Top Stories

Microsoft Offers Bounty to Hackers for Hacking Windows 8

Microsoft Offers Bounty to Hackers for Hacking Windows 8

Re-modelling their old paradigm, Microsoft has decided to push the walls of its ecosystem and do something it has never done before: the Windows maker has decided to crowdsource the discovery of security loopholes in Windows 8 and Internet Explorer 11, and is paying a bounty to researchers who find exploits. Simply put, Microsoft is making efforts to prevent Windows 8 from becoming a hackers' playground, and inviting hackers aka researchers to discover the security flaws is seen as one of the best ways to do it. Here’s the brief of Microsoft's Windows bug bounty program, as described on company’s website: 1.... more »
"Restore the Fourth" PRISM Protest Set for Independence Day

"Restore the Fourth" PRISM Protest Set for Independence Day

While most of America will be celebrating with apple pies and fireworks this Independence Day, a number of high-profile web companies and activists have something else in store. Mozilla, Reddit, Wordpress and others are set to join hands with the Internet Defence League and the Fight for the Future non-profit organization to stage nationwide protests against the NSA's PRISM spying program. The protests will collectively be known as the “Restore the Fourth” campaign, and are set to take place in both the real and virtual worlds. Sites including Mozilla, WordPress, Reddit and 4Chan are all planning to display a banner that... more »
Android Security Flaw Puts 99% Of All Devices At Risk

Android Security Flaw Puts 99% Of All Devices At Risk

A security vulnerability that could endanger up to 99% of all Android devices has been unearthed by a security firm. What with more than 900 million Android devices said to have been activated, the vulnerability ranks as one of the biggest security scares on the platform to date. The flaw was discovered by Bluebox Security, which claims to have found Android's “master key.” Gaining possession of this key would allow hackers to corrupt just about any Android application and turn it into a malicious “zombie” app capable of taking over any device that installs it. The flaw allows hackers to modify... more »
No thumbnail available

July 4th : For the Geeky, Meat-Loving Patriot

Happy Fourth of July! SiliconANGLE wants to thank all of the men and women who served this great country of ours. And in pure geek fashion, we give them and you a list of our Geekiest Grillmaster Gadgets (The real 3G Apple). Happy Birthday 'Merica! Digital BBQ Thermometer Fork Tactical BBQ Apron Cook Air BBQ Grill Lastly, our friends at Forbes give the Top 10 Best July 4th Fireworks Displays. Stay safe and enjoy the 'Merica celebrations! ... more »
SanDisk Buys Smart Storage & A Cloud for Your Entourage - SiliconANGLE News Roundup

SanDisk Buys Smart Storage & A Cloud for Your Entourage - SiliconANGLE News Roundup

San & The Disquettes   SanDisk, the company best known for its portable USB storage devices, just increased its enterprise footprint with the acquisition of solid state memory developer, Smart Storage Systems. According to the announcement, SanDisk will pay $307 Million for the company, plus certain equity-based incentive awards. The deal has already been approved by the boards of directors on both sides, but it still has to be given the nod by regulators. This is the fourth such investment, and SanDisk executives are clearly bullish on investments in the enterprise storage market. Sumit Sadana, executive vice president & chief strategy officer of SanDisk... more »
Is Free Storage Really Free?

Is Free Storage Really Free?

Much has been written regarding outfits such as Dropbox, iCloud and others that offer free storage by simply setting up an account. And there are, as Brandon Butler at Network World pointed out, enough storage providers on the market that one could acquire as much as 112 GB of free storage by simply registering on the site. Earlier this year, SiliconANGLE’s John Furrier wrote an excellent breakdown of the pros and cons of several of the top cloud storage providers. However, as our tech lives have become increasingly more mobile, much of the free storage we take advantage of happens so seamlessly,... more »
Your WordPress Plug-Ins May Be Vulnerable, Says Checkmarx Research

Your WordPress Plug-Ins May Be Vulnerable, Says Checkmarx Research

In this Web 3.0 era, WordPress is one of the most popular blogging content management systems (CMS). Most websites are based and created on this platform as it is not only easy to use, but offers several capabilities as well. Recently, Checkmarx Research Labs released a report on vulnerabilities discovered in WordPress plug-ins and the plug-in process. According to this report, more than 20 percent of the 50 most popular WordPress plug-ins are vulnerable to common web attacks, such as SQL Injection. In addition, 7 out of the 10 most popular e-commerce plug-ins contain vulnerabilities. WordPress accounts for 18 percent of websites... more »
Jay-Z’s Brand Helps Samsung “Write the New Rules” of Tech Marketing  #MagnaCarta

