first introduced, users could no longer see a white search bar as it was... more »
LIVE: Motorola + NSA | Sit In Trees, K-I-S-S-I-N-G

LIVE: Motorola + NSA | Sit In Trees, K-I-S-S-I-N-G

Welcome to NewsDesk on SiliconANGLE TV for Monday July 8, 2013. Is Motorola in cahoots with the NSA? A recent discovery by a security engineer may hold the answer to this question. Joining us now to reveal details surrounding a privacy breach that may be affecting you is SiliconANGLE Contributing Editor John Casaretto. Beneath the Waves writer and security engineer Ben Lincoln recently wrote about a disturbing new discovery on the Motorola Droid X2 smartphone. In his editorial Lincoln claims that Motorola is silently collecting personal info including passwords, GPS data from photos, email addresses, and usernames just to name a few. Along with silently sending... more »
Don't Stuff your Big Data in a Woman's Handbag

Don't Stuff your Big Data in a Woman's Handbag

All kinds of businesses are looking to get into the Big Data game, but a worryingly high number of them are doing so without fully understanding what they're getting themselves into. It's one thing to collect and store masses and masses of data, but doing so is only half the battle – companies also need to optimize their stored data correctly in order to make the most of it, and this is where numerous firms have fallen flat on their face. A new report, produced by Inbox Insight, Computacenter and Hitachi Data Systems (HDS), reveals that nearly 60% of European organizations... more »
Samsung and SK Take Aim at Apple with Licensing Agreement

Samsung and SK Take Aim at Apple with Licensing Agreement

Samsung and SK Hynix, two of the largest memory chip manufacturers in the world, recently entered a cross-licensing agreement that will have broad implications beyond the realm of copyright law. SiliconANGLE Senior Managing Editor Kristen Nicole provided her insights into the unexpected alliance in an interview with News Desk host Kristin Feledy. According to Kristen, the newly announced pact will enable the South Korean rivals to resolve their back-and-forth legal conflict and free up more resources for innovation. The deal was unanticipated, she notes, but it didn’t come as too big of a surprise in light of the current industry climate. Kristen... more »
Your Metadata: Here's What It Can Reveal About You

Your Metadata: Here's What It Can Reveal About You

One of the most oft-heard claims to come out of officials mouths since this whole NSA-PRISM thing first became public knowledge is that the spooks are 'only' collecting metadata, rather than reading the content of your emails. But does that lack of readable content mean the NSA knows any less about you and those you're closely associated with? Not at all, or at least not if believe that the MIT's latest research on the subject has any merit. A team at the MIT Media Lab recently developed software called Immersion, which has been designed to grab all of that metadata in... more »
No thumbnail available

What Can You Do With Too Much Of A Good Thing?

IT departments at the end of the last decade operated with the same reckless abandon as the homesteaders of the 1889 land rush, seeking to grab up as much cloud storage capability as their budgets might allow. For too many, more was better, storage management techniques be damned. And with a department that was too little understood by anyone else in the company, few were the requisition orders that went unfulfilled. Of course, with the late decade economic downturn came the inevitably tightened IT budgets. Too many companies found themselves with an inordinate amount of storage that was unnecessary thanks to... more »
Data Incognito: Securing The Cloud

Data Incognito: Securing The Cloud

The week is rare that doesn’t see a headline on internet privacy and security with a story underneath detailing how another breach has compromised user data. It turns out, however, not every privacy/security story is bad news. This was the case with regard to a presentation delivered last week at the International Symposium on Computer Architecture by a group of MIT researchers. The cloud infrastructure, since its inception, has raised concerns about privacy. As explained in an MIT press release, a bank of cloud servers could be running applications for 1000 customers at one time. Without knowledge of the hosting service,... more »
Smart Fashion for the Self-Quantified : New Wave of Wearable Tech

Smart Fashion for the Self-Quantified : New Wave of Wearable Tech

There are a lot of ways to start living a healthy life.  You can go about it the traditional way, watching what you eat and start exercising.  But with all the hustle and bustle around you, it’s easy to lose track of your goals. There are now apps to help remind you of your set goals, and even fitness trackers to give you a boost in the right direction.  But are those enough? Conscious Clothing A team of three designers have developed a prototype of a technology that analyzes a person’s breathing volume - or how much a person inhales or exhales.  Conscious... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.