Jay-Z’s Brand Helps Samsung “Write the New Rules” of Tech Marketing #MagnaCarta

Music impresario Sean Carter, also known as Jay-Z, said it best when he tweeted, "I make history for a living." In an unprecedented display today, Jay-Z unveiled the cover art for his his highly anticipated ‘Magna Carta Holy Grail’ album installed next to one of the four original surviving 1215 Magna Carta documents at the Salisbury Cathedral in Wiltshire, England. He also shook up the music industry with his new Samsung partnership that changed music industry certifications. Samsung purchased 1 million copies of Jay-Z’s upcoming album, “Magna Carta Holy Grail” (MCHG) for $5 each to allow Samsung Galaxy owners to... more »
Google Study Highlights the Power of Video Games on YouTube

Google Study Highlights the Power of Video Games on YouTube

Google has released some interesting statistics on game video footage that appear in the most popular video service YouTube. Google analyzed anonymized views of gaming content on YouTube in the U.S. from 2011 and 2012 to learn how gamers behave, what they value, and what this means to game marketers moving forward. The study titled “Gamers on YouTube: Evolving Video Consumption,” highlights the impact consumers have on official and unofficial videos games on YouTube. It suggests that players rely heavily on these videos for information on new titles or, more generally, to keep informed about the world of video games. According to... more »
ServicesAngle News Briefs for 3 July 2013

ServicesAngle News Briefs for 3 July 2013

VMworld 2013 Scheduled for San Francisco, Barcelona VMware Inc. has announced that VMworld 2013 U.S. will return to the Moscone Center in San Francisco August 25-29, celebrating the 10th annual event in the United States. VMworld 2013 Europe is scheduled for Oct. 14-17 in Fira Barcelona Gran Via in Barcelona. More   Microsoft to Release Dynamics CRM Version in Fall Microsoft Corp. has announced that it will release the next version of Microsoft Dynamics CRM this fall. It promises that the new version will redefine how businesses engage their customers and says the new version is part of a new direction for Microsoft Dynamics... more »

Premium Research

- David Floyer

The premise for this research is that high value computing has unique compute, network and storage infrastructure requirements. The key systems requirements are low or very low latency, high bandwidth and high availability designed to lower software costs, improve time-to-value and help maintain high levels of data integrity and system availability. Wikibon researched the differences between performance optimized and cost optimized systems for a sample high-value compute environments, and concluded that the total 3-year cost of a sample cost-optimized configuration and software were 63% high than a performance optimized configuration. The key differences are higher costs for performance optimized hardware, but lower costs for the software required in high value compute application, as well as lower operational costs.

- Brian Gracely

As the market for Hybrid Cloud services and solutions evolve, every vendor and cloud provider is attempting to align their offerings to market demands. Wikibon looks at the current offerings and provides guidance to vendors on how to succeed in this market.

- George Gilbert

In this report we look at ad-tech as an example of Systems of Intelligence. Using ad-tech applications, combinations of advertisers, ad agencies, consumers, and publishers -- the advertiser’s marketing ecosystem -- collaborate in real time to personalize an optimal customer interactions with the brand. One software company pioneering video ad-tech, Altitude Digital, pulls all these different pieces together, and highlights the types of function big data ecosystem apps must support.

- David Vellante

On May 12, 2016 at 12 Noon EDT, several CxOs will gather to discuss how to best communicate to Boards of Directors on the topic of cyber security. Has a failure = fire mentality led organizations to "sandbag" the threat? Is security a shared responsibility across the business or does it fall on the shoulders of a few security gurus? How should CxOs be changing the way they communicate about cyber in the digital age?

- Brian Gracely

In this Trip Report from OpenStack Summit 2016, the Wikibon team looks at five critical areas for OpenStack - Community, Consumption Models, Revenues, New Use-Cases and the OpenStack technology ecosystem,

- Brian Gracely

While automation is often looked at as a way to reduce IT costs, it has far-reaching impacts for Digital Business Platforms. Wikibon looks at how automation improves the ability to experiment with new ideas, improve market responsiveness, improve overall application security and better align development and operations requirements.

- Brian Gracely

With the release of the Native Hybrid Cloud solution, EMC is offering customers the ability to rapidly build new applications. But will the lack of embedded operations slow the adoption of the product and slow customer deployments?

- David Floyer

The x86 microprocessor has reached a limit in how much an application can be speeded up. Intel can no longer rely on economies of scale to drive market share in processors. Future advances will come from designing the microprocessor and software-in-silicon together. There are multiple large niches that have opened up to new processor/software approaches, including mobile, IoT servers, specialized servers for the cloud, telecommunications servers and large system servers for large database and big data applications. New winners in this space are likely to come from companies like Apple, Amazon, Fujitsu, Google, Hitachi, IBM, Microsoft and Oracle.

- Peter Burris

Wikibon was the Analyst Partner at the recent GDS CIO Summit, US in Denver, Colorado. This is the trip report from that session.

- Brian Gracely

Understanding how to accelerate “Idea to Execution Time” (I2ET) may become the most important measurement of any Digital Business Platform. Wikibon explore the core attributes needed to be successful in rapidly developing and deploying new business applications